THE ABC's of Hacking

Written by dDawg


THE ABC's of Hacking Recovering from a system compromise.

What to do if you've been hacked.

If you find you've been hacked, simply deletingrepparttar Trojan horse or closingrepparttar 107547 open share is often not enough. Usingrepparttar 107548 initial security breach as an entry point, an attacker could easily have created other backdoors into your system or even modifiedrepparttar 107549 actual operating system itself. Because of this there is only one real way to secure a system which has been compromised and that is to reinstall it from a known-good source. This document describesrepparttar 107550 steps involved in recovering a typical windows system from a security compromise.

Step 1 : Isolaterepparttar 107551 affected machine. You should disconnect any compromised machine from bothrepparttar 107552 internet and any local network as soon as you realize it's been compromised. This helps limitrepparttar 107553 potential damage both to your own systems (remote attackers can no longer gain access) and to other systems onrepparttar 107554 internet (your machine cannot be used to attack others). It's important to physically disconnectrepparttar 107555 machine fromrepparttar 107556 network. That's right, unplugrepparttar 107557 network cable or power offrepparttar 107558 modem . Cable and DSL modems in particular often feature 'standby' buttons which claim to isolaterepparttar 107559 computer fromrepparttar 107560 network - in several cases this is simply not true, even withrepparttar 107561 modem in standby moderepparttar 107562 computer is still connected torepparttar 107563 network.

At this point you should consider what other actions you need to take. Do you for example store bank or credit card details on your PC? If you do, you should informrepparttar 107564 appropriate organizations that your accounts may be compromised at once. Have you used your credit card number online recently? Again, if you have you should informrepparttar 107565 credit card company that your number may have been compromised.

Any password or secure data stored or used on your PC should be assumed to have been compromised and changed at once. This includes ISP access passwords, FTP, email and website passwords as well as any other service you use which requires a secure login.

Step 2 : Find out how seriousrepparttar 107566 problem is. If you only have one computer you can safely skip this section, those with home networks should read on. A compromised machine on a network can lead torepparttar 107567 compromise of all other machines connected to that network. The risk of this happening depends on a number of things, including :

The length of timerepparttar 107568 security breach has gone undetected. Be honest with yourself and assumerepparttar 107569 worst case scenario is true when evaluating this. When did you first suspect something might be wrong? When did you last scan your network for viruses and Trojan horses? When did you last verify that your files hadn't been tampered with? The longer a compromised machine has been on a networkrepparttar 107570 greaterrepparttar 107571 chances of other machines onrepparttar 107572 network being affected are.

The type of network you run. If all machines on your network have unrestricted access to and fromrepparttar 107573 compromised machine,repparttar 107574 chances of a network-wide security breach increase dramatically. Onrepparttar 107575 other hand, if you restrict access between machines either by using desktop firewall products or by means of username/password authenticationrepparttar 107576 risk falls.

The presence (or absence) of anti-virus and desktop firewall software. If each machine runs properly maintained, independent anti-virus and desktop firewall softwarerepparttar 107577 risk of a network-wide security breach falls sharply.

Step 3 : Beginrepparttar 107578 cleanup. Locaterepparttar 107579 original software distribution disks for your operating system, any drivers you need for your system and any license information you'll need duringrepparttar 107580 installation. You will be performing a clean install onrepparttar 107581 affected machines, so you will loose any data stored on them unless you have backups. If you haven't got recent backups, followrepparttar 107582 procedure below :

Start uprepparttar 107583 compromised machine without connecting to any network. Copy any data files you wish to keep to floppy disks or cd-r media, if at all possible in non-executable form (ie. save word files as rich text since it can't contain macro viruses). DO NOT COPY PROGRAM FILES! Label this media clearly as potentially infected and store it safely. You are now ready to begin rebuilding your machine. To be absolutely sure that your system does not remain compromised, followrepparttar 107584 steps below before installing your operating system.

Cyber Terrorism: DDOS Attacks

Written by dDawg


DDOS Attacks: What are they exactly? Since many sites have been claiming DDOS Attacks without much of an explanation. We figured that we should provide some details.

What Exactly is a DDOS Attack?

It was in early 2000 that most people became aware ofrepparttar dangers of distributed denial of service (DDoS) attacks when a series of them knocked such popular Web sites as Yahoo, CNN, and Amazon offrepparttar 107546 air.

It's been almost four years since they first appeared, but DDoS attacks are still difficult to block. Indeed, if they're made with enough resources, some DDoS attacks - including SYN (named for TCP synchronization) attacks - can be impossible to stop.

No server, no matter how well it's protected, can be expected to stand up to an attack made by thousands of machines. Indeed, Arbor Networks, a leading anti-DDoS company, reports DDoS zombie armies of up to 50,000 systems. Fortunately, major DDoS attacks are difficult to launch; unfortunately, minor DDoS attacks are easy to create.

In part, that's because there are so many types of DDoS attacks that can be launched. For example, last January,repparttar 107547 Slammer worm targeted SQL Server 2000, but an indirect effect as infected SQL Server installations tried to spread Slammer was to cause DDoS attacks on network resources, as every bit of bandwidth was consumed byrepparttar 107548 worm.

Thus, a key to thinking about DDoS is that it's not so much a kind of attack as it is an effect of many different kinds of network attacks. In other words, a DDoS may result from malignant code attackingrepparttar 107549 TCP/IP protocol or by assaulting server resources, or it could be as simple as too many users demanding too much bandwidth at one time.

Typically, though, when we're talking about DDoS attacks, we mean attacks on your TCP/IP protocol. There are three types of such attacks:repparttar 107550 ones that target holes in a particular TCP/IP stack; those that target native TCP/IP weaknesses; andrepparttar 107551 boring, but effective, brute force attacks. For added trouble, brute force also works well withrepparttar 107552 first two methods.

The Ping of Death is a typical TCP/IP implementation attack. In this assault,repparttar 107553 DDoS attacker creates an IP packet that exceedsrepparttar 107554 IP standard's maximum 65,536 byte size. When this fat packet arrives, it crashes systems that are using a vulnerable TCP/IP stack. No modern operating system or stack is vulnerable torepparttar 107555 simple Ping of Death, but it was a long-standing problem with Unix systems.

The Teardrop, though, is an old attack still seen today that relies on poor TCP/IP implementation. It works by interfering with how stacks reassemble IP packet fragments. The trick here is that as IP packets are sometimes broken up into smaller chunks, each fragment still hasrepparttar 107556 original IP packet's header as well as a field that tellsrepparttar 107557 TCP/IP stack what bytes it contains. When it works right, this information is used to putrepparttar 107558 packet back together again.

What happens with Teardrop, though, is that your stack is buried with IP fragments that have overlapping fields. When your stack tries to reassemble them, it can't do it, and if it doesn't know to toss these trash packet fragments out, it can quickly fail. Most systems know how to deal with Teardrop now, and a firewall can block Teardrop packets atrepparttar 107559 expense of a bit more latency on network connections, since this makes it disregard all broken packets. Of course, if you throw a ton of Teardrop busted packets at a system, it can still crash.

And, then, there's SYN, to which there really isn't a perfect cure. In a SYN Flood,repparttar 107560 attack works by overwhelmingrepparttar 107561 protocol handshake that has to happen between two Internet-aware applications when they start a work session. The first program sends out a TCP SYN (synchronization) packet, which is followed by a TCP SYN-ACK acknowledgment packet fromrepparttar 107562 receiving application. Then,repparttar 107563 first program replies with an ACK (acknowledgment). Once this has been done,repparttar 107564 applications are ready to work with each other.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use