Welcome! Log In Create A New Profile

Advanced

Task 6A-1 - Hacking

Posted by Fireblade 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6A-1 - Hacking
July 20, 2006 03:21PM
You know, the funniest versions of hackers have got to be the l33t h4x0rz, the ones who th1nk th3y c4n d0 anyth1ng 0n d4 1nt3rn3t. Anyway, before visiting hacking sites, make sure some solid virus protection is enabled on your system as many of these sites contain viruses embedded into the site code than do all sorts of damage.

Anyway, hacking takes on literally thousands of variations, including the following:

*Backdoor access (using or creating a loophole in the system in order to easily access it again and again, thus creating a back door)

*Logic bombs: Malicious Code left behind by a programmer that can be activated by the trigger of an event, e.g. The programmer gets fired, so the code is set to trigger 4 months after the date of his leave. This can do anything from delete files to leave access wide open for any other hackers.

*Viruses, worms etc.: As we all know, these are programs out to mess up data. Viruses usually only damage the resident computer. Worms themselves are self-propagating and don't need to be contained in any files to function. They typically replicate themselves through e-mails, effectively spreading themselves so much that they can chew bandwidth and slow down computers. Worms were originally designed to find idle computers on a network and assign them tasks.

*Rootkits: This software fundamentally changes the OS software, which basically acts as a cloak against things the computer shouldn’t be doing. For example, the Sony/BMG rootkit of 2005 installed itself whenever a Sony music CD was played on a computer, and routinely contacted a server “to ensure CD copy protection�. Detection is difficult, as the Operating system itself no longer provides reliable information (requesting a list of processes means Windows will then not include the rootkit in operation)

Many programs allow users to create backdoors, viruses, in fact pretty much any program they wish. While information is common on the Internet, a lot of it is supplied by “$20 CDs� and even more of it is from the early 1990s, which is mostly useless against today’s security measures.

The bottom line is, the more people creating the viruses, the quicker we’ll have new ideas to be stamped out by antivirus companies.

A simple Trojan creation technique is through batch files; simply create a batch file that masquerades as a useful program, or in fact the program you’re actually trying to open, except include code for the program to open itself, and then loop that infinitely. Basically, all you’ve done is make the program re-open copies of itself thousands of times a minute, until the system can’t handle the load and it crashes.

Program opens itself: now there are 2 programs running. Those 2 programs open themselves, now there’s 4 running. 4 opens 8, 8 opens 16, 16 opens 32… You get the picture. Opening a program with a 5kb size isn’t significant, but having 3000 of those programs running simultaneously can kill a system in 30 seconds. (I tried it one day in a Grade 12 Computer science exam, and used it to find kids who were downloading porn with accompanying viruses that damaged the network; by disguising the program as porn in the secret hiding folders they used, anyone who said “HEY MY COMPUTER JUST CRASHED� got sent straight to detention. Quite fun.)

The only way to stop these attacks is to have good virus programs (Norton, McAfee) with accompanying Spyware protection, Firewalls, and Intrusion Detection measures. Administrators need to monitor these sites to stay one step ahead of the competition.
Re: Task 6A-1 - Hacking
July 20, 2006 11:55PM
The only way anyone[average joe] can protect his/her privacy when it comes to computer/internet security is using a decent anti-virus program such as Norton Internet Security/Norton Anti-virus.

Hacking techniques should not be displayed or given so freely on the internet; they may as well include how to rob a bank(which actually exists). However, in most media types things that are found to be offensive in any manner are accepted by society quite freely.

Personally, I think that since things like this should be monitored very closely. Although, the internet is made available to so many people that it becomes economically infeasible to monitor everyones behaviour.

You find that society does take preventative measures against things like this such as gun licenses, age restrictions and with the case of hacking, anti-virus programs.
Re: Task 6A-1 - Hacking
July 22, 2006 11:32AM
Making hacking techniques available online is obviously not a good thing, even though not all hackers are malicious. The reality is that even if a hack is not intented to do damage, it still involves getting unauthorised access to someone else's property, i.e breaking and entering.

On the other hand, anti-virus companies can actually gain from using the online info to extend their software to eliminate any new threats. So it's not all bad...[/b]
Re: Task 6A-1 - Hacking
July 25, 2006 07:38AM
I also found this quite interesting. I didn't realise that this kind of information was so readily available on the internet. This could give some peaple the wrong ideas and encourage them to try it out. I found these definitions to distinguish between a hacker and a cracker:

• A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Most often, hackers are programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They may know of holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data.
• A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent. Crackers, having gained unauthorized access, destroy vital data, deny legitimate users service, or basically cause problems for their targets. Crackers can easily be identified because their actions are malicious.

Sites like www.darknet.org.uk and www.illegalword.com can be used for information.

To protect the servers from these techniques all known hacking and cracking addresses should be restricted.
Firewalls now comprise the most commonly accepted method of protecting a network and, for the most part, seem to be impenetrable when attacked by 95 percent of the cracking community.
Sorry, only registered users may post in this forum.

Click here to login