Internet Security and Ethical Hacking

Internet Security and Ethical Hacking

Welcome to the unique confluence of hackers , crackers and security professionals
on the world wide web.
This is your complete resource for internet security and ethical hacking.

Ethical Hacker -: The Ethical Hacker :-
Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.


WELCOME TO ALL VISITORS

PLEASE BOOKMARK THIS BLOG FOR DAILY UPDATES. FOR HACKING TIPS GO TO COMPUTER SECTION. FOR MORE INFORMATION CONTACT US .
Your Ad Here

SEARCH FROM HERE

Sunday, November 15, 2009

-: Privacy Attacks :-

-: Privacy Attacks :-


Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:

1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.

Most Trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete control over target computer.

Net bus, Girlfriend, sub7, Beast, Back Orifice are some of the popular Trojans.

2) Key logger :- Key loggers are the tools which enable attacker to record all the keystrokes made by victim and send it's logs secretly to the attacker's e-mail address which is previously set by him.

Almost all the Trojans have key logging function.

Use of latest updated antitrust-firewall, detect the presence of trojan and remove it permanently.

3) Spy ware :- Spy ware utilities are the malicious programs that spy on the activities of victim, and covertly pass on the recorded information to the attacker without the victim's consent. Most spy ware utilities monitor and record the victim's internet-surfing habits. Typically, a spy ware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spy ware becomes active on the victim's system.
Spy ware tools can be hidden both in .exe files an even ordinary cookie files.
Most spy ware tools are created and released on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also use spyware tools for corporate espionage and spying purposes.

4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting network problems.
The Ethernet based sniffer works with network interface card (NIC) to capture interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.



Recommended Tool


SNORT® is an open source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks. Snort can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort is comprised of two major components: (i) a detection engine that utilizes a modular plug-in architecture (the “Snort Engine”) and (ii) a flexible rule language to describe traffic to be collected (the “Snort Rules”).

The Snort Engine is distributed both as source code and binaries for popular Linux distributions and Windows. It’s important to note that the The Snort Engine and Snort Rules are distributed separately.

We strongly recommend that you keep pace with the latest production release. Snort is evolving all the time and to stay current with latest detection capabilities you should always have both your Snort engine and ruleset up to date.

1 comment:

ASK YOUR QUESTIONS


Your Name
Your Email Address
Subject
Message
SEND YOUR IDEAS
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

 
Home | About Owner | Tutorials | Freebies | About Us | Contact Us

Copyright © 2009 CYBERWORLD |Designed by 13551421 143 Templetemo |Converted to blogger by Dark Master