Task 6A-1 / Sources of attack
1. websites that explain techniques for hacking into networks / computers
www.hellboundhackers.org
www.ardent-hacker.net
www.schoolofhackers.com
2. Hacking tools and techniques available for download:
2.1 backdoors, sniffers, enryption and password crackers; jammers, ping flooders, worms; dumpsters; data diddlers; numerous step by step ‘how to guides’.
2.2 Hack attacks can be prevented by vigilance and knowledge and regular system and network audits. Using firewalls or intrusion detection systems, highly encrypted / encoded passwords, using security scanning programmes, instituting ‘dummy’ or simulated types of hacks, gateway and address filtering; checking system performance and memory.
2.3 Yes and No. On the one hand it’s not good that hacking tools and information are freely available because they can be, and are, used irresponsibly and maliciously and they create a counter culture that urges hackers to out-hack each other to show how brave, vicious, clever they are. On the other hand, a good saying is “keep your friends close but your enemies closer.†Only by knowing what and how hackers are doing things, can people & companies protect their networks and information.
2.4 Network administrators wouldn’t be doing their jobs properly if they didn’t monitor hack and crack sites. If they are not up-to-date with the latest threats and threat technologies they leave the system open to attack and won’t know how to defend or repair it. However there’s always the risk that an administrator could use this knowledge from within to destroy and damage systems.