Welcome! Log In Create A New Profile

Advanced

Pre-Assigment Question 7 - Identifying possible sources of attack

Posted by MoniqueBez 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Pre-Assigment Question 7 - Identifying possible sources of attack
February 16, 2010 07:24AM
Techniques for hacking/cracking:
L0phtCrack (now called LC4)
Sniffer Pro or Etherpeek

Internal Attacks:
May be caused by bringing unaithorized hardware into the office to hack into the company’s security systems.

External Attacks:
1. Web site home page defacing
The attacker goes to a workstation and tries to attack the IIS server with an HTML editing tool. When trying to attack over the Internet to the site, the attacker uses a password generator tool, such as L0phtCrack, which launches a brute force attack against the server

2. Social Engineering
Tricking an unsuspecting administrator into giving the account ID and passwords over to an attacker


The following websites allow you to download tools for hacking:
www.hacker-soft.net/
http://www.brothersoft.com/downloads/hacking-tools.html
http://www.freedownloadscenter.com/Search/hacking.html


Hacking and/or cracking may be prevented by:
1. Audit your organization
2. Set up dummy accounts
3. Use strong/difficult to guess passwords
4. Ensure that you make backups
5. Prevent dumpster diving
6. Check ID’s and question those that you don’t know
7. Educate your end users

It is a positive and negative for hacking tools to be available, negative in a way that it tempts people to give it a try; and positive so that security administrations are aware of the tools that are available and how it works to be able to prevent attacks.
Network administrators should monitor hacking sites, as it will required of them to know what all the latest techniques and tools for use are; to be able to come up with a solution to prevent.
AV
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 16, 2010 10:43AM
It is scary how easy it is to hack into a system.

I have never made a website, so I would like to know more about techniques keeping hackers out - especially if you are using a login name with password type of page.

http://www.cmswire.com/cms/web-cms/how-they-hack-your-website-overview-of-common-techniques-002339.php
Have a look at the above website and let me know what you guys think - it seems almost toooooooo easy

It is great that this type of information is available - makes us more resistant, but the hackers more clever smile
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 16, 2010 02:59PM
I am reading all the stuff u 2 write and actually learn more than from the manual. grinning smiley

Isn't viruses also a source of attack?
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 16, 2010 02:59PM
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 17, 2010 10:42AM
Website:
http://www.happyhacker.org/indexb.shtml

Tools and techniques:
There are a lot of tutorials to download or read on their website. Here are a few names of the tutorials they have available:

- GSM Cellular Crypto Code Breaking Three billion people use GSM cell phones and they don't realize somebody might be snooping on them. Read about Chaos Computer Club hacker Karsten Nohl and his campaign to reveal to the world just how easy it is to crack GSM.
- How to Break into Banks -- Legally (would we lie to you?) Read about how Greggory Peck broke into a bank's computer system, legally.
- Happy Hacker Digests
- Help for Beginners!
- How to write programs -- the hacker way!

Defenses and prevention of techniques:
This site has an area called ‘How to Defend Your Computer’. They give you an easy 7 steps to prevent future infections. They also got links to pages with vulnerability scans to find out how easy it is for hackers to break into your computer. They even have a list of tutorials links on how to defend your computer. So basically they also help people to prevent hacking.

Opinion on availability of hacking instruction:
I think it is a good thing because you can find out what the latest techniques are and how to protect yourself against them. But it is also bad because more harmful hackers can be created daily. Hacking can be harmless fun or a harmful act; it only depends on the person who is hacking.

Administrators monitoring hacker sites:
Administrators must monitor hacker sites. The more you know about hacking the more you can defend your computer and the network your in charge of. Basically you must know your enemy better then yourself.

My Opinion
People are free to do what they want. Hacking is only bad when they destroy someone’s database, network or the information on their computer. It is good that there are websites for hackers because you can find out how to protect yourself better and what techniques are new. Nobody will ever be able to fully stop all the hackers in the world, the only thing you can do is defend yourself.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 17, 2010 03:16PM
71862471_Pretorius Wrote:
-------------------------------------------------------
> Website:
> http://www.happyhacker.org/indexb.shtml
>
> Tools and techniques:
> There are a lot of tutorials to download or read
> on their website. Here are a few names of the
> tutorials they have available:
>
> - GSM Cellular Crypto Code Breaking Three billion
> people use GSM cell phones and they don't realize
> somebody might be snooping on them. Read about
> Chaos Computer Club hacker Karsten Nohl and his
> campaign to reveal to the world just how easy it
> is to crack GSM.
> - How to Break into Banks -- Legally (would we lie
> to you?) Read about how Greggory Peck broke into a
> bank's computer system, legally.
> - Happy Hacker Digests
> - Help for Beginners!
> - How to write programs -- the hacker way!
>
> Defenses and prevention of techniques:
> This site has an area called ‘How to Defend Your
> Computer’. They give you an easy 7 steps to
> prevent future infections. They also got links to
> pages with vulnerability scans to find out how
> easy it is for hackers to break into your
> computer. They even have a list of tutorials links
> on how to defend your computer. So basically they
> also help people to prevent hacking.
>
> Opinion on availability of hacking instruction:
> I think it is a good thing because you can find
> out what the latest techniques are and how to
> protect yourself against them. But it is also bad
> because more harmful hackers can be created daily.
> Hacking can be harmless fun or a harmful act; it
> only depends on the person who is hacking.
>
> Administrators monitoring hacker sites:
> Administrators must monitor hacker sites. The more
> you know about hacking the more you can defend
> your computer and the network your in charge of.
> Basically you must know your enemy better then
> yourself.
>
> My Opinion
> People are free to do what they want. Hacking is
> only bad when they destroy someone’s database,
> network or the information on their computer. It
> is good that there are websites for hackers
> because you can find out how to protect yourself
> better and what techniques are new. Nobody will
> ever be able to fully stop all the hackers in the
> world, the only thing you can do is defend
> yourself.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 17, 2010 03:18PM
Top Ten Web Hacking Techniques

1. GIFAR
(Billy Rios, Nathan McFeters, Rob Carter, and John Heasman)

2. Breaking Google Gears' Cross-Origin Communication Model
(Yair Amit)

3. Safari Carpet Bomb
(Nitesh Dhanjani)

4. Clickjacking / Videojacking
(Jeremiah Grossman and Robert Hansen)

5. A Different Opera
(Stefano Di Paola)

6. Abusing HTML 5 Structured Client-side Storage
(Alberto Trivero)

7. Cross-domain leaks of site logins via Authenticated CSS
(Chris Evans and Michal Zalewski)

8. Tunneling TCP over HTTP over SQL Injection
(Glenn Wilkinson, Marco Slaviero and Haroon Meer)

9. ActiveX Repurposing
(Haroon Meer)

10. Flash Parameter Injection
(Yuval Baror, Ayal Yogev, and Adi Sharabani)

Methods of Attacks
• Dictionary attack
A simple dictionary attack is by far the fastest way to break into a machine. A dictionary file (a text file full of dictionary words) is loaded into a cracking application (such as L0phtCrack), which is run against user accounts located by the application. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job.
• Hybrid attack
Another well-known form of attack is the hybrid attack. A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password. The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on.
• Brute force attack
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password. L0phtcrack can also be used in a brute force attack.
Internal attacks
Internal attackers are the most common sources of cracking attacks because attackers have direct access to an organization's systems. The first scenario looks at a situation in which a disgruntled employee is the attacker. The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.
External attacks
External attackers are those who must traverse your "defense in depth" to try and break into your systems. They don't have it as easy as internal attackers. The first scenario involves a fairly common form of external attack known as Web site defacing. This attack uses password cracking to penetrate the systems that the attacker wants to deface. Another possible password cracking attack is when an attacker tries to obtain passwords via Social Engineering. Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker. Lets take a look at both.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 18, 2010 10:58AM
I see everybody else already mentioned internal and external attacks.

Internal attacks - Internal attackers are the most common sources of cracking attacks because attackers have direct access to an organization's systems.
External attacks -External attackers are those who must traverse your "defense in depth" to try and break into your systems.


There is a lot of possible sources of attack. Here is a few:


Trojan Horse

Trojan horses are programs that pretend to be legitimate software, but actually carry out hidden, harmful functions. An attacker place this software on the target computer using web site, e-mail, embedded within another software package, or force-installed through the compromise of another service running. Trojans are executable programs, which mean that when you open the file, it will perform some action(s). These actions can be with different nature. The most common are of two types:

* The first is a remote control program that would allow the attacker to act as if he were in front of the machine.

* The second is a program that would allow a remote attacker to execute specific commands from the target machine.

Both types take a control over target computer and often use that to make denial of service of other target computer.

Port Scan:

A port scanner is a tool that allows an individual to list the ports on a computer that are listening (available / open). Using a port scanner is usually the first step in determining how to compromise a system, as an attacker needs to know what the potential vulnerabilities of a system are before trying to execute them.

How to prevent hacking:

Access control can be achieved by securing each host or computer, such as a web server, in an organisation.

The better approach is to secure access from the Internet to the internal network of a company. Here access control devices include firewalls, which can take a number of forms.



Sites that explain hacking techniques:

http://www.ibm.com/developerworks/library/s-crack/

http://www.net-square.com/papers/one_way/one_way.html

http://www.foundstone.com/us/education-coursesdescription-ultimate-hacking.asp


I found a site where you can find Hacking catalogs:

http://www.hackerscatalog.com - http://www.hackerscatalog.com/Products/CD-ROMS/Cracking_Software.html

Finding Hacking information on the net is quite useful. Only If you do it trying to assist and not to harm anyone or any system.

I personally feel Network administrators should monitor Hacking sites. Rather be more informed and stay up to date with the latest techniques to prevent damage.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 18, 2010 11:48AM
1.Here are a few hacking tools that i found at http://www.hackerscatalog.com and http://www.hackingalert.com , both Internal and External attacks tools.

IntelliTamper 2.07 - Software tool used to probe websites for possible points of vulnerability and then the hackers attack these points

Backdoor.IRC.Coldlife.30- A programmer places a backdoor in software and then has the hacker has the access he needs to manipulate the program and change the system format , also leaving it open to further attacks.

John the Ripper 1.0 - This is a password cracking tool used to make an algorithmic approach to decrypt the passwords and it's subsequent files. It was ironically designed to improve software strength until the hacker colony got their hands on it.

SpyRecon - Allows the monitoring of a remote system from any place. Everything is then recorded like login details, keystrokes and personal chat conversations.Highly compatible with Yahoo, Aim, Neopets,AOL,Hotmail,MSN and Livejournals.

2. Prevention:
Ensure that the browser and OS are updated. These two entry points are the first to be attacked.
Install a firewall like Windows XP Firewall, Symantec and Zone Labs.
Install Anti-virus software and rollout or install updates timely. eg: Nortan Antivirus
Use Anti-spyware programs to eliminate spyware, examples are Spysweeper, CounterSpy and many more on http://anti-spyware-review.toptenreviews.com/

3.Yes, it is nice to know that there is hacking software so easily available that could be the answer to your problems like a forgotten password but these tools can impact negatively aswell on other people's lives leaving them destroyed, like a hacker who just cleaned out your bank account or ran up your credit card, where does one go from there, OR a Corporate company that just lost millions because their systems came to a dead standstill due to a virus.

4.Yes , network administrators need to be kept in the loop as to what is out there in regard to new hacking trends and techniques. If they know the points of vulnerability that can be attacked maybe there can be some preventative measures that they can persue.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 18, 2010 01:05PM
A few hacking tools that I found were
NetStumbler, it finds wireless signals and are able to gain access to security information.
Kismet, detects wireless network that are not broadcasting SSID's (a sort of password)
Proactive Password Auditor, used to crack passwords. It is also used by companies to audit their own passwords to check if they are safe.

To prevent these techniques from being used for attack on your computer you should not broadcast your SSID, but when it is detected using Kismet you should use encryption or passwords that are cannot be generated using a dictionary. Search the net to find the most up to date software to prevent future hacking and regularly update the software.

I think it is good that the instructions are so freely available. If the instructions are so easy to get hold of, then the solution should be just as easy to find.

Network administrators should monitor hacker sites to an extent where they are aware of what the latest hacker trends are. It could however cause hackers to exclude their info from their sites, which in turn makes it difficult to monitor them in future.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 18, 2010 08:39PM
I found these sites with information on hacking:
wikihow.com/Hack
darknet.org.uk thumbs up smiley
hackthissite.org

You can get step-by-step instructions on hacking. Everything from learning the programming language, cracking the password or authentication process, finding an open vulnerable path and the best part: covering your tracks, like you were never there. Hacking programs are available like WWWhack and Goolag.

There are many security programs and websites available to prevent hacking e.g. google site: NetStumbler, google site: command, Pof v2,

All hacking information should be freely available on the internet. It depends on how you use the information as good hacking skills is necessary to prevent harmful hackers.

I agree with nadiadp that network administrators should monitor hackers, because he/she is responsible for maintaining a reliable network and can prevent the forms of attack that oikanyeng mensioned above.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 19, 2010 09:23AM
Since everybody else has given detailed descriptions of hacking site’s and expainations. I would like to discuss how easy it is to acctually hack something.

When opening google and instering the word hacking, an example of some of the topics that can be found:

Hacking software
Hacking tools
Hacking wireless networks
Hacking for dummies
Hacking tutorials
Hacking passwords
Hacking DSTV
Hacking into facebook accounts
Hacking into facebook
Hacking into a computer
Hacking into mxit
Hacking into computer systems for beginners
Hacking into facebook passwords
Hacking into a cell phone
Hacking into email accounts
Hacking into gmail

You can learn to hack into anything by just searching the net, this is disturbing as nothing is really safe.

On the other hand the following can also be found:

Anti hacking software free download
Anti hacking software
Anti hacking course
Anti hacking programs
Ant hacking laws
Anti hacking tips
Anti hacking group
Anti hacking tools
Anti hacking techniques

My personal opinion is this, if this type of information is so freely available a user who wants to protect against hacking will regularly have to update software and implement new anti hacking teqhniques.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 19, 2010 08:35PM
Hacking Techniques:
GIFAR
Breaking Google Gears' Cross-Origin Communication Model
Safari Carpet Bomb
Clickjacking / Videojacking
A Different Opera

Hacking Tools:
SecuBat – Modular Web Vulnerability Scanner
Nmap v5.20 Released – Open Source Network Exploration & Auditing Tool
Groundspeed 1.1 – Web Application Security Add-on For Firefox
Browser Fuzzer 3 (bf3) – Comprehensive Web Browser Fuzzing Tool
Burp Suite v1.3 Released – Integrated Platform For Attacking Web Applications

How to prevent hakking:
OS Updates
Firewalling
Anti Spyware/Adware

Instructions on how to prevent hacking:
http://www.hackingalert.com

Administrators can if they want but there are a lot of places where someone can learn how to hack and there are books you can buy like the book “Hacking for Dummies”, even if they monitor the sites it won’t matter. There are hackers and there are people and tools that work against hacking, like jin and jang.
Anonymous User
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 20, 2010 09:26PM
HACKING AND CRACKING

a hacker or cracker would be anyone doing the following:

(a) seeks to gain unauthorized access to the resources of the Internet,
(b) disrupts the intended use of the Internet,
(c) wastes resources (people, capacity, computer) through such actions,
(d) destroys the integrity of computer-based information, and/or
(e) compromises the privacy of users.

originally a hacker was a computer genius capable of solving any computer problem using unconventional methods.

tools and techniques include: trojan, backdoor.IRC, john the ripper, NMap and so on. These tools and techniques help hackers and crackers plan attacks on remote systems, and helps them develop other tools for such attacks.

preventing such techniques has become very challenging because of the growing hacker community and the constant breaking of security barriers even in new security systems all the time. however many programs are available to prevent attacks. always have a good and updated security system on your server or pc. use password protection, stay away from doubtful and susceptible sites. always monitor your system and prevent viruses.

the only problem with the internet is that everything is available, the good, the bad and the ugly. it is not desirable at all to have detailed instructions so freely available all over the internet, it tempts people and empowers them in the wrong ways.

yes and no. administrators should monitor hacker sites inorder to keep themselves protected and informed, however, while monitoring such sites, it might leave them vulnerable to attacks because of the lack of concentration on their own networks.
Anonymous User
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 20, 2010 11:12PM
I found the following site for hacking:

http://catb.org/~esr/faqs/hacker-howto.html

*Table of Contents
Why This Document?
What Is a Hacker?
The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved.
2. No problem should ever have to be solved twice.
3. Boredom and drudgery are evil.
4. Freedom is good.
5. Attitude is no substitute for competence.
Basic Hacking Skills
1. Learn how to program.
2. Get one of the open-source Unixes and learn to use and run it.
3. Learn how to use the World Wide Web and write HTML.
4. If you don't have functional English, learn it.
Status in the Hacker Culture
1. Write open-source software
2. Help test and debug open-source software
3. Publish useful information
4. Help keep the infrastructure working
5. Serve the hacker culture itself
The Hacker/Nerd Connection
Points For Style
Historical Note: Hacking, Open Source, and Free Software
Other Resources
Frequently Asked Questions


According to me all the information about hackers, hacking and cracking should not be obtain so easily on the internet. These subjects should be banned on the internet. The easy access to the hacker pages and technologies make the problem of internet security even more severe. Luckily we can also find a lot of information to protect the internet against hackers.
MK
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 20, 2010 11:28PM
There are many hacking tools that are useful for different purposes, many of which have already been mentioned above. But the two most popular tools of the trade attackers use to break into a system are L0phtCrack (now called LC4) and a protocol analyzer (better known as a network sniffer, such as Sniffer Pro or Etherpeek).
The following are the more common techniques used in password cracking: the Dictionary attack, which is the fastest way to break into a machine, the Hybrid attack; and the most comprehensive of them, the Brute force attack.

These techniques can be prevented by putting systems in place that will monitor and fight against intrusion.
A protection checklist, as mentioned by MoniqueBez, can be used to help with prevention. And, (http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitymatters200702.cfm) outlines13 practices for preventing insider attacks and therefore provide an organization with defensive measures that could prevent or facilitate early detection of many of the insider attacks other organizations have experienced.

Yes it is wise and good for such information to be freely available, and for network administrators to monitor hacker sites for the following reasons:
* to keep update with what hackers are up to since hacker tactics and techniques constantly evolve
* to look for security or performance holes in a company's network
* to develop and successfully implement proper policies necessary to prevent attacks.

If the information on hacking tools and techniques was not easily available, then a lot of companies would be disadvantaged as they would have serious intrusion problems.
Nix
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 21, 2010 05:24PM
There are many types of hacking tools and techniques available for download eg. the L0phtCrack (LC4) and the protocol analyzer. The LC4 is a tool that allows an attacker to take encrypted Windows NT/2000 and convert it to plain text. It works by attempting to try and crack passwords. The protocol analyzer (also known as a network sniffer, such as Sniffer Pro or Etherpeek), is capable capable of capturing every piece of data on the network segment to which it is attached. It can "sniff" everything going around on that segment such as logins and data transfers. This can seriously damage network security allowing attackers to capture passwords and sensitive data.

I found 10 tools on netsecurity.about.com : 1) Nessus (vulnerability scanners), 2) Wireshark (packet sniffers- previously known as Ethereal) 3) Snort (IDS - intrusion detection system), 4) Netcat (Netcat), 5) Metaspoilt Framework (vulnerability exploitation tools), 6) HPing2 (packet crafting tools), 7) Kismet (wireless tools or packet sniffers) 8) TCPDump (packet sniffers), 9) Cain and Abel (password crackers or packet sniffers), 10) John The Ripper (password crackers)

I think that this type of information should not be available on the internet at all. All this type of information should be removed. It can cause big problems for many people and businesses, if people can just learn how to hack into pc’s.

I think network administrators should monitor hacker sites because then they’ll be able to put better password protection into place and regular security testing. It’s always better to try and have a lot of protection against hackers.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 21, 2010 06:07PM
Wel where to start, mostly everything is said!!

I also foud these sites, very sceary to think how easy hacking actualy is these days.

www.brothersoft.com
www.freedownloadscenter.com
www.cmswire.com
www.happyhacker.org

I found some techniques that are use for this purpose:
GIFAR
Safari Carpet Bomb
Clickjacling or videojacking
*(for more information on how techniques work visit above mentioned sites)

There are mostly three types of attacks on computers namely:

Break-ins and eavesdropping: they gain access to the network by using various techniques (like those named above) to gain access to acount names and passwords.

Denail of service: they attempt to render a service incapable of providing service to valid users.

Infections: they do not attempt to gain access direct to a network but instead plant computer software like Virusses and Trojan Horses within a network to cause problems inside of the network.
Anonymous User
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 22, 2010 12:00PM
7.I found three main definitions of attack which were:
a Dictionary Attack, which is the fastest form of attack, this attack loads a text file full of dictionary words which find your passwords which are usually simplistic words found in a dictionary to gain access to user accounts and so on.
A Hybrid Attack can crack numbers in passwords aswell as words as like the Dictionary attack , it recognizes patterns as and when one changes the password number in a password, eg: spot1;spot2;
A Brute Force Attack takes longer to work and aims at cracking much more complex passwords, this can take up to a week depending on password strength.

So make your passwords as complex as possible.
vad
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 22, 2010 12:48PM
Task 6A-1

If you are interested in becoming a hacker, go to this web site. Courses are offered on how to obtain this skill, www.hackingalert.com – You can learn how to become a hacker

You need tools to become a hacker. Files can be downloaded from the internet. One example would be:

Name: Password Spy
Function: can read the ******* of password fields

The files you could download are:

1. Brutus
2. Anomailer
3. Netpack
4. Nuke Nabber
5. TSDestroyer
6. Sub7 remover

You are given the URL to the website where this information could be obtained.

The requirement would be that

1. You need a firewall
2. You need the most recent Anti Virus software.

Especially if you are emailing VISA card details per email.

Should Network administrators monitor these hacking websites? Should these websites exists?

The positive: Keeps administrators up-to-date
The negative: The hackers are kept up-to-date.

It is a situation we have to live with. It is like home protection.
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
February 25, 2010 11:37PM
I found an interesting article regarding Hacking Techniques in Wireless Networks at the following site:
http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm


There are many resources devoted to the topic, some it seems for education, development and security purposes, and obviously others devoted to the actual techniques or provision of hacking software:

http://www.evilzone.org/
http://hackaday.com/
http://crack0hack.wetpaint.com/page/How+to+hack+a+website
http://www.hackinthebox.org/
http://www.hackthissite.org/
http://www.progenic.com/top100/
Re: Pre-Assigment Question 7 - Identifying possible sources of attack
March 05, 2010 04:25PM
I foud the following website:

www.thesmarthacking.com

Under hacking methods they have:

- NetBios
- ICMP Ping
- FTP
- RPC STATD
- HTTP

Some people loose a lot of work and info due to viruses, there should be harsh panishment for the creators.

Also someting to look at:

http://www.thesmarthacking.com/howtobecomeahacker.html

There are many many downloads available. I think you must first determine what exactly you want to hack!!


I don't think you will ever stop these guys, but the good one's must be te best to beat the rest.

Some people can use this info for the good, but more security around the info can do just good.

I think network administrators should monitor hacker sites to ensure that they know the trends.
Sorry, only registered users may post in this forum.

Click here to login