This paper I pick up on this website for any just knowledge, by knowing how they (red. "Hacker") then we can be more vigilant about the world of Internet. Hearing the word "hacker", usually directly imaged in the mind of someone with a bold eye and the words are "squirt" (lack of association) that long hours at the computer to try to get into the tissue defense system within the territory of another institution. If the same thing to imagine now, that is in the picture of the mind is the long-haired young man who was staring at the computer while eating snacks, which use all their creativity to be able to "break" defense system of the organization's computer network that becomes the target. Regardless of differences in past and present, there is an impression that often appear in imagining their activities. Visible at a glance what they are doing is sporadic, haphazard, random, unstructured, "trial and error", and so forth.
Basically, they perform the process steps are well-structured activities for effectiveness and efficiency is maintained. EC-Council, a leading institution in the world engaged in the field of information security and Internet sharing measures undertaken hacker in "operate" to 5 (five) consecutive sections from one to another, namely:(I) Reconnaissance;(Ii) Scanning;(Iii) Gaining Access;(Iv) Maintaining Access; and(V) Clearing Tracks.
Reconnaissance
The definition of "reconnaissance" is a preparatory stage in which hackers or those who would do the "attack" trying to find as much information about the target or the target system to be attacked before the series of processes carried out the attack. There are two types of reconnaissance of the known models, namely the passive and active. Related businesses is said active when there is no direct interaction between the attacker to the target or targets to be attacked. Let's say a hacker who wants to attack a bank, then the concerned will conduct studies to learn through the library or browse the internet about the ins and outs of the system who want to be attacked. By getting references from various sources such as articles, magazines, newspapers, vendor releases, and so forth - are not uncommon in question can know what type of computer system used by the relevant bank, complete with the type of operating system and network topology. While said to be an active process related, if done directly with the interaction activity or system-related stakeholders in the bank. For example the hacker to pretend like to open a bank account so it can learn the computer system operated by the customer service, help desk or call the bank to look at the mechanisms and procedures used in answering the needs of customers, or by visiting the bank's Internet site linked to look and guess who is behind the technology application, and so forth.
Scanning
After learning the ins and outs at a glance about the environment and the characteristics of the target system to be attacked, then the next step is to do a "scanning". In accordance with the definition and context, "scan" is a process in which hackers using various tools and tools trying to find loopholes in or the location where the attack would be launched. Just as a thief who can get into the house through doors, windows, roofs, or underground culverts, a hacker through this activity trying to find the holes of vulnerability where incoming attacks. Normally, that would be scanned first is the port in computer systems (port scanning), or by mapping a network (network mapping), or through a search of vulnerability / fragility (vulnerability scanning), and so forth. Things that need to be carefully noted is that the act of "scanning" of the computer network system is basically the property of others is an activity that violates the law, unless the parties consent berkepentingan1. And if not careful, then the parties will easily find out these activities, particularly if the devices concerned have IDS (Intrusion Detection System) that can detect the event of an intrusion or intrusion of outsiders into the protected system. The results of the discovery phase of scanning is a way for hackers to get into the system.
Gaining Access
If the two previous phases of reconnaissance and scanning still "passive", in the sense of the word that the activities undertaken are still groping just wanted to attack the system reliability, Gaining access to the stage of active penetration of these efforts began to be implemented. Basically done by hackers is to exploit the weakness, vulnerability, and / or vulnerability exists on the system. How to get access is extremely diverse, depending on the characteristics and results of the scanning process before. For example, is to do with trying to guess the password cracking alias to "impose" the secret key that allows hackers to obtain access rights to enter into the system. The other type is an activity that leads to the phenomenon of buffer overflows so that confidential data should be stored and retrieved securely accessible by unauthorized. Gaining access other approach is to do what is called as an alias perform session hijacking hijacking a person's right of access by hackers, so the question may be entered into the system that is not a territory. The process of obtaining permissions can take place in a relatively short time to take a relatively long, depending on the number of factors, such as: network architecture and configuration, type of operating system used, hackers expertise is concerned, the type of tool or tools are used, and so forth. If a hacker has managed to get to this stage, it exposes the risks facing the organization or institution that has a related system has been so high. Experiments failed to detect this would be disastrous big enough for the question.
Maintaining Access
This stage is a period where after hackers managed to get into the system, which concerned trying to stay afloat obtain these permissions. At the moment this is often termed the existing system has been successfully taken over by unauthorized parties (read: compromised). When this period lasts, the control entirely in the hands of hackers. Concerned can do whatever he wants, like doing things that are harmless - like writing a warning message to the owner of the system - to perform a destructive action, such as stealing data, changing the content, applications to plant spies, mess up the configuration, manipulating information , damaging the contents of the hard disk, and so forth. Not much can be done by the owner of the system if a hacker has entered this stage, except for measures that sought to counter the negative impact or effect caused hackers can be suppressed to a minimum.Image: Type Attack Athletics to the System
Covering Tracks
Finally, the final stage which is difficult and often overlooked by hackers - for reasons hastily, carelessly, or lack of expertise - is the removal of trace activity. Said to be difficult because in addition to many things to be done by hackers and quite time consuming, law enforcement always has a way to find out traces of criminal negligence as these hackers. To be able to trace the elimination of almost "perfect", but requires no small amount of resources, knowledge and expertise is also needed to prime the hacker in question. The track record shows that of the various types of hacking crimes in the world, rarely are the perpetrators are rarely revealed and the mode. Various types of deletion trail is widely known among hackers, such as steganography techniques, tunneling, altering log files, and so forth.
By knowing the stages of the hacker is then expected to operate the computer and network security practitioners understand well the Internet exposes the complexity of the process and the risks faced everyday. The more in a hacker entered into a series of related processes, the higher the risk of threat faced by potential victims concerned.
0 comments:
Post a Comment