lab6 - ab 6 Lab 6 Hacking Techniques(Part I y By lan S H...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ab 6 Lab 6 Hacking Techniques (Part I) y By lan S H Lam Alan S H Lam IEG 7006 (2010) 1 ab 6: Hacking Techniques Lab 6: Hacking Techniques Outlines • he Threats The Threats • Classes of Attackers • How they hack in • Stealth and decoy port scans • Buffer Overflow xamples of remote root exploit through • Examples of remote root exploit through buffer overflow IEG 7006 (2010) 2 ab 6: Hacking Techniques Lab 6: Hacking Techniques The Threats Hacking Tools become more and more sophisticated and powerful in term of - Efficiency - Distributing - Stealth utomation - Automation - User friendliness IEG 7006 (2010) 3 IEG 7006 (2010) 4 IEG 7006 (2010) 5 IEG 7006 (2010) 6 IEG 7006 (2010) 7 IEG 7006 (2010) 8 IEG 7006 (2010) 9 IEG 7006 (2010) 10 ab 6: Hacking Techniques Lab 6: Hacking Techniques The Threats These hacking tools could be easily download from the Internet => - Hacker tool ability increases - Knowledge of crackers decreases - Population of crackers increases - Some day, even elementary school kid may hack into your system IEG 7006 (2010) 11 ab 6: Hacking Techniques Lab 6: Hacking Techniques The Threats Your host does not need to be as famous as ahoo or ebay to be targeted yahoo or ebay to be targeted hey need a place to hide their trace - They need a place to hide their trace - They need your host as a stepping stone to hack ther sites other sites - They need your host resource to carry out their activities, such as building their Zombie Army IEG 7006 (2010) 12 ab 6: Hacking Techniques Lab 6: Hacking Techniques The Threats • Your host security weakness can be identified by scan tool • Security of any network on the Internet depends on the security of every other networks • No network is really secure he trends • The trends • Hacking activities become more and more common oor management networks will become the crackers • Poor management networks will become the crackers playground IEG 7006 (2010) 13 ttack Trends (1) Attack Trends (1) 1. Automation; speed of attack tools - Scanning for potential victims . ompromising vulnerable systems - Compromising vulnerable systems . - Propagate the attack . - Coordinated management of attack tools . 2. Increasing sophistication of attack tools - Anti-forensics. - Dynamic behavior. - Modularity of attack tools . IEG 7006 (2010) 14 ttack Trends (2) Attack Trends (2) 3. Faster discovery of vulnerabilities 4. Increasing permeability of firewalls 5. Increasingly asymmetric threat 6. Increasing threat from infrastructure ttacks attacks - Distributed denial of service (DDOS) - Worms - Attacks on the Internet Domain Name System (DNS) ttacks against or using routers - Attacks against or using routers IEG 7006 (2010) 15 ttack Trends (3) Attack Trends (3) Potential Impact enial of service • Denial of service • Compromise of sensitive information • Misinformation ime and resources diverted from other • Time and resources diverted from other tasks IEG 7006 (2010) 16 The Top Cyber Security Risks (2009)...
View Full Document

This note was uploaded on 05/18/2010 for the course INFORMATIO IEG7006 taught by Professor Unknown during the Spring '10 term at CUHK.

Page1 / 88

lab6 - ab 6 Lab 6 Hacking Techniques(Part I y By lan S H...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online