Posted by : setiosudi Wednesday, 18 November 2015

Know the Types of Hacker Attacks
Hackers are those who have expertise in the field of computer programs and networks.
Currently the hack technique has be spread widely on the Internet from various forums and communities and utilized with various functions both White and Black.

In whiteness that use the technique with the best in a particular field without threatening to the security of data, even fix and notify to the weakness of a server (network) etc.
And black stone, which is the use of techniques Hack by a community or a set inconsistently and did not recognize its adverse effects are not even responsible for what they do.
As well as this time there are various types of hacker attacks are done through the network. Whether it's burglary, theft of data, databases and others.

Hacking is illegal acts that harm, it is not I right so for that we not discuss how menghacking, but we will discuss other what types of attacks that can be carried out by the Network are as following:

1. IP Spoofing
IP Spoofing is also known as the Source Address Spoofing, namely counterfeiting attacker's IP address so that the target assumes the attacker's IP address is the IP address of the host on the network instead of the outside network. Suppose the attacker has IP address type One 16.80.xx.xx when the attacker perform these types of attacks that attacked the network will assume IP attacker
is part of networknya
eg IP type C. 192.xx.xx.xx ie IP Spoofing occurs when an attacker outsmart packet routing to change the direction of the data or
to different destinations.

Packet routing is usually transmitted in a transparent and clear so as to make easier for an attacker to modify the data origin or destination of the data.
This technique is not only used by the attacker but also be used by security professionals to mentracing the identity of the attacker.


2. FTP Attack
This is One of the attacks carried out against the File Transfer Protocol is a buffer overflow attacks caused by malformed command. the purpose of attacking the FTP server, the average is to get a command shell or to perform a Denial of Service.
Denial Of Service attacks can eventually cause a user or attacker to retrieve the resource in the network without
authorization, while the command shell can make an attacker to gain access to the server system and data files that ultimately an attacker could make anonymous root-acces that has full rights to the system network even attacked.


3. Finger Unix Exploits
In the early days of the Internet, Unix use for efficient OSDI for mensharing information among users. Due to requests for information on this finger information does not blame the rules, many system
Administrator leave this utility (finger) with the code are minimal, even with no security at all.
For an attacker utility is extremely valuable to have information about footprinting, including login names and contact information.

4. Flooding & Broadcasting
An attacker can reduce the speed of networks and hosts that are in it significantly by continuing to request / demand for the information on servers that can handle attacks classic Denial of Service (Dos), send a request to the port redundantly called flooding, Sometimes it is also called spraying.
The purpose of both these attacks is the same that makes network resour that provide information becomes weak and eventually gave up. Attacks by way Flooding is dependent on two factors: the size and / or volume (size and / or volume).
An attacker could cause a Denial of Service by throwing large capacity files or a large volume of small packets to a system. In such circumstances the network server will deal with congestion: too much information is requested and not enough power to push the data to run. Basically a large package requires a large processing capacity as well, but it is not normal and the same small package in large volumes would spend resources in vain, and the resulting congestion.

5. Fragmented Packet Attacks
Internet data is transmitted via TCP / IP can be subdivided into a package that contains only the first package contents form the main part of the TCP information. Some firewalls will allow to process part of the package
does not contain information on the origin address of the first packet, it will result in some type of system to crash. For example, the NT server will
to crash if the packets are broken up (fragmented packet) enough to rewrite the information first packet of a protocol.

6. E-mail Exploits
Peng-exploitasian e-mail occur in five types: mail floods, manipulation commands. transport level attacks, entering various codes (inserting malicious code) and social engineering (utilizing socialization
physically). Email attacks can cause the system to crash, open and rewrite even execute application files or also make access to command functions (command function)

7. DNS and BIND
Vulnerabilities News recently about the vulnerability of applications Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed to the basic operation of the Internet (internet basic operation).

8. Phishing
Phishing is a form of fraud module entrapment of one's data by creating a password login page exactly as the original and keep records of the robbery in their database. Phishing activities is considered as an experimental material that is able to ensnare those who are not careful in managing a site.
How..?

Have started to understand about the various types of hacker attacks through the Network. .?
This attack was done without the knowledge of the general public and many actions they will prevalent.
Whereas a woman of Chinese hackers who dared to hack the biggest search engine is Google, so blasted google berpinda companies ..
Waw. But unfortunately Such Hacking techniques If not utilized in the best possible way will certainly harm themselves and others.

Leave a Reply

Subscribe to Posts | Subscribe to Comments

TERIMAKASIH TELAH BERKUNJUNG DI WEB SAYA TERUS TUNGGU POS - POS YANG LAINNYA

- Copyright © tecknology and programing - Blogger Templates - Powered by Blogger - Designed by Johanes Djogan -