Hacking Part 1

Hacking Part 1 - Hacking is a practice done by the samurai...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Hacking is a practice done by the samurai warriors aptly named 'Consultants' securing the information infrastructure of the future. With more patience and persistence than any real technical skill they pound for minutes on end configuring their networks and manipulating webs of other LANs laying LAN mines for future warriors to find and conquer that gauntlet of challenge kept alive in the unending game of cat and mouse. The nine steps of Hacking are Reconnaissance/Discovery, Scanning, Enumeration, Penetration, Penetration, System Elevation, Network Elevation. Expansion, and Housekeeping. The first step is to decide the target you want to hit. It maybe the guy across the street, or the guy in your class that really perturbs you but really do not want to physically hurt him and also you want to play a practical joke on him without him ever finding out that it was you. With that known you can get probably enter the next step. For example, if the target were a person across the street you can probably sniff your community cable network segment traffic and intercept packets for purposes I will explain for later. You can probably try to intercept network traffic through war driving, but that will be explained later. For public institutions like companies and education centers like universities you can go ICANN and do a reverse DNS lookup and find out the publicly available IP addresses allocated to that company. Those different address ranges are the point of your attack. If you are confused with all the technical jargon I just wrote down I will explain each part now. To sniff is have a program sitting on your computer look beyond your computer, possibly your own home network and analyze how your target is surfing the internet, transferring information in his own network and the like. You are asking the question: Why do you need to sniff the traffic, can't you just get into his network? Sometimes you can but in 99.9% of the time you can't. By default, most networks even home networks with file sharing turned on is secure from the ordinary user to stumble upon his/her files residing on her computer. Also, because most Operating Systems, the control center that run your home computer like Windows XP, have built in firewalls an outsider can not readily impersonate a workstation in home network, because without being physically connected to the router, switch, or hub you won't have an internal local address like 192.168.8.xx. Sniffing traffic is a method of gathering enough outgoing and sometimes ingoing information that you can get access to their network. Let's start off; DSL is more secure than Cable internet access. In Cable the whole
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/07/2008 for the course ENGL 220 taught by Professor Blah during the Spring '08 term at CUNY Hunter.

Page1 / 4

Hacking Part 1 - Hacking is a practice done by the samurai...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online