Welcome! Log In Create A New Profile

Advanced

Task 6A-1

Posted by Gassie 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6A-1
July 16, 2007 02:56PM
Objectives: To learn what types of attacks on network security can be performed by someone with bad intentions, a little bit of information, and a lot of free time.

Question 1: Web sites that explain techniques for hacking into networks and other computers

http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm
www.hackerscatalog.com/Products/Books/Password_Hacking/index.html
http://search.techrepublic.com.com/search/hacking+tool.html?t=5&s=0&o=0
http://updates.zdnet.com/tags/Hacking.html?t=5&s=0&o=0

Question 2: Discuss the following:

i) What sort of hacking tools and techniques are described or readily available for download?

Configure and manage Trusted Platform Module (TPM) Services to secure a Microsoft Vista system
Master the principles of computer security
Looking to hack your cable modem? First build your own console cable in seven easy steps
Bulletproof your organization against Google Hacking: Assess your vulnerability to these ten simple security searches


ii) How do you suppose these techniques might be prevented?

You will never be able to prevent these techniques because there will always be someone that tries to enter other people’s networks and PC’s. The inquisitive mind of a human.

iii) Is it good that such detailed instructions are so freely available on the Internet?

No, it is not because you get young teenagers that’s interested in computers that will try anything. They don’t know much about hacking yet, but they will try the script just to see what happens and unfortunately sometimes it leads to big problems.

iv) Should network administrators monitor hacker sites? Why or why not?

O yes, they have to monitor the hacker sites because they have to be updated of all the new ways of hacking their networks.
Re: Task 6A-1
July 18, 2007 07:27PM
Task 6A-1

Question 1: Find websites that explain techniques for hacking into networks and other computers
How to become a Hacker: www.catb.org/~esr/faqs/hacker-howto.html
Hacker - Wikipedia, the free encyclopedia: en.wikipedia.org/wiki/Hacker
Mozilla Hacking In A Nutshell: www.mozilla.org/hacking/
Open Directory - Computers: Hacking: dmoz.org/Computers/Hacking/
Hack This Site!: www.hackthissite.org/

Question 2:
i) What sort of hacking tools and techniques are described or readily available for download?
Hack This Site!: www.hackthissite.org/:
“Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills. More than just another hacker wargames site, we are a living, breathing community with many active projects in development, with a vast selection of hacking articles and a huge forum where users can discuss hacking, network security, and just about everything. Tune in to the hacker underground and get involved with the project.�
How to become a Hacker: www.catb.org/~esr/faqs/hacker-howto.html
“Basic Hacking Skills
1. Learn how to program.
2. Get one of the open-source Unixes and learn to use and run it.
3. Learn how to use the World Wide Web and write HTML.
4. If you don't have functional English, learn it.
Status in the Hacker Culture
1. Write open-source software
2. Help test and debug open-source software
3. Publish useful information
4. Help keep the infrastructure working
5. Serve the hacker culture itself�

ii) How do you suppose these techniques might be prevented?
I think as soon as you solve one way, another way will be invented by the hackers. One will never me able to totally eliminate the problem of hacking. These guys are among the most intelligent pc wizard in the world.

iii) Is it good that such detailed instructions are so freely available on the internet?
No, it’s a free guide to “do it yourself�. Youngsters are “trained� to become criminals. Secrets of the trade are published for anyone to see. But on the other hand, this way network administrators can keep updated on the “know how� of the hackers. What kind of skills and techniques they have mastered.

iv) Should network administrators monitor hacker sites? Why or why not?
Yes, I think it’s critical that they keep themselves updated with the hacker’s techniques and skill trends. They need to be a step in front of them. We all realize there are always risks and therefore security needs to be updated on a constant basis.
Re: Task 6A-1
July 21, 2007 08:12AM
There are hacking tools such as a backdoor hacker which allows a hacker to enter your pc through a backdoor in your operating system such as an administrator’s port that is not protected by firewall. The only way to prevent this is by getting your operating system’s security updates which blocks those backdoors from unauthorized access. It is not a good thing that these instructions are so readily available but there is no way of stopping it, anybody can register for web space and host there own hacking website at least the developers of antivirus programs and operating system programs can view themselves how the hackers bypass their software and provide ways to stop them. I think network administrators should monitor hacking website to see if there websites are vulnerable and maybe find ways to stop hackers hacking into their servers and causing malicious damage
Re: Task 6A-1
July 25, 2007 07:34PM
Ultimately no website can teach you how to effectively hack into any system for which you are unauthorized to enter. Basically all they teach you are tips to hack into systems or servers that are NOT sufficiently protected. The easiest example of this is an FTP server on which only certain directories are password protected. In essence all you are doing is exploiting your target's lack of thoroughness due to security holes.
Re: Task 6A-1
August 07, 2007 02:20PM
Techniques:

Dictionary attack
A simple dictionary attack is by far the fastest way to break into a machine. A dictionary file (a text file full of dictionary words) is loaded into a cracking application (such as L0phtCrack), which is run against user accounts located by the application. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job.

Hybrid attack
Another well-known form of attack is the hybrid attack. A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password. The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on.

Brute force attack
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password. L0phtcrack can also be used in a brute force attack.

I actually found a course you can do in hacking - quite shocking! GIAC Cutting Edge Hacking Techniques (GHTQ). It's a certificate course.

Prevention:
In the first place,techniques shouldn't be avaialble for anyone to see on the internet. I suppose only the internet security experts can really do something, they should keep their security methods up to date with the latest attacking techniques.

It's definitely not a good thing that instructions are so readily available, this means anyone can become a hacker or cracker.

I don't really know how well network administrators would be able to monitor the sites. But if there are sites that give such clear instructions that anyone can understand and use them, I think those sites should be banned. It can't be legal to help people get hold of things like other people's credit card details or even personal information.
Re: Task 6A-1
August 13, 2007 02:22PM
This website http://www.hackingalert.com/hacking-articles/website-hacking.php gives one step-by-step instructions, such as:

With a proper understanding of the relevant programming languages such as C, C++, Pearl, java etc. one can be fully equipped with the technique of hacking into website.

There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from.


The first step is to clean up the tracks and happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure.
They also have links to:

-Website Hacking
-Mobile Phone Hacking
-Email Hacking
-Credit Card Hacking
-Password Hacking
-Hacking Google
-Linux Hacking
-Google Hacking and Prevention
-Game Hacking
-Black Hat Hackers
-Online Hacking Games
Sorry, only registered users may post in this forum.

Click here to login