You are on page 1of 4

There are several types of common attacks, such network attack, which is used to attack on

incorporate network to steal information or data of those corporate network packets. They transmit
their data on daily bases via internet so its easy to get information in unauthorized manner for the
attacker. In Network attack, there are some kind of methods, like packet sniffing in which the hacker
sniff packets and decrypt those packet which hacked by the unauthorized user but data isn’t changed.
In the second one, Man in the Middle Attack, Data could be change by the hacker, however, Man-in-
the-middle attacks allows hacker to eavesdrop discipline of communication secretly or change them
by encrypting those data, It would be difficult to detect MITMA attack, but it could be prevented
easily. And the third method is DNS Spoofing or hacking in network attacks, Basically DNS spoofing
also known as Domain Name Server Poisoning, in this attack, Emended Domain-name-server
redirecting traffic online to the deceitful website, which is like fake website that seems to be like
original website. The second type of common attack is Web Attacks, in this attack, Threats are
generated to the web, to hack the complete website or used to it with wrong intention, hackers could
get all the access to the server of website while attacking on website data or information, there are
some method of attacking a website which are sued by the hacker, the first one method is Phishing, in
this method, like the attackers makes fake website which resembles to the trustworthy site, and user
put his/her information on fake website, so the hackers can get the access on the user information or
data. The second method is SQL injection, in the SQL injection, we fire the query on website input
fields to get all vulnerabilities of website, hackers can get all access of Database through these
malicious queries of SQL. The third type is Cross site Scripting which also knows as XSS attack, XSS
used by changing a vulnerable website by using malicious JavaScript Code, when code given by the
hacker successfully executed on website, it can give all the access of website to the hacker or attacker.
The other common attacks are related to the Operating system or Software attacks, which are
performed by attackers using abominable Viruses, Trojans, Rootkits which is also like a virus when the
Rootkits payload is executed once, it can give all the access or information to the cracker. So we have
already discussed about phishing attack, which is also considered as Social Engineering attack, in
which you try to get the user trust by using some tricks, Finally user accesses something with the full
trust intention.

WEB ATTACK: Those web based related applications such as website as its increasing in this era and
became most powerful to share information or any content as those websites rising amount of
security concerns signifier as giving improper affected coding, such kind of imperfection in coding or
vulnerabilities permit attackers to control straightforward and open access to databases to get the
sensitive information/data, so when these type of error-nous known as web attacks. Most of the SQL
databases hold in sensitive and valuable data or information for example financial related or personal
identifications data and makes hacker to attack on information/data easily. While such acts of
malicious mischief performed so called script kiddies as attacking on most valuable organizations
websites are frequent yet, in the present time, Most of the hackers choose to take control on
accesses to the highly sensitive information which is located inside the Databases due to the vast
getting pay-offs by vendors who gives them target to attack and when the data breaches completely
they sells on to them.
As it’s necessary to the websites when the visitors are using website so the related information to
visitor provided by the databases. If one of the vulnerablility occurs in website so this can lead to at
least one of them techniques of attacking, after all the database is one of the most precious place of
holding sensitive data which took as real endangerment of web attacks. As we have already discussed
in the above section about SQL injection, through SQL injection tables of data are targeted directly,
and it’s quiet the fewest popular and mainly risky type of weakness. Sometime attackers uses phishing
techniques to get the information of visitor or user data and they can inject the malicious codes to the
website which could redirect information to the fake website, this method is known as Cross Site
Scripting XSS and still it could be use when the server or databases not containing any vulnerability
phase into them. Most of the time it’s used combined with other vector of attacking such as Social-
Engineering Attack.
Packet Sniffing And It’s Tools: Packet sniffing tools are used to collecting, logging, and gathering those
all packets which transmitting throughout the computer networks, no matter of this way those all
packets are addressed. Meanwhile, the all subsets of packets which are defined, perchance collected
for advance synthesis. As an administrations of network, the all gathered data could be use for a wide
range purposes such as trafficking and bandwidth monitoring. A person who sniffs the packets, also
known as a packet analyzer which gets connect with II main mechanisms, Firstly, it could get connect
through a network adapter that help to get connect with the sniffer to layer of network which is in
existence and secondly, those application/software that stipulate a mode to logarithm, just to analyze
or seeing the gathered data.

There are two types of packet analyzer methods are addressed:

Hardware Packet Sniffer And Software Packet Sniffer

Hardware Packet Sniffers: A hardware packet sniffer is configured to get connected into a system
network to analyze it. When you’ll be looking at segment of specific network traffic it’s consideres as
so useful in that segmentation to analyze all the packets which is being transmit and when you plug
into the physical netowkr its becomes easier to get the physical location appropriately. This method
of hardware packet sniffer can assure there’s no any packet loosed while sniffing, routing and so on..
while this method of sniffer either stock the gathered packets-collection and send to a collector that
helps to checked collected data logs for further analysis through the hardware packet analyzer.

Software Packet Sniffer: Nowadays most of the hackers use the software packet sniffers only, it’s
really helpful to see the network trafficking between source and destination nodes or layer, they try
to capture all the packet passing through those layers, and decrypt them for looking out the
information related to them, they just resides between them and using software connect to their IP
Logs and sniff all the sending and receiving packets

Tools of Packet Sniffing: There are several types of packets sniffing tools but we’ll be discussing
about two, the first one is Wireshark and the second is Wifislax.

Wireshark: Wireshark is one of the famous and great network packet analyzer, this packet analyzer
always tries to take and capture all of the packets and show them as displaying with details of each
packets which is analyzed or captured through it. Just we took it as this network analyzer used as
measuring device, used to investigate that whats network packets are transmitted between the layers
of nodes. Attacker or Hacker can use this Wireshark software for analyzing those network packets,
session hijacking, cookie stealing, password sniffing and information gathering.

Types of Computer Hacker: In the Manner of information Security or Computer Security context the
hacker is someone who gets unauthorized access maliciously, break into vulnerabilites which are
found out by using some hacking techniques and hacker exploits weaknesses of a computer system or
computer network, this also known as a clever programmer. Hackers sometimes driven by several
type of reasons such a protest, challenging, profit or to take any kind of enjoyment without having
any intention. There are several type of hackers, but not all the hacker has wrong intentions such as
ethical hacker which is also known information security expert. And types of several hackers are
named as Black Hat Hacker, White Hat Hacker and Gray Hat Hacker.

Black Hat Hacker : A Black Hat Hacker is an evil wrongdoers also known as Dark-side hacker, when
someone having wrong intention to give harm to people or for illegally gaining personal accesses of
those who’re using internet or computer, they use to hack those computer system and network
maliciously and unethically.

White Hat Hacker: White Hat Hacker also knows as Ethical Hacker and Penetration Tester,
Information Security Expert or computer security expert, they must have permission before
penetrating the application or information system of organization to ensure their security system
whether it has flaw in the security of application system or not, White Hat Hacker find vulnerabilities
in application non-maliciously, just they find only to test their information system security.

Gray Hat Hacker : Gray Hat Hacker combined with both of them, Like it could be Black Hat Hacker or
White Hat Hacker at the same time. Such as it’s the combination of black hat hacker and white hat
hacker.

Why Do Hackers Hack, So that’s all are reasons are driven below;

For Things: only they want a one thing is information or data. Like they use to hack only to gt personal
information or access.

For Fun: In this time they only test their selves to measuring the smartness, like how smart they’re to
do. Even they can break antivirus through making strong malicious virus, just to have fun they use to
hack the system.

For Nothing: Sometimes,hackers only hack to see the results that what if I do hack somebody's
system, what would be the result. Like they’ve no any reason to have the system just to see the
output.

Hacking to Steal: This one is the other reason to hack which is to stealing money or financial
information or anything else.

For Vengeance: It’s about parabellum moment, as during wars Hackers destroys enemies computer
system or network.

The most famous Hackers in the world and their activities:

Kevin Poulsen: Kevin Lee Poulsen is a erstwhile hacker, he’s been working at Wired.com as a news
editor. He successfully hacked the telephones lines of Radio-Station KIIS-FM of which was based on
Los Angeles. After that he got jailed, in meanwhile was released from prison after that he made a
decision to leave the world of computers and he made himself a journalist to take distance from his
vicious past.

Kevin Mitnick: Kevin is American computer security consultant, he’s one of the fewest infamous
hacker in the century of 20th . He always been involved and kept active his-self in communications or
computer related crimes, and that was a time he was in the list of Most wanted computer criminals in
the USA. When he was young, he always used his tricky mind to develop a new technique like he used
social engineering attack that time, to hack punch card system which was used in buses of Los-
Angeles.

Chad Davis: He’s also an American Hacker who’s most the infamous cyber criminals of the century
20th. He gotten the Global Hell, such generated hacks of some largest organization and businesses
websites of the USA. The person was a Chad davis behind the message “Global Hell will not die” that
was showcased on White House and USA Army Home page.

Mike Calce: The Name of Mike Calce is, Michael Demon Calce also also took his nick as Mafia boy of
CyberSpace and through this name he’s the known person around the world, he was a learner on high
school at West Island. He got engaged and involved his-self in a constant-series of DDOS Attack which
also is known as Denial of Service Attack against some of the world largest website such as Ebay, CNN,
Yahoo.com, Amazon.com and Dell also included.
Natural view is seen in Information Technology about the cures and causes “Problems” related to
Cyber Security.The Main Point is that, Attackers only hack the technology by finding vulnerability in
existing application of organization. additionally, the main cause behind the cyber crime is the
information Technology Networks and working inside is need to be mysterious only to the few users,
and therefore it took as focus as suspicions. Via sophisticated security devices must be offering the
protection from any type of attack. While, those views disregard important mechanism of risk related
to information security: Culture of businesses or corporations and these type of behaviors becomes
resultant to it.

When the Organization will take this issue as serious as while making strategy of bring changes in an
culture of corporation is confessedly non casual, so the organization could be more effective in
addressing those problems which could be face, On the other side, its right if the culture especially
those features which have putted to look out cyber security threats have contributed and took
historical success; So mainly response is not existing culture to be destroyed, merely instead to
inculcate security system into Corporations and they must need to support all of the aspects
regarding cyber security issues and resolve it.

The policies of information security must be combined with the set of operational and technological
regulation in order to assume actual risks in an organization business and throughout all these
process must be handled by Cyber Security Expert Team. The processes which is on running in
business while the policies and standards must provided by the Cyber Security Expert team, and those
policies must elaborate in a way that the organization while processing their information ensuring to
not facing any issue regarding security problems, and standards must be understandable to the
workers that how they need to follow business processes while looking at the aspect of security

Secondly measuring credentials such as password elasticity is very great, when culture accessing their
information within out side or inside of organization, they must provide the hashed or encrypted
passwords, the credentials need to be strong in a way no one could break those PINS or password and
this must follow the effective way of changing password time by time, not be the same one. If the
credentials or passwords are well decrypt-ed or cracked in a way that passwords or are not changed
on regular basis, then the organization culture would be disobeyed because of this tolerant act, users
can face problems related to credentials. generally, the superior and triteness of credentials state a
deal just about whether comfortableness and security is the controlling the ethics of organization’s
acts.

You might also like