Chapter 4. How Hackers Do What They Do

I l @ ve RuBoard

Early on, hacking required extensive knowledge of systems, networks, and protocols. Gaining unauthorized access required using the knowledge to either manually subvert protocols or to write programs which could exploit flaws. Those days of the hands-on hacker are almost gone.

Today, the process of hacking computer systems has become automated. There are many tools which are easily available to identify and exploit vulnerabilities to compromise a system. The user of these tools does not need to understand what the tool does, only how it works.

Hackers have an amazing arsenal of weapons. Powerful software tools for breaking into networks are freely distributed. They require little knowledge to use, and they can be virtually undetectable until the damage is done. Most hackers carry their own bag of tricks. This "toolbox" will include versions of programs with back doors, programs that will help mask their activities, and programs that exploit known problems. These hacking tools will assist in all areas of hacking: gaining access and privileges, hiding hacker activities, and monitoring the system manager's activities. These tools will vary from simple to extremely sophisticated.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net