..::Mohon maaf atas ketidaknyamanan Anda mengunjungi blog saya. Blog ini masih dalam tahap perbaikan, agar lebih tertata rapi. Selalu gunakan fitur search engine disebelah kanan guna mempermudah pencarian isi konten di blog ini. Terimakasih::..
Home » , » Information about Hacker

Information about Hacker

Posted by Obay Corps on 06 Januari 2008

Hacker with its membership can see & improve repairing weakness of software in computer; usually later then in publicizing openly in Internet so that system become betterly is. Out of luck of him, human being litlle have virulent liver to use the the information for badness - they is usually referred by cracker. Basically world of hacker & cracker do not differ from artistic world, here we converse network security art of Internet.
I hope network security science in this article is used for good things - become Hacker is not Cracker. You don't is hit by anathema because using science to destroy property of others. More than anything else, at the moment requirement of hacker progressively increase in Indonesian with more and more dotcommers which wish IPO in various stock market. Good name & value a dotcom can fall even becoming not worth if dotcom in goaling. In a condition this, all hacker in expecting can become security consultant to all dotcommers - because resource police & Indonesia security government officer very-very weaken & grievous in Information Technology area & Internet. There is no help for it cybersquad, private sector cyberpatrol perhaps need in civilizing for the survival of Indonesian dotcommers in Internet.
Various network security technique of Internet earn in obtaining easy to in Internet for example.
http://www.sans.org,
http://www.rootshell.com,
http://www.linuxfirewall.org/,
http://www.linuxdoc.org,
http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/.
Some of this technique in the form of books which is amount him some hundred page yard able to in taking free. Some Frequently Asked Questions (FAQ) about network security can be obtained by in
http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. And to all experimenter some script / program which have become can be obtained by for example in http://bastille-linux.sourceforge.net/,
To reader which wish to obtain get science about network earn in download free from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf. Some book in form of softcopy able to in taking free of charge earn in taking away from http://pandu.dhs.org/Buku-Online/. We have to compliment especially to Guide team motorized by I Made Wiryana to this. At the moment, I do not too know the existence of active Indonesian discussion place study techniques of hacking this - but could probably some of in expostulated in list mailing continue like kursus-linux@yahoogroups.com & linux-admin@linux.or.id which in operating by Group Consumer Of Linux Indonesia (KPLI) Http://www.kpli.or.id.
Way of simplest to see weakness of system is by searching information from various vendor for example in. http://www.sans.org/newlook/publications/roadmap.htm#3b about weakness of system which they make by xself. Beside, monitoring various list mailing in Internet related to network security like in list of http://www.sans.org/newlook/publications/roadmap.htm#3e.
Explained by Front-Line Information Security Team, " Techniques Adopted By ' System Crackers' When Attempting To Break Into Corporate Sensitive Private Networks or," http://www.ns2.co.uk fist@ns2.co.uk. A Cracker generally age man 16-25 year. Pursuant to statistic consumer of Internet in Indonesia hence frankly majority consumer of Internet in Indonesian is young children at this age also. It’s true this age is very ideal age in bailing new science is including science of Internet, very regrettably if we fail to learn to 25000 Indonesian school to year 2009 - because next day fulcrums of Indonesian nation reside in young children hand of this us.
So, all this young cracker generally do cracking to increase ability / using resource in network for the sake of by xself. Generally all cracker is opportunis. See weakness of system by running program of scanner. After obtaining to access root, cracker of back door installing (backdoor) and close all weakness of existing public.
Like soybean cake us, generally various company / dotcommers will use Internet for the (1) of their server web hosting, (2) e-mail communications and (3) giving to access web / internet to it’s employees. Dissociation of network of Internet and of Intranet is generally conducted by using technique / Firewall software and of Proxy server. See the condition of usage above, weakness of system generally earn in penetrating for example by penetrating external mailserver / outside used to facilitate to access to mail go out from company. Besides, by using scanner agressive-SNMP & program forcing SNMP string community can alter a router become bridge which later then can be used for stepping point to come into internal network of company (Intranet).
So that cracker protected at the (time) of doing attack, technique of cloacking (impersonation) done by jumping out of previous machine have in compromised (is conquered) through program of telnet or of rsh. At medium machine using Windows attack can be conducted jumped out of program of Wingate. Besides, jumping can through peripheral of proxy which is its unfavourable configuraton.
After succeeding to jump and enter other system, cracker usually do probing to network and collect required information. This matter is conducted with a few the way of, for example (1) using nslookup to run govern ' ls , (2) seeing file of HTML in your webserver to identify other machine, (3) seeing various document in FTP server, (4) connecting x'self to server mail and use comand ' expn ', and (5) user finger in machines of eksternal other.
Step hereinafter, cracker will identify network component trusted by system any kind of. the Network component usually machine of administrator and of server which usually in assuming most peaceful in network. Start with check access & NFS eksport to various critical directory like / usr / bin, / and etc / home. Machine exploitation pass weakness of Common Gateway Interface (CGI), accessed to file / etc / hosts.allow.
Hereinafter cracker have to identify weak network component and can in conquered. Cracker can program using in Linux like ADMHACK, mscan, nmap and many other small scanner. Program like ' ps & ' netstat' in making trojan (remember horse story of troya? in classic story of ancient Yunani) to hide process of scanning. To cracker which enough advanced earn scanning aggressive-SNMP using for the scan of equipments with SNMP.
After success cracker identify weak network component and can in conquered, hence cracker of program runing for the conquered of program of daemon weak in server. program of Daemon is program in server which usually walk behind the scenes (as daemon / devil). Efficacy of program conquered of daemon this will enable a Cracker to obtain get to access as ' root' (highest administrator in server).
To camouflage, a cracker usually operate sweeping ' clean-up' operation by cleaning various file logarithm. And enhance program to enter from back door ' backdooring'. Changing file . rhosts in / usr / bin to facilitate to access to machine which in conquered through rsh & csh.
Hereinafter a cracker can use machine which have diconquered for the sake of alone him, for example taking sensitive information which shouldn't read of other machine cracking jumped out of machine which in conquered installing sniffer to see / to noting various trafik / late communications even can kill system / network by running comand ' rm - rf &'. Last will very fatal as a result because system will fall to pieces is at all, especially if all software in putting in harddisk. Process re-install entire/all system have to in conducting, will confused by if this matter is conducted by in machines running critical mission.
Therefore all machine & router running critical mission better always in checking it’s security & in patch by newer software. Back up to become important once especially at machines running critical mission is so that saved from act of cracker which is system disable with 'rm - rf &'. Everyday for us struggle in Internet usually exactly will very is esteeming of existence all hacker (is not Cracker). Because blessing all Internet hacker there is and earn us enjoy like this time, even continue in improve repairing to become better system again. Various weakness of system in improve repairing because friends cleverness of hacker which frequently do repair. Voluntaryly because hobby. More than anything else oftentimes result of hacking in propagating free in Internet for society of Internet. A value & cultural of excellency mutual assistance exactly grow in illusory world of Internet which usually impress futuristik and far from feeling social.

Thanks for reading & sharing Obay Corps

Previous
« Prev Post

0 komentar:

Cari di Blog Ini

Popular Posts