Network
Security
Data is shared and passed insecure
networks, but all networks have their leaks and can be compromised. Ping
commands are used to verify communication between two devices. This technique
can also be used by hackers to gain access to data from an unauthorized
computer. A practice of this is DOS (Denial of Service), this attack prevents
valid users from accessing websites, emails, and personal data from the data
within their own network. To accomplish this exploit, hackers ping the server
several times with packages that overload the server until it slows down or
crashes as it's unable to admit the requests. There are several types of DOS
attacks, such as, targeted local disclosed attacks that mark a single computer
in a network, another is router disclosed targets that disrupt communications
between a network of computers, and lastly, blind ping targets that use an
external program to discover the IP address for targeted computer or network.
Other methods are used for IP spoofing, knows as Smurf, a single ping is sent
255 times. An overload of data, known as buffer overflow, its name is essential
to its description, loading a sizeable amount of data with file names of 256
characters. A final ping attack we’ll discuss is teardrop, this method is when
a hacker manipulates the packet sent so that they overlap each other, creating
an effect of crashing when attempting to reassemble the packets.
Password
Cracking & Email Spam
Password cracking involves tapping
data that has been stored in or transmitted by a computer system. Brute force
is a method of trying every possible password until successfully entering. Computers can hash hundreds of million
passwords per second using password by use of tools, the rate of password
guessing depends heavily on cryptographic to determine possible password
matches. In some cases, password cracking can be used in lieu of resetting a
password if admin rights are not available. Email is a vital communication
channel in today’s world, along with its vast use user-friendliness, the method
invites spam. Popular methods of spam are Malware, Spear Phishing, Large Email
Attachments, Data Loss, and Compliance Issues. Spear Phishing, most commonly
referred to as phishing emails, are emails from hackers looking for an
individual to disclose personal information through replicating reputable
company emails to collect data. While this has been a highly publicized way of
gaining user information, it continues to be one of the most effective ways for
hackers to obtain information. To combat
these emails, multi scans tools would assist in detecting known threats, as
well as, apply data sanitation to change file formats in disarming the
threats.
Comments
Post a Comment