Saturday, June 23, 2012

3 Important Lessons About Hackers

By Joshua Faglie


The hackers are using simple methods to attack your system or network. To scan some vulnerable systems, many hackers found ease in using a demon dialer. The demon dialer is the perfect tool to redial numbers continuously just to ensure connections. There is also another perfect tool for hacking in a form of wardialer. It is a simple application that depends on modem to dial myriads of random phone numbers just to look for another modem that is connected to a certain computer.

The hackers have known a certain approach that is used to identify computers with good connections such as the cable connections or DSL connections. Those hackers will eventually use a scanner program to ping IP addresses in order to know if the system of networks is running smoothly. The repeated pings can be noticed in the log as you use firewall software.

The hackers have found all these tools present in the internet. There are also available sites in the internet where you can simply download easy-to-use hacking tools for your advantage. Since not all those tools are easy when used, the hackers could find them easy to maneuver through the homegrown documentation available in hacker shoptalk.

Some of the programs available for them are the scanning utilities that identify the weak points of a computer or network and those sniffing programs that definitely spy on the data that pass between machines.

Since there are vulnerable IP addresses, hackers take advantage to use the net just to share some lists of them. The addresses of computer units that are loaded with specific virus can easily be exploited by hackers.

The hacker will definitely look for a vulnerable machine first then use a hacking tool like whisker to know the operating system of the computer and figure out the unpatched holes on it. The whisker is a powerful tool that does not only conduct security testing of systems but also provides an information for a hacker to exploit a certain system or computer.

There are many other conditions which help hackers to easily penetrate on the systems. Lax security contributes a big factor on it. It happens when a certain company, for instance, never uses a password to protect the system. Another condition is when system administrators fail to update their software using security patches as there would be vulnerable ports available for attacks. A misconfigured firewall or router can also contribute to the hacking activity. It definitely leads to the sniffing of important documents like e-mails, files, and passwords of private people.




About the Author:



No comments:

Post a Comment