Networking - Ethical Hacking

Back to Course

Lesson Description

Lession - #1192 What is Cybercrime? Types, Tools, Examples

What is Cybercrime?

Cybercrime is characterized as an unlawful activity against any individual utilizing a PC, its frameworks, and its on the web or disconnected applications. It happens when data innovation is utilized to commit or cover an offense. Nonetheless, the demonstration is possibly viewed as Cybercrime on the off chance that it is purposeful and not unintentional.

Example of Cybercrime

  • The extortion did by controlling PC organization.
  • Unapproved admittance to or adjustment of information or application.
  • Protected innovation robbery that incorporates programming theft.

    Cybercrime Types

  • Hacking:
  • It is a demonstration of acquiring unapproved admittance to a PC framework or organization.

  • Denial Of Service Attack:
  • In this cyberattack, the digital crook utilizes the transfer speed of the casualty's organization or fills their email box with malicious mail. Here, the goal is to disturb their standard administrations.

  • Software Piracy:
  • Burglary of programming by unlawfully duplicating certifiable projects or forging. It additionally incorporates the conveyance of items planned to pass for the first.

  • Phishing:
  • Pishing is a procedure of removing secret data from the bank/monetary institutional record holders by unlawful ways.

  • Spoofing:
  • It is a demonstration of getting one PC framework or an organization to profess to have the personality of another PC. It is for the most part used to gain admittance to selective honors appreciated by that organization or PC.

    Cyber Crime Tools

  • Kali Linux:
  • Kali Linux is an open-source programming that is kept up with and financed by Offensive Security. It is an uncommonly planned program for advanced criminology and entrance testing.

  • Ophcrack:
  • This device is predominantly utilized for breaking the hashes, which are created by similar records of windows. It offers a safe GUI framework and permits you to runs on various stages.

  • EnCase:
  • This product permits an examiner to picture and inspect information from hard plates and removable circles.

  • SafeBack:
  • SafeBack is essentially utilizing for imaging the hard circles of Intel-based PC frameworks and reestablishing these pictures to a few other hard plates.

  • Data dumper:
  • This is an order line PC legal instrument. It is openly accessible for the UNIX Operating framework, which can make precise duplicates of circles appropriate for computerized scientific examination.

  • Md5sum:
  • An apparatus to actually take a look at assists you with checking information is replicated to another capacity effectively or not.