—Today is the Golden Age of Hacking. Any person with malicious intents can acquire tools andtechniques via numerous freely hosted sites to launch attacks on Networks. Identifying and eliminatingsecurity threats has become an arduous task for the administrators and not only big networks but alsohome users are becoming target for the hackers, which use these slaved machines to create larger Botnets.One solution to get rid of these is to acquire proper know-how on how to defend against such attacks.This paper takes a typical scenario of a system, which was installed afresh but after connecting to thenetwork it showed signs of being controlled by somebody else. A live case study has been taken and step-by-step procedure is demonstrated along with relevant screen shots and data analysis. We see howpractically it becomes essential to install anti-virus, firewall, patches etc. for the survival of these out-of-the box infant PCs.
—Cyber Crime, Security Threats, Antivirus, Firewall, Patches, Botnets.
No matter where we work, what is our job profile and how your company competes in the market, noorganization can survive without network connectivity. Internet has widely opened the progressopportunities that were only dreams few years back. As a matter of the fact though Internet delivers lotsof goodies but at the same times it gives nightmares to system administrators throughout the world.Security vulnerabilities linger and consequently create a breeding ground for attacks, which even a novicecan exploit to create a security breach as, indicated in the Fig. 1. Though script kiddies launch theseattacks they can cause lot of damage to the networks.The security research community as well as vendors identify and publish on an average 40 new securityvulnerabilities per week. These vulnerabilities provide a multitude of avenues for attacks. Incorrectlyconfigured systems, unchanged default passwords, product flaws, or missing security patches are amongthe most typical causes of the network intrusions. Only by understanding how attacks work and what anattacker does to compromise a machine can a company position itself so that it can be properly protected.Knowing what an attacker can do to compromise a system and what that compromise looks like on anetwork allows administrator to build a secure system.
Academic Open InternetJournal
Volume 19, 2006
Mandatory Security Arsenal for Survival on the Internet:Techniques and Remedial Actions(June 2006)
C|EH, Member IEEE.
and S.C. Saxena
Page 1of 12Mandatory Security Arsenal for Survival on the Internet05-Dec-07http://www.acadjournal.com/2006/v19/part6/p3/