Hacking
Hacking
Hacking
1. Introduction to Hacking
The Internet, like any other new media historically, provides new methods of
engaging in illegal activities. That is not to say that the Internet is intrinsically 'bad',
as many tabloid journalists would have us to believe, it is simply a means for human
beings to express themselves and share common interests. Unfortunately, many of
these common interests include pornography, trading Warez (pirated software),
trading illegal MP3 files, and engaging in all kinds of fraud such as credit card fraud.
Types of hackers:-
Grey-hat Hacker:
If a grey hat hacker finds a fault he will do what he feels like at the time i.e.
exploiting the site OR informing the owner.
Black-Hat Hackers
This is the more conventional understanding of the term 'hacker', one that is
portrayed in newspapers and films as being essentially 'chaotic', an obsessive social
misfit hell-bent on the destruction of everything good about the Internet.
A black hat hacker if they find a fault will immediately exploit the site for there own
beneficial gain i.e. Advertising and infecting other computers with "viruses" to gain
access to more sites. So White-hat hackers often call this kind of hacker a 'cracker',
as they spend most of their time finding and exploiting system insecurities.
Curiosity:
Money:
Spying:
Anarchy:
• You notice your internet connection is in use, but you are not
using it
• You get a phone call, letter, or email from your Internet service
provider or administrator noting strange activity.
3. Hacking Techniques
3.1 Overview of Hacking Techniques
The depth and variety of techniques employed by hackers to illegally enter a
computer system are vast, for this reason I intend to provide a brief overview of
some of the more common techniques involved, without going into to much detail on
any particular technique.
Hacking a system is a two-step process, Gathering Information and Launching an
Attack.
Packet Sniffing: A sniffer is a piece of software that grabs information 'packets' that
travel along a network. That network could be running a protocol, such as Ethernet,
TCP/IP, IPX or others. The purpose of the sniffer is to place the network interface into
'promiscuous' mode and by doing so, capture all network traffic. Looking into packets
can reveal valuable information like usernames, passwords, addresses or the
contents of e-mails.
Packet Sequence Attacks: In packet sequence attacks, the hacker tries to guess the
random sequence number of TCP packets so that he/she can insert their own packets
into a connection stream. In this way the hacker can supply new corrupt content
between two hosts, while remaining largely anonymous.
Operating System Exploits: All operating systems (Windows NT, Unix, Red hat Linux
etc.) have their own specific vulnerabilities and bugs that need to be resolved by
'patching' the OS in order to keep it up to date. Unfortunately, many system
administrators neglect to do so frequently enough, leaving their systems open to
attack. Hackers, however, are very thorough in keeping abreast of all the possible
vulnerabilities in all operating systems.
FTP (File Transfer Protocol) Bounce Attacks: The main problem with FTP bounce
attacks is that the hacker can use the PORT command in active FTP mode in order to
establish connections with machines other the original FTP server, effectively
allowing the hacker's connection to 'bounce' off the FTP server to another clients
machine.
FTP Core Dumping: FTP core dumping enables the hacker to bring down the FTP
service. A core dump may be stored on an FTP readable area, where it can then be
retrieved in a following FTP session. The first few lines contain the password file that
can be cracked offline. Once the hacker has the password, they can impersonate a
legitimate user and remove, update or delete files at will.
4. Security
4.1 Server-side Security
Internet security can basically be broken into two separate areas: client-side security
(i.e. you and me), and server-side security (web servers, LAN servers etc.). For the
purpose of this discussion I will focus on client-side security, as this is the area that
affects the majority of Internet users.
Server-side security is a large and very complex area, and generally falls within the
domain of the system administrator. Server-side security only becomes a major issue
for the average Internet user when their privacy is violated by sloppy server security,
for example, if their e-mail server is hacked, or the server hosting their web site is
hacked. It is the system administrator's responsibility to ensure that all measures
that can be taken have been put in place to ensure that such eventualities do not
take place.
1. Anti-virus security.
2. Personal firewall.
3. Encryption.
Anti-virus software may also be used to scan your hard disk, floppy disks, zip disks or
CD ROMS. It may also be used to scan attachment files in e-mails, which is one of the
main sources of viruses. The important thing to remember is that new viruses are
being discovered daily, so if you have anti-virus software installed then you need to
make sure that you keep it's library of known viruses up-to-date, otherwise you will
have no protection against the latest batch of viruses.
• Any .exe (executable) files should not be opened unless you trust the
source 100%.
Finally, and most importantly, backup all of your important data onto floppies, zip
disks or ideally CD ROMs. That way if the worse does happen, and you need to wipe
you computer's hard disk (or the virus does it for you!), then at least all of your hard
work is stored in a safe location.
Firewall software acts as a secure barrier between your computer and the outside
world. It monitors all traffic to and from your computer, and decides whether or not
this is normal Internet activity or an unauthorized security risk. To the hacker, firewall
gives the impression of your computer not being there, or at very least being difficult
to locate.
From the above diagram, it is possible to see how a firewall protects your system by
monitoring incoming traffic from the Internet, while at the same time watching for
un-authorized software connections from your computer to the Internet.
Like anti-virus software, there are many brands of firewall software on the market.
Many companies now offer anti-virus and firewall technologies bundled together at a
reduced price, which generally prove to be excellent value for piece of mind.
4.2-3 Encryption
Let us assume that you are infected with a Trojan horse that e-mails off the contents
of your 'My Documents' directory, or your e-mail server is hacked and some of your
e-mail attachments are stolen, your privacy has now been utterly violated, right? But
what if the files that fell into the hacker’s hands were encrypted using a powerful
algorithm combined with long, complex password that the hacker could never crack?
In theory, the integrity of your data should still be secure in this 'worse-case
scenario', provided you have taken these precautions.
The key to data encryption is to choose your passwords carefully, and change your
passwords frequently.
5. Conclusion
The main appeal of the Internet to me is the ability to communicate complex ideas in
a fast, cheap and creative way. This may include e-mail, web design or even chat
rooms and message boards. No other media in the history of the industrialized world
provides such a level playing field, where the individual like you or I may compete
with the giant corporations to have our voices heard online.
I am certainly not saying that the threat does not exist, which would be
irresponsible, but what I am saying is that a level-headed approach should be taken
by all Internet users to protect their privacy and security online, and to ensure that
they educate and inform themselves of the more serious risks involved in
maintaining any kind of Internet presence.
The history of Internet hacking is an on going affair, one that will eventually show the
true meaning of hacking to be to explore and understand, not to destroy and corrupt.
When this ideal is realized, perhaps one-day people will again be able to publicly
declare themselves to be hackers, without the fear of losing their jobs or facing
prosecution.
6. References
Web resources: