Tuesday, September 20, 2011

How Do the Hackers Hack

methods hackers use to attack your computer or network rather jednostavna.Haker seeking vulnerable systems by a demon dialer (which will redial a number until a connection is made) or wardialer (an application that uses a modem to dial thousands of random numbers find another modem connected to a computer).


Another approach used to target computers with permanent connections such as DSL or cable connection, the scanner uses the program in a series of "pings" the IP addresses of networked systems to see if the system up and running. If you have any firewall software, you can see this repeated pings in your log.


Hackers find all of these tools, ironically, on the Internet. The pages contain dozens of free, relatively easy to use hacking tools available for download is easy to find on the Internet. While understanding how these tools work is not always easy, many files include documents written in the local hacker shoptalk.


Among the programs available for scanning programs to detect vulnerabilities on your computer or network and sniffer programs that allow hackers to spy passing data between machines.


Hackers also use the Net to share the list of vulnerable IP addresses - the unique location of the computers connected to the Internet with Unpatched security holes. Addresses of computers that are already loaded with a Trojan Horse are available for anyone to use (in many cases, a computer without the owner knowing ).


Once a hacker is a machine, he uses hacker tools such as Whisker identified in less than a second as the operating system a machine is used and whether there are any Unpatched holes in it. Valves, one of the few legitimate tool used by system administrators to test the security of their systems, also provides a list of exploits a hacker can use to exploit these holes.


There are so many conditions that make life easier for hackers. easier for them to hack into the system. Lax security is one of them -. For example when a company does not use passwords on your system or not to change Windows' default password


In October 2000, hackers broke into Microsoft and browse the source code for the latest versions of Windows and Office after it was discovered that the default password employees never bothered to change.


Other common mistakes: When the system administrators do not update the software with security patches, they leave you vulnerable ports open to attack. Or when you install the expensive system for detecting intrusions, some do not monitored alarms that warn them when an intruder is breaking in


Another boon for hackers is a firewall or router that is misconfigured, allowing hackers to "sniff" of pieces of data - passwords, e-mail, or file -. That pass through the network


When a hacker cracks in the system, his next goal is to take root, or give yourself the highest level of access to stroj.Haker could use a little-known orders to root, or you can search for documents in the system hard disk file or e-mail message that contains the system administrator password.


Armed with root access, he can create a legitimate looking accounts and report whenever you want, without attracting attention. It can also edit or delete system logs to delete all evidence (such as command lines) to gain access to the system.


This is what happened in the TJX case. Hackers broke into TJX customer accounts and stole customers' credit card information. TJX breach discovered five months later, you can read more details about the

0 comments:

Post a Comment