Showing posts with label The way hackers penetrated website.. Show all posts
Showing posts with label The way hackers penetrated website.. Show all posts

Thursday 20 November 2014

The way hackers penetrated website.

How can a hacker to penetrate or infiltrate and destroy a website is as follows. Techniques include:

1. IP Spoofing
2. FTP Attack
3. Finger Unix Exploits
4. Flooding & Broadcasting
5. Fragmented Packet Attacks
6. E-mail Exploits
7. DNS and BIND Vulnerabilities
8. Password Attacks
9. Proxy Server Attacks
10. Remote Command Processing Attacks
11. Remote File System Attack
12. Selective insertions Program
13. Port Scanning
14. TCP / IP Sequence Stealing, Passive Listening Port and Packet
15. HTTPD Attacks

IP Spoofing.

IP Spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so that the target considers the attacker's IP address is the IP address of the host in the network instead of from the outside network. Suppose the attacker has an IP address of type A 66.25.xx.xx when the attacker to attack this type of network is under attack, the IP will assume the attacker is part of their network, eg IP 192.xx.xx.xx ie type C.

IP Spoofing occurs when an attacker? Outsmart? packet routing to change the direction of the data or transmissions to different destinations. Packet routing is usually transmitted in a transparent and clear so as to make the attacker to easily modify the data source or destination of the data. This technique is not only used by the attacker, but also used by security professionals to download tracing the identity of the attacker.

FTP Attack.

One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. destination FTP server to attack the average is to get a command shell or to perform a Denial of Service. Denial Of Service attack can eventually lead to a user or attacker to retrieve the resource in the network without authorization, while the command shell can make an attacker to gain access to the server system and data files that an attacker can eventually make anonymous root-acces a right full to the system even attacked network.

Finger Unix Exploits.

In the early days of the Internet, Unix OS finger-efficient utility used to download information sharing among users. Because the demand for information on this finger information do not blame the rules, many system administrators leave this utility (finger) with minimal security, even without any security at all. For an attacker this utility is very valuable to have information on footprinting, including login names and contact information.

This utility also provide excellent information about user activity in the system, how long the user is in the system and how far the user take care of the system. The information generated from this finger to minimize Kracker effort in penetrating a system. Personal information about the user that is raised by the finger daemon is already enough for a atacker to perform social engineering using the social skill to utilize the user to? Tell? passwords and access codes to the system.

Flooding & Broadcasting.

An attacker can reduce the speed of the network and the hosts that are in it significantly by continuing to perform request / demand for the information of servers that can handle classic attacks Denial of Service (Dos), send a request to the named port of excessive flooding, sometimes it is also called spraying. The purpose of the attack is the same that makes network resources that provide information to be weak and eventually gave up.

Flooding Attacks by the way, depending on two factors: the size and / or volume (size and / or volume). An attacker could cause a Denial of Service by throwing large capacity files or a large volume of small packet to a system. In such circumstances the network server will deal with congestion: too much of the requested information and not enough power to push the data to run. Basically a big package that requires greater processing capacity, but abnormally small package and at a high volume resource will be spent in vain, and the resulting congestion.

Fragmented Packet Attacks.

Internet data is transmitted via TCP / IP can be further divided into packages that only contain the contents of the first package of information the main part (head) of TCP. Some firewalls will allow to process part of packages that do not contain information on the source address on the packet first, this will lead to some type of system to crash. For example, the NT server will be crash if the packages were broken up (fragmented packet) enough information to rewrite the first packet of a protocol.

E-mail Exploits.

Exploitation of e-mail occur in five types: mail floods, manipulation command (command manipulation), the attack rate of transport (transport-level attack), include a variety of code (inserting malicious code) and social engineering (utilizing physical socialization). Email assault could cause the system to crash, open and execute even rewrite the application files or also make access to command functions (command function)

DNS and BIND Vulnerabilities.

Recent news about the vulnerability (vulnerabilities) on apps Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed at the basic operation of the Internet (internet basic operation).

Password Attacks.

Password is common when we talk about security. Sometimes a user does not care about the number of pins they have, such as online transaction in the cafe, even transact online at home is very dangerous if it is not equipped with security software such as SSL and PGP. Password is one procedure that is very difficult to attack, an attacker might have many tools (technically and socially) just to open something that is protected by a password.

When an attacker managed to get a password that is owned by a user, then it will have the same power to the user. Train employees / users to remain vigilant in keeping the password of social engineering can at least minimize the risk, in addition to guard against social engineering practices organizations must be aware of this by way of technical. Most attacks are carried out against password guessing (guessing), brute-force, cracking and sniffing.

Proxy Server Attacks.

One of the functions of proxy servers is to speed up response time by bringing together the process of multiple hosts on a trusted network.

Remote Command Processing Attacks.

Trusted Relationship between two or more hosts Provides information exchange and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to power networks in one and the other system (the network).
Attacker will attack the servers that are members of a trusted system. Just as the latency to the proxy server, when access is received, an attacker would have the ability to execute commands and access the data available to other users.

Remote File System Attack.

Protocols for transport of data? Backbone of the internet? is the TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host. The attacker can easily obtain the information traces of this mechanism to gain access to the file directory.

Selective insertions Program.

Selective Program insertions are performed when the attacker attacks put destroyer programs, such as viruses, worms and trojans (maybe you already know this term well?) On the target system. Programs crusher is also called malware. These programs have the ability to damage the system, destruction of files, theft of the password to unlock the backdoor.

Port Scanning.

Through port scanning an attacker can see the functions and how to survive a system from a variety of ports. A atacker can gain access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP strings in open to the public, which means that the information can be extracted for use in remote command attack.

TCP / IP Sequence Stealing, Passive Listening Port and Packet.

Interception TCP / IP Sequence Stealing, Passive Listening Port and Packet Interception runs to gather sensitive information to access the network. Unlike active attacks and brute-force attacks that use this method have more stealth-like quality.

HTTPD Attacks.

The vulnerability is present in HTTPD webserver or five kinds: buffer overflows, bypasses httpd, cross scripting, web code vulnerabilities, and URL floods
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/the-way-hackers-penetrated-website.html
DatePublished: 20 November 2014 at 13:38
Tag : The way hackers penetrated website.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:38