Welcome! Log In Create A New Profile

Advanced

Task 6A-1

Posted by Lizelle Burger 
Announcements Last Post
Announcement myUnisa availability 21 to 24 March 2019 03/17/2019 02:24PM
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6A-1
February 19, 2008 12:31PM
1. Websites related to hacking into computers and other networks are as follows:
www.hackingalert.com
www.phaster.com/hacking_faq.shtml
www.datastronghold.com/security-articles/hacking-articles/hack-into-windows-network.html
www.logophilia.com/jargon/jargon_toc.html
www.houghton.demon.co.uk/hacking/document/index.htm
www.thecodex.com

2. Hacking Tools:
Hackers use a variety of tools to attack a system. Each of the tools we cover in this
article have distinct capabilities. We describe the most popular tools from each of the
following categories:
• Port scanners - Network Mapper (Nmap). Scan large IP spaces and report on the systems they encounter, the ports available, and other information, such as OS types.
• Vulnerability scanners – Nessus. look for a specific vulnerability or scan a system for all potential vulnerabilities
• Rootkits - set of scripts and executables packaged together that allow intruders to hide any evidence that they gained root access to a system.
• Sniffers - Sniffer Pro or Etherpeek: these are protocol-analysers (aka network sniffer). This tool makes is possible to capture every piece of data on a network segment that it is attached to.

Hacking Techniques:
Usually there are 2 scenarios that take place – either the hacker is an internet user or the hacker is an employee – in both cases the individuals are after information that they would not normally have access to. The tools described above are used to gain this info.

Measures that can be taken to prevent hacking:
• OS Updates: ensure that your computer software is up to date. Hackers target Operating Systems and Web Browsers.
• Firewalls: Install firewalls and antivirus onto your computer
• AntiSpyware/Adware: install this software to prevent people picking up information from your database.
• Employee Internet Policy – ensure that a comprehensive employee Internet policy is signed by all employees to control their internet usage, eliminate spam email, and enforce appropriate use of the companies email and internet.

It is unfortunate that details regarding hacking are so readily available on the internet. It opens doors for people to explore the tools and techniques and enables them to implement them. This is a major security concern on all levels.
However, there are just as many details and websites dedicated to informing the public about hacking, providing prevention techniques and keeping the public up to date with the latest prevention software etc.

I think it is important for network administrators to monitor hacker sites as well as the sites dedicated to the prevention thereof. This will keep them informed of the latest trends and keep them aware of the risks involved and allow them to take the necessary preventative measures to protect and secure their networks.
Sorry, only registered users may post in this forum.

Click here to login