Home / IT Security / Black Hat (page 5)

Black Hat

Hacking: Fun or Criminal Activity?

Hacking: Fun or Criminal Activity?

Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be …

Read More »

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, …

Read More »

BRUTE FORCE AUTHENTICATION ATTACKS

BRUTE FORCE AUTHENTICATION ATTACKS

Brute Force Attacks: Authentication actually takes place in many other parts of the web application other then the main login page. It is also present when you change your password, update your account information, use the password recovery functionality, answering secret questions, and when you use the remember me option. …

Read More »

EXTRACTING INFORMATION FROM E-MAIL SERVERS

EXTRACTING INFORMATION FROM E-MAIL SERVERS

E-Mail Servers: E-mail servers can provide a wealth of information for hackers and penetration testers. In many ways, e-mail is like revolving door to your target’s organization. Assuming your target is hosting their own e-mail server, this is often a great place to attack. It is important to remember. “You …

Read More »

Using a Sniffer – Sniffer Tools

Using a Sniffer

Using a Sniffer: We touched on some of the basics of using a sniffer in the previous section, but now let’s get down and dirty. Quite a few sniffer software packages are available that perform nearly identical functions.  The real advantage of one over the other is the robustness of …

Read More »

Planting a Backdoor – Using Netcat

Planting a Backdoor

Planting a Backdoor: There are many ways to plant a backdoor on a system, but let’s look at one provided via the PsTools suite. This suite includes a mixed bag of utilities designed to ease system administration. Among these tools is PsExec, which is designed to run commands interactively or …

Read More »

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing: DNS is an important service for just about any network today. Some networks, such as those that use Active Directory, cannot even function without DNS being present in the environment. With these points in mind, we need to look at an attack, the attacking party modifies the DNS …

Read More »

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks: In order to attack, you must first find a target, and though site surveys can make this easier, they cannot help in every case. Several tools and mechanism make locating a target network easier.   The following tools can complement wardriving or be used on …

Read More »

USB Password Theft

USB Password Theft

USB Password Theft: In contrast to manual methods, there is some automated mechanism for obtaining passwords, such as via USB drivers. This method entails embedding a password-stealing application on a USB and then physically plugging the drive into a target system. Because many users store they passwords for applications an …

Read More »