Introduction To Hacking
Introduction To Hacking
1. Introduction to Hacking
The Internet, like any other new media historically, provides new methods of engaging in illegal activities. That is not to say that the Internet is intrinsically 'bad', as many tabloid journalists would have us to believe, it is simply a means for human beings to express themselves and share common interests. Unfortunately, many of these common interests include pornography, trading Warez (pirated software), trading illegal MP3 files, and engaging in all kinds of fraud such as credit card fraud. Hacking on the other hand is a greatly misrepresented activity as portrayed by the wider media and Hollywood movies. Although many hackers go on from being computer enthusiasts to Warez pirates, many also become system administrators, security consultants or website managers.
Black-Hat Hackers
This is the more conventional understanding of the term 'hacker', one that is portrayed in newspapers and films as being essentially 'chaotic', an obsessive social misfit hell-bent on the destruction of everything good about the Internet. White-hat hackers often call this kind of hacker a 'cracker', as they spend most of their time finding and exploiting system insecurities. In reality, nobody really fits into either camp neatly. It is down to the individual's set of ethics to decide what path that they will take in their hacking career. Not all of the
activities of white-hat hackers may be legal, while not all of the black-hat hackers activities are illegal, so many shades of gray exist.
Files disappear or are modified unexpectedly Strange files appear or grow in size unexpectedly Hard disk space shrinks without reason The computer slows considerably, or problems appear suddenly Strange messages or dialog boxes appear on the screen The computer starts crashing frequently Programs stop working as expected Your internet connection slows dramatically for an extended period You notice your internet connection is in use, but you are not using it You get a phone call, letter, or email from your Internet service provider or administrator noting strange activity.
3. Hacking Techniques
3.1 Overview of Hacking Techniques
The depth and variety of techniques employed by hackers to illegally enter a computer system are vast, for this reason I intend to provide a brief overview of some of the more common techniques involved, without going into to much detail on any particular technique. Hacking a system is a two-step process, Gathering Information and Launching an Attack.
Port Scanning: A port scanner is a program that automatically detects security weaknesses in a remote system. Scanners are TCP port scanners, that attack TCP/IP ports and services (Telnet or FTP, for example), and record the response from the target. In this way, they learn valuable information about the targeted system such as if whether or not the remote system will allow an anonymous user to log in, or indeed if the system is protected by a firewall. Many hackers simply type large amounts of IP addresses into a port-scanning program and launch random attacks on many users simultaneously, hoping to strike it lucky with that one system that shows a serious weakness. Packet Sniffing: A sniffer is a piece of software that grabs information 'packets' that travel along a network. That network could be running a protocol, such as Ethernet, TCP/IP, IPX or others. The purpose of the sniffer is to place the network interface into 'promiscuous' mode and by doing so, capture all network traffic. Looking into packets can reveal valuable information like usernames, passwords, addresses or the contents of e-mails.
allowing the hacker's connection to 'bounce' off the FTP server to another clients machine. FTP Core Dumping: FTP core dumping enables the hacker to bring down the FTP service. A core dump may be stored on an FTP readable area, where it can then be retrieved in a following FTP session. The first few lines contain the password file that can be cracked offline. Once the hacker has the password, they can impersonate a legitimate user and remove, update or delete files at will.
4. Security
4.1 Server-side Security
Internet security can basically be broken into two separate areas: client-side security (i.e. you and me), and server-side security (web servers, LAN servers etc.). For the purpose of this discussion I will focus on client-side security, as this is the area that affects the majority of Internet users. Server-side security is a large and very complex area, and generally falls within the domain of the system administrator. Server-side security only becomes a major issue for the average Internet user when their privacy is violated by sloppy server security, for example, if their e-mail server is hacked, or the server hosting their web site is hacked. It is the system administrator's responsibility to ensure that all measures that can be taken have been put in place to ensure that such eventualities do not take place.
Anti-virus Software:
Anti-virus software resides in the active memory of your computer, and takes control of your machine to alert you if an active virus is present on your machine. If the software cannot repair the infected file, it will quarantine the file or give you the option of safely deleting the file from your system. Anti-virus software may also be used to scan your hard disk, floppy disks, zip disks or CD ROMS. It may also be used to scan attachment files in e-mails, which is one of the
main sources of viruses. The important thing to remember is that new viruses are being discovered daily, so if you have anti-virus software installed then you need to make sure that you keep it's library of known viruses up-to-date, otherwise you will have no protection against the latest batch of viruses.
Finally, and most importantly, backup all of your important data onto floppies, zip disks or ideally CD ROMs. That way if the worse does happen, and you need to wipe you computer's hard disk (or the virus does it for you!), then at least all of your hard work is stored in a safe location.
file
to
it's
intended
recipient,
and
alert
you
of
From the above diagram, it is possible to see how a firewall protects your system by monitoring incoming traffic from the Internet, while at the same time watching for un-authorized software connections from your computer to the Internet. Like anti-virus software, there are many brands of firewall software on the market. Many companies now offer anti-virus and firewall technologies bundled together at a reduced price, which generally prove to be excellent value for piece of mind.
4.2-3 Encryption
Let us assume that you are infected with a Trojan horse that e-mails off the contents of your 'My Documents' directory, or your e-mail server is hacked and some of your e-mail attachments are stolen, your privacy has now been utterly violated, right? But what if the files that fell into the hackers hands were encrypted using a powerful algorithm combined with long, complex password that the hacker could never crack? In theory, the integrity of your data should still be secure in this 'worse-case scenario', provided you have taken these precautions. Encryption programs basically 'scramble' the original file so that it is unreadable to anyone without the correct password to de-scramble the file. Apart from the many commercial products available, there are many reputable encryption engines available online for free. These allow the user to encrypt all types of data files at will (Word documents, JPEGs, databases etc.), some even allow the user to create selfextracting zipped archives that are also encrypted, which provide an excellent means of transferring important data files via e-mail in a safe and secure way. The key to data encryption is to choose your passwords carefully, and change your passwords frequently.
5. Conclusion
The main appeal of the Internet to me is the ability to communicate complex ideas in a fast, cheap and creative way. This may include e-mail, web design or even chat rooms and message boards. No other media in the history of the industrialized world provides such a level playing field, where the individual like you or I may compete with the giant corporations to have our voices heard online. I am certainly not saying that the threat does not exist, which would be irresponsible, but what I am saying is that a level-headed approach should be taken by all Internet users to protect their privacy and security online, and to ensure that they educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence. The history of Internet hacking is an on going affair, one that will eventually show the true meaning of hacking to be to explore and understand, not to destroy and corrupt. When this ideal is realized, perhaps one-day people will again be able to publicly declare themselves to be hackers, without the fear of losing their jobs or facing prosecution.
6. References
Web resources: of Service: http://www.net-security.org/text/articles/index-security.php Motives: http://www.net-security.org/text/articles/index-security.php Techniques: http://www.securitywatch.com/ Denial Hacker Hacking