Home ] Up ] Games ] EL3209 ] Introduction ] Latest Update ]

 

 

Under Attack -- What hackers know will harm you: A manager's guide to 'Net Hacking 101'

Kelly Jackson Higgins

(InternetWeek: March 10,1997, Issue: 653, Section: Feature -- Web Commerce: Security)

Summary

   This article gives ample information on how hackers hacked into websites and what tools they use to commit the cybercrime.

   With more users on the Net, there are more bad guys online too. Hence the surge in security breaches. However, only about 5 percent of the hackers write their own code and understand the details of infiltration of a system or network. The rest of the hackers mainly only know the basic hacking code through hacking websites. Hackers tend to be wanna-bes, grabbing something and running with it. They are fad-conscious too. They copy from the mode of attack which has attracted the attention of the media.

       

   Some of the ways and tools used by the hackers:

    IP spoofing used by Kevin Mitnick to infiltrate networks at Netcom Inc. in 1995

    Fake website set up by hackers to lure users in hope of stealing their credit card numbers or other information.

    CGI Packet Handling Function (PHF)                                  

    Password Sniffing                                                                        

    Synchronized number sequence (SYN) Flood                    

    Ping o' Death                                                                        

    Domain Name Service hijacking                                            

   Ways of counteracting these attacks have been given in the article.