Thursday , 2 July 2020
Home / IT Security / Black Hat (page 10)

Black Hat

Social Networking and Information Gathering

Social Networking and Information Gathering

Social Networking and Information Gathering: One of the best sources for information is social networking. Social networking has proven not only extremely prolific but also incredibly useful as an information-gathering tool. A large number of people who use these services provide updates on a daily basis. You can learn not only what an individual is doing but also all the …

Read More »

Intrusion Prevention and Intrusion Detection Systems

Intrusion Prevention and Intrusion Detection Systems

Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profits—as in no profit at all. It should be common sense, but consider this: if instead of tiptoeing around a network, you …

Read More »

Hacking: Generic Example of Cyber Crime

Hacking: Generic Example of Cyber Crime

Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here are some generic examples of cyber Crime:   Stealing passwords …

Read More »

Hacking: Fun or Criminal Activity?

Hacking: Fun or Criminal Activity?

Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here’s a look at some famous hacks over …

Read More »

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, spam, spyware, adware, and even rootkits. Although they have long …

Read More »

BRUTE FORCE AUTHENTICATION ATTACKS

BRUTE FORCE AUTHENTICATION ATTACKS

Brute Force Attacks: Authentication actually takes place in many other parts of the web application other then the main login page. It is also present when you change your password, update your account information, use the password recovery functionality, answering secret questions, and when you use the remember me option. If any of other authentication processes in flawed, the security …

Read More »

Operating System Command Injection Vulnerabilities

Operating System Command Injection Vulnerabilities

O/S Command Injection Vulnerabilities: Another attack vector that is part of injection is operating system command injection. This occurs when a hacker is able to dictate what system level commands (commonly bash in Linux or cmd.exe in Windows) are run on the web server. In most cases, a hacker will append on a malicious system command to an existing command …

Read More »

EXTRACTING INFORMATION FROM E-MAIL SERVERS

EXTRACTING INFORMATION FROM E-MAIL SERVERS

E-Mail Servers: E-mail servers can provide a wealth of information for hackers and penetration testers. In many ways, e-mail is like revolving door to your target’s organization. Assuming your target is hosting their own e-mail server, this is often a great place to attack. It is important to remember. “You can’t block what you must let in.” In other words, …

Read More »

Using a Sniffer – Sniffer Tools

Using a Sniffer

Using a Sniffer: We touched on some of the basics of using a sniffer in the previous section, but now let’s get down and dirty. Quite a few sniffer software packages are available that perform nearly identical functions.  The real advantage of one over the other is the robustness of functionality in how the sniffer displays that data and what …

Read More »

Planting a Backdoor – Using Netcat

Planting a Backdoor

Planting a Backdoor: There are many ways to plant a backdoor on a system, but let’s look at one provided via the PsTools suite. This suite includes a mixed bag of utilities designed to ease system administration. Among these tools is PsExec, which is designed to run commands interactively or noninteractively on a remote system. Initially, the tools may seem …

Read More »