SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
League of Legends is Hacked,
with Crucial User info
Accessed
- A Case Study
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
One of the world's most popular online video games falls prey to a
security breach involving usernames, e-mail addresses, salted
passwords, and 120,000 salted credit card numbers.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Salting
Stored representation differs
Salting technique prevents deriving passwords
from the password file
Advantage: Defeats pre-computed hash attacks
Unique
Password
Note:Windows password hashes are not salted.
Alice:root:b4ef21:3ba4303ce24a83fe0317608de02bf38d
Bob:root:a9c4fa:3282abd0308323ef0349dc7232c349ac
Cecil:root:209be1:a483b303c23af34761de02be038fde08
Salting
Same password
but different
hashes
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Riot Games, which developed League of Legends, announced that some usernames, e-
mail addresses, salted password hashes, first and last names, and even some salted credit card
numbers have been accessed.The salted data is somewhat protected, but if users have easily
guessable passwords, their information could be susceptible to theft, Riot Games warned.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Hackers have breached the
system of one of the world's
most popular online video
games:
League of Legends
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
A salt is a random value used in a hash algorithm to make it more
secure. Hashing is used to verify the integrity of data and protect
sensitive information, like passwords. Common hash algorithms
include md5 and SHA-1.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Active Online Attack: Hash Injection Attack
A hash injection attack allows an attacker to inject a compromised hash
into a local session and use the hash to validate to network resources
The attacker finds and extracts a logged on domain admin
account hash
The attacker uses the extracted hash to log on to the domain
controller
Attacker Victim Computer
Inject a compromised hash into a local session
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
LM “Hash” Generation
cehpass1
Concatenate LM Hash
CEHPASS 1******
ConstantConstant
DES DES
Padded with NULL to
14 characters
Converted to
the uppercase
Separated into
two 7-character
strings
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
League of Legends hit the scene nearly
four years ago, and in some ways
completely flew under the radar for
most casual observers of the gaming
industry. However, in that short time
frame, League quickly acquired
millions of players that stay addicted
to the evolution of the game.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
The affected users are only those
who live in North America.
While the accessed credit card
information is alarming, it pertains
only to records from 2011 and
earlier.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
"We are investigating that
approximately 120,000
transaction records from 2011
that contained hashed and
salted credit card numbers
have been accessed,"
Riot Games
wrote in a
blog post
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
In 2011, LulzSec claimed responsibility for launching a distributed
denial-of-service attack on ZeniMax, which makes Fallout 3,
Doom, and Quake.
Handler
Handler
Attacker
Compromised PCs (Zombies)
Compromised PCs (Zombies)
Attacker sets a
handler system
Handler infects
a large number of
computers over
Internet
Zombie systems
are instructed to
attack a target
server
1
1
2
2
3
3
How Distributed Denial of Service AttacksWork
South Korea
Web Servers
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
In July, a Ubisoft security breach led to hackers accessing
usernames, e-mail addresses, and encrypted passwords.
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Riot Games, the company is instituting new security features, such
as e-mail verification and two-factor authentication, and is also
requiring users to change their passwords to "stronger ones that are
much harder to guess."
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
PWDUMP extracts LM
and NTLM password
hashes of local user
accounts from the
Security Account
Manager (SAM)
database
Attacker
fgdump.exe -h 192.168.0.10
-u AnAdministrativeUser -p
l4mep4ssw0rd
pwdump7.exe
Dumps a remote machine
(192.168.0.10) using a specified user
pwdump7 and fgdump
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
L0phtCrack
http://www.l0phtcrack.com
L0phtCrack is a password auditing and recovery application packed with features such as scheduling, hash
extraction from 64-bitWindows versions, multiprocessor algorithms, and networks monitoring and decoding
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
To know more about these
attacks and how to secure your Information
Systems become a Certified Ethical Hacker

Weitere ähnliche Inhalte

Ähnlich wie League of legends is hacked, with crucial user info accessed

A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
 
Offensive Security with Metasploit
Offensive Security with MetasploitOffensive Security with Metasploit
Offensive Security with Metasploit
egypt
 

Ähnlich wie League of legends is hacked, with crucial user info accessed (20)

Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Botnets
BotnetsBotnets
Botnets
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Developers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crimeDevelopers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crime
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Hacker guide to adobe flash security
Hacker guide to adobe flash securityHacker guide to adobe flash security
Hacker guide to adobe flash security
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Zeus
ZeusZeus
Zeus
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Offensive Security with Metasploit
Offensive Security with MetasploitOffensive Security with Metasploit
Offensive Security with Metasploit
 
Hacking
HackingHacking
Hacking
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan KuskosCONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
CONFidence 2015: The Top 10 Web Hacks of 2014 - Matt Johansen, Johnathan Kuskos
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 

Mehr von EC-Council

Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 

Mehr von EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

League of legends is hacked, with crucial user info accessed

  • 1. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. League of Legends is Hacked, with Crucial User info Accessed - A Case Study
  • 2. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. One of the world's most popular online video games falls prey to a security breach involving usernames, e-mail addresses, salted passwords, and 120,000 salted credit card numbers.
  • 3. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Salting Stored representation differs Salting technique prevents deriving passwords from the password file Advantage: Defeats pre-computed hash attacks Unique Password Note:Windows password hashes are not salted. Alice:root:b4ef21:3ba4303ce24a83fe0317608de02bf38d Bob:root:a9c4fa:3282abd0308323ef0349dc7232c349ac Cecil:root:209be1:a483b303c23af34761de02be038fde08 Salting Same password but different hashes
  • 4. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Riot Games, which developed League of Legends, announced that some usernames, e- mail addresses, salted password hashes, first and last names, and even some salted credit card numbers have been accessed.The salted data is somewhat protected, but if users have easily guessable passwords, their information could be susceptible to theft, Riot Games warned.
  • 5. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Hackers have breached the system of one of the world's most popular online video games: League of Legends
  • 6. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. A salt is a random value used in a hash algorithm to make it more secure. Hashing is used to verify the integrity of data and protect sensitive information, like passwords. Common hash algorithms include md5 and SHA-1.
  • 7. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Active Online Attack: Hash Injection Attack A hash injection attack allows an attacker to inject a compromised hash into a local session and use the hash to validate to network resources The attacker finds and extracts a logged on domain admin account hash The attacker uses the extracted hash to log on to the domain controller Attacker Victim Computer Inject a compromised hash into a local session
  • 8. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. LM “Hash” Generation cehpass1 Concatenate LM Hash CEHPASS 1****** ConstantConstant DES DES Padded with NULL to 14 characters Converted to the uppercase Separated into two 7-character strings
  • 9. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. League of Legends hit the scene nearly four years ago, and in some ways completely flew under the radar for most casual observers of the gaming industry. However, in that short time frame, League quickly acquired millions of players that stay addicted to the evolution of the game.
  • 10. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. The affected users are only those who live in North America. While the accessed credit card information is alarming, it pertains only to records from 2011 and earlier.
  • 11. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. "We are investigating that approximately 120,000 transaction records from 2011 that contained hashed and salted credit card numbers have been accessed," Riot Games wrote in a blog post
  • 12. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. In 2011, LulzSec claimed responsibility for launching a distributed denial-of-service attack on ZeniMax, which makes Fallout 3, Doom, and Quake. Handler Handler Attacker Compromised PCs (Zombies) Compromised PCs (Zombies) Attacker sets a handler system Handler infects a large number of computers over Internet Zombie systems are instructed to attack a target server 1 1 2 2 3 3 How Distributed Denial of Service AttacksWork South Korea Web Servers
  • 13. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. In July, a Ubisoft security breach led to hackers accessing usernames, e-mail addresses, and encrypted passwords.
  • 14. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Riot Games, the company is instituting new security features, such as e-mail verification and two-factor authentication, and is also requiring users to change their passwords to "stronger ones that are much harder to guess."
  • 15. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. PWDUMP extracts LM and NTLM password hashes of local user accounts from the Security Account Manager (SAM) database Attacker fgdump.exe -h 192.168.0.10 -u AnAdministrativeUser -p l4mep4ssw0rd pwdump7.exe Dumps a remote machine (192.168.0.10) using a specified user pwdump7 and fgdump
  • 16. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. L0phtCrack http://www.l0phtcrack.com L0phtCrack is a password auditing and recovery application packed with features such as scheduling, hash extraction from 64-bitWindows versions, multiprocessor algorithms, and networks monitoring and decoding
  • 17. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. To know more about these attacks and how to secure your Information Systems become a Certified Ethical Hacker