19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

32<br />

Part I: Building the Foundation for Ethical Hacking<br />

Hacking in the name of liberty?<br />

Many hackers exhibit behaviors that contradict<br />

their stated purposes — that is, they fight for<br />

civil liberties and want to be left alone, while<br />

at the same time, they love prying into the business<br />

of others and controlling them in any way<br />

possible. Many hackers call themselves civil<br />

libertarians and claim to support the principles<br />

of personal privacy and freedom. However,<br />

they contradict their words by intruding on the<br />

privacy and property of others. They often steal<br />

the property and violate the rights of others, but<br />

are willing to go to great lengths to get their<br />

Whether or not they want to, most executives now have to deal with all<br />

the state, federal, and international laws and regulations that require notifications<br />

of breaches or suspected breaches of sensitive information. This<br />

applies to external hacks, internal breaches, and even something as seemingly<br />

benign as a lost mobile device or backup tapes. Appendix A contains<br />

URLs to the sites giving information security and privacy laws and regulations<br />

that may affect your business.<br />

Planning and Performing Attacks<br />

Attack styles vary widely:<br />

own rights back from anyone who threatens<br />

them. It’s live and let live gone awry.<br />

The case involving copyrighted materials and<br />

the Recording Industry Association of America<br />

(RIAA) is a classic example. Hackers have gone<br />

to great lengths to prove a point, from defacing<br />

the websites of organizations that support<br />

copyrights to illegally sharing music by using<br />

otherwise legal mediums like Kazaa, Gnutella,<br />

and Morpheus. Go figure.<br />

✓ Some hackers prepare far in advance of an attack. They gather small<br />

bits of information and methodically carry out their hacks, as I outline in<br />

Chapter 4. These hackers are the most difficult to track.<br />

✓ Other hackers — usually the inexperienced script kiddies — act before<br />

they think through the consequences. Such hackers may try, for example,<br />

to telnet directly into an organization’s router without hiding their identities.<br />

Other hackers may try to launch a DoS attack against a Microsoft<br />

Exchange server without first determining the version of Exchange or the<br />

patches that are installed. These hackers usually are caught.<br />

✓ Malicious users are all over the map. Some can be quite savvy based<br />

on their knowledge of the network and of how IT operates inside the<br />

organization. Others go poking and prodding around into systems they<br />

shouldn’t be in — or shouldn’t have had access to in the first place —<br />

and often do stupid things that lead security or network administrators<br />

back to them.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!