19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

16<br />

Part I: Building the Foundation for Ethical Hacking<br />

✓ Flooding a network with too many requests, creating a denial of service<br />

(DoS) for legitimate requests<br />

✓ Installing a network analyzer on a network segment and capturing every<br />

packet that travels across it, revealing confidential information in clear<br />

text<br />

Operating system attacks<br />

Hacking an operating system (OS) is a preferred method of the bad guys. OS<br />

attacks make up a large portion of hacker attacks simply because every computer<br />

has an operating system and OSes are susceptible to many well-known<br />

exploits.<br />

Occasionally, some operating systems that tend to be more secure out of the<br />

box — such as the old-but-still-out-there Novell NetWare and OpenBSD —<br />

are attacked, and vulnerabilities turn up. But hackers often prefer attacking<br />

Windows and Linux because they’re widely used and better known for their<br />

weaknesses.<br />

Here are some examples of attacks on operating systems:<br />

✓ Exploiting missing patches<br />

✓ Attacking built-in authentication systems<br />

✓ Breaking file system security<br />

✓ Cracking passwords and weak encryption implementations<br />

Application and other specialized attacks<br />

Applications take a lot of hits by hackers. Programs (such as e-mail server<br />

software and web applications) are often beaten down:<br />

✓ Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol<br />

(SMTP) applications are frequently attacked because most firewalls and<br />

other security mechanisms are configured to allow full access to these<br />

services to and from the Internet.<br />

✓ Voice over Internet Protocol (VoIP) faces increasing attacks as it finds<br />

its way into more and more businesses.<br />

✓ Unsecured files containing sensitive information are scattered throughout<br />

workstation and server shares. Database systems also contain<br />

numerous vulnerabilities that malicious users can exploit.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!