19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

34<br />

Part I: Building the Foundation for Ethical Hacking<br />

✓ Hackin9 (http://hakin9.org)<br />

✓ PHRACK (www.phrack.org/archives/)<br />

Malicious attackers usually learn from their mistakes. Every mistake moves<br />

them one step closer to breaking into someone’s system. They use this<br />

knowledge when carrying out future attacks. You, as an ethical hacker, need<br />

to do the same.<br />

Maintaining Anonymity<br />

Smart attackers want to remain as low-key as possible. Covering their tracks<br />

is a priority, and many times their success depends on them remaining<br />

unnoticed. They want to avoid raising suspicion so they can come back and<br />

access the systems in the future. Hackers often remain anonymous by using<br />

one of the following resources:<br />

✓ Borrowed or stolen remote desktop and VPN accounts from friends or<br />

previous employers<br />

✓ Public computers at libraries, schools, or kiosks at the local mall<br />

✓ Open wireless networks<br />

✓ Internet proxy servers or anonymizer services<br />

✓ Anonymous or disposable e-mail accounts from free e-mail services<br />

✓ Open e-mail relays<br />

✓ Infected computers — also called zombies or bots — at other organizations<br />

✓ Workstations or servers on the victim’s own network<br />

If hackers use enough stepping stones for their attacks, they are hard to<br />

trace. Luckily, one of your biggest concerns — the malicious user — generally<br />

isn’t quite as savvy. That is, unless the user is an actual network or security<br />

administrator.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!