Thursday, July 13, 2006

Anatomy of Computer Hacking Over The Internet - Part Deux

Anatomy of Computer Hacking Over The Internet - Part Deux

Just to pick up on a long forgetten past blog post, I talked about reconnaissance in Internet hacking.

Using the analogy of an apartment, the street address is similar
to your computer's Internet address. And your Internet software
programs have "ports" like apartment suite numbers. I then compared
a hacker's reconnaissance to a stranger rattling apartment door
knobs to find weaknesses.

Today we'll look at what happens after the wily hacker's finished
scanning for possible target computers. He's got addresses, and
he's identified open ports at those addresses. Now he must gather
more information about his potential target.

He's like a stranger who has a list of possible addresses and
apartment suites to burlarize.

But before he does anything... he must do some homework.

After scanning the Internet, the hacker might probe the responsive
addresses some more -- more door rattling.

He's looking for clues about the software running on that target
computer. Even better if he can find out which make, model and
version is running. That way he just has to look up public
information about the software's known flaws. It's worse when the
hacker has his own private tricks to exploit software -- but those
type are less common.

The hacker might even dig into who owns that address, to find out
how juicy the target might be. He wants to know what might be
inside the computer. Any information is good for hacker.

Going back to the apartment analogy, the stranger's wandered the
apartment block to look for suites to break into. He takes notes
about the weaknesses at each door. He'll want to know... is there a
big dog inside? What sort of frame, hinge and lock is on the door?
Are there any signs of alarm systems? What type of alarm? Where are
the getaway exits? And on and on.

He then researches everything from who lives in the suite to
weaknesses around the suites. Then when he knows enough to exploit
the weaknesses, he returns with the right break-in tools... for the
attack.

Before he's back, you might not even notice he's been around - but
you can take protective steps, which I'll discuss after Part 3.

Meanwhile, stay tuned for the next issue when we explore Part 3
of The Anatomy of Computer Hacking Over The Internet.

Have wonderful Thankgiving holiday (if you're down south of the
border).

Until next time, be smart and stay safe.

== Henry Tom

0 Comments:

Post a Comment

<< Home