HOW HACKERS WORK
Getting the IP address
Every computer has an IP (Internet Protocol) address. A DSL or cable modem connection keeps the IP address ‘always on’. A dial-up account’s IP address is turned off by the Internet Service Provider after a certain amount of inactivity Dial-up accounts get a different IP address each time they are on. So a hacker can’t make repeat visits unless he loads a program on your PC to tell him when you are on-line and gives the current IP address. A hacker can take his time to get to know an ‘always on’ connection and its weaknesses Common methods for finding your IP address are through chat rooms, looking up domain names on a domain name registrar site, or running programs that can create a log of all valid addresses In a chatroom, all a hacker has to do is right click on your chat ID and get your IP address. A domain registrar can yield a lot of information, including a website’s employee names, phone numbers, fax numbers, physical addresses and IP addresses With your IP address, a hacker can test your system for weaknesses. A hacker can take his time to get to know an ‘always on’ connection. Dial-up accounts get a different IP address each time they are on. So a hacker can’t make repeat visits unless he loads a program on your PC to tell him when you are on-line and gives the current IP address
Entering the computer
A hacker takes advantage of operating system (OS) weaknesses (bugs, or holes in software). Browsing windows also have bugs He scans open ports for a running program that can be taken advantage of File- and print-sharing options allow him to access your hard drive, load any program on the drive and delete/change any file on your PC He may use ‘trojans’, which pretend to do useful tasks—like playing a video or greeting—but actually help him Programs that allow the hacker ‘backdoor’ entry to your comp are commonly available. They are legitimately used daily to administer remote systems by system administrators ‘Social engineering’ can be used, where a hacker verbally chats you up and gets important information about your home or office
Cracking passwords
Hackers use special programs to crack passwords. Even a password-protected computer can be broken into and other passwords then cracked Most crackers/hackers have a d cracker dictionary. It has common computer terms and phrases, names, slang and jargon, easily typed key sequences (like ‘qwerty’), and phrases you might commonly use as a password Programs to crack passwords are handed out with copies of these dictionaries A common method for cracking passwords is to get a copy of the password file for a system, which gives a list of all encrypted passwords on the system
Chaos on your comp
A hacker can steal and delete files, load dangerous programs on your PC, involve you in computer crime. He can control your life by getting your home, office or bank account passwords The most dangerous trojan is a backdoor trojan. Trojans could come from friends who do not know that the program that sings ‘Happy birthday’ also loads nasty software on your computer With a ‘backdoor’ trojan, hackers see your screen as you see it, watch every move of your mouse, every word you type Hackers change the names of their programs to make them look like legitimate system programs. Or they create a hidden folder to keep programs The most common way that viruses are spread is through e-mail. Usually, the virus is not in the e-mail itself, but an attachment. The virus is activated when you open the attachment. Sometimes, the virus sends itself as an e-mail to everyone in your address book
Source: The Times of India, Mumbai, 28th july 2008 Edition
Getting the IP address
Every computer has an IP (Internet Protocol) address. A DSL or cable modem connection keeps the IP address ‘always on’. A dial-up account’s IP address is turned off by the Internet Service Provider after a certain amount of inactivity Dial-up accounts get a different IP address each time they are on. So a hacker can’t make repeat visits unless he loads a program on your PC to tell him when you are on-line and gives the current IP address. A hacker can take his time to get to know an ‘always on’ connection and its weaknesses Common methods for finding your IP address are through chat rooms, looking up domain names on a domain name registrar site, or running programs that can create a log of all valid addresses In a chatroom, all a hacker has to do is right click on your chat ID and get your IP address. A domain registrar can yield a lot of information, including a website’s employee names, phone numbers, fax numbers, physical addresses and IP addresses With your IP address, a hacker can test your system for weaknesses. A hacker can take his time to get to know an ‘always on’ connection. Dial-up accounts get a different IP address each time they are on. So a hacker can’t make repeat visits unless he loads a program on your PC to tell him when you are on-line and gives the current IP address
Entering the computer
A hacker takes advantage of operating system (OS) weaknesses (bugs, or holes in software). Browsing windows also have bugs He scans open ports for a running program that can be taken advantage of File- and print-sharing options allow him to access your hard drive, load any program on the drive and delete/change any file on your PC He may use ‘trojans’, which pretend to do useful tasks—like playing a video or greeting—but actually help him Programs that allow the hacker ‘backdoor’ entry to your comp are commonly available. They are legitimately used daily to administer remote systems by system administrators ‘Social engineering’ can be used, where a hacker verbally chats you up and gets important information about your home or office
Cracking passwords
Hackers use special programs to crack passwords. Even a password-protected computer can be broken into and other passwords then cracked Most crackers/hackers have a d cracker dictionary. It has common computer terms and phrases, names, slang and jargon, easily typed key sequences (like ‘qwerty’), and phrases you might commonly use as a password Programs to crack passwords are handed out with copies of these dictionaries A common method for cracking passwords is to get a copy of the password file for a system, which gives a list of all encrypted passwords on the system
Chaos on your comp
A hacker can steal and delete files, load dangerous programs on your PC, involve you in computer crime. He can control your life by getting your home, office or bank account passwords The most dangerous trojan is a backdoor trojan. Trojans could come from friends who do not know that the program that sings ‘Happy birthday’ also loads nasty software on your computer With a ‘backdoor’ trojan, hackers see your screen as you see it, watch every move of your mouse, every word you type Hackers change the names of their programs to make them look like legitimate system programs. Or they create a hidden folder to keep programs The most common way that viruses are spread is through e-mail. Usually, the virus is not in the e-mail itself, but an attachment. The virus is activated when you open the attachment. Sometimes, the virus sends itself as an e-mail to everyone in your address book
Source: The Times of India, Mumbai, 28th july 2008 Edition
Comments
Post a Comment