Sunday, April 5, 2015

Conclusion



As a conclusion,not every computer in this world is safe.Computer will always exposed to any kind of threat or attack.An attack usually is perpetrated by someone with bad intentions ,like Black hatted attacks falls in this category.These people will do anything to hack into your personal information in your computer.Computer users should install security software to prevent any kind of network attack such as antivirus.So,we should install security software in order to avoid the threat of network attack.





Saturday, April 4, 2015

Symptom Of Network Attack

An infected computer has one or more of the following symptom:

1. Operating System run much slower than usual.

2. Avaible memory is less than expected.

3. File become corrupted.

4. Screen display unsual message or image.

5. Music or unusual sound play randomly

6. Existing program and file disappear.

7. Program or file do not work properly.

8. Unknown program or files mysteriously appear
.
9.  System property change.

10. Operating System does not start up.

11. Operating System shut down unexpectedly.

Friday, April 3, 2015

Software to prevent viruses

    Tips for preventing viruses and other malware.

    1. Never start a computer with removeable media inserted in the drives or plugged in the port,unless the media are uninfected.

    2.Never open an e-mail attachment unless you are expecting it and it is from trusted source.

    3. Set the macro security in the program so that you can enable or disable macros.Enable macros only if the document is from a trusted source and you are expecting it.

    4. Install an antivirus program on all of your computer.Update the software and the virus signature  files regularly.

    5. Scan all download program for virus or other malware.

    6. If the antivirus program flags an e-mail attachment as infected,delete or quarantine the attacment immediately.

    7. Before using any removeable media,Scan the media for malware.Follow this procedure even for shrink-wrapped software from major developers.Some commercial software has been infected and distributing to unsuspecting users.

    8. Install a firewall program.

    9. Stay informed about new virus alert and virus hoaxes.        




    History of Internet and Network attack

    Today the dominant basis for data communications worldwide was a new concept at the time of the conception of the ARPANET. Prior to the advent of packet switching, both voice and data communications had been based on the idea of circuit switching, as in the traditional telephone circuit, wherein each telephone call is allocated a dedicated, end to end, electronic connection between the two communicating stations. Such stations might be telephones or computers. The (temporarily) dedicated line is typically composed of many intermediary lines which are assembled into a chain that stretches all the way from the originating station to the destination station. With packet switching, a data system could use a single communication link to communicate with more than one machine by collecting data into datagrams and transmitting these as packets onto the attached network link, as soon as the link becomes idle. Thus, not only can the link be shared, much as a single post box can be used to post letters to different destinations, but each packet can be routed independently of other packets.
    The earliest ideas for a computer network intended to allow general communications among computer users were formulated by computer scientist J. C. R. Licklider of Bolt, Beranek and Newman (BBN), in April 1963, in memoranda discussing the concept of the "Intergalactic Computer Network". Those ideas encompassed many of the features of the contemporary Internet. In October 1963, Licklider was appointed head of the Behavioral Sciences and Command and Control programs at the Defense Department's Advanced Research Projects Agency (ARPA). He convinced Ivan Sutherland and Bob Taylor that this network concept was very important and merited development, although Licklider left ARPA before any contracts were assigned for development.
    Sutherland and Taylor continued their interest in creating the network, in part, to allow ARPA-sponsored researchers at various corporate and academic locales to utilize computer provide by ARPA, and, in part, to quickly distribute new software and other computer science results. Taylor had three computer terminals in his office, each connected to separate computers, which ARPA was funding: one for the System Development Corporation (SDC) Q-32 in Santa Monica, one for Project Genie at the University of California, Berkeley, and another for Multics at the Massachusetts Institute of Technology. . That idea is the ARPANET.
    Meanwhile, since the early 1960s, Paul Baran at the RAND Corporation had been researching systems that could survive nuclear war and presented in the United Kingdom National Physical Laboratory (NPL) the first public demonstration of packet switching on 5 August 1968.

    Source:wikipedia






    Thursday, April 2, 2015

    Advantage and disadvantage of network attack

    What is hacking?
    Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.


    Advantages of hacking
    -Can be used to recover lost information where the computer password has been lost.
    -Teaches u that no technology is 100% secure
    -To test how good security is on your own network. ;) 
    They call it white hat computer hacking.
    -hacking is good with games especially when you are online but the only problem is
    if the gaming server finds out that you have been hacking then you could get chucked off the gaming server so watch out


    Disadvantages of hacking

    -Criminals can use it to their advantage.
    -It can harm someone's privacy
    -It's Illegal.
    -It destroys other works

    source:http://tissans.blogspot.com/2011/11/define-hacking-advantages-and.html 

    Network Security

    NETWORK SECURITY

    The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
    There is a estimates that 60 to 80 percent of network misuse comes from inside the enterprise where the misuse has taken place.
    With the development of large open networks, security threats have increased significantly in the past 20 years. Hackers have discovered more network vulnerabilities, and because you can now download applications that require little or no hacking knowledge to implement, applications intended for troubleshooting and maintaining and optimizing networks can, in the wrong hands, be used maliciously and pose severe threats.

    Types of attack:
    Classes of attack might include passive monitoring of communications, active network attacks, close-in attacks, exploitation by insiders, and attacks through the service provider. Information systems and networks offer attractive targets and should be resistant to attack from the full range of threat agents, from hackers to nation-states. A system must be able to limit damage and recover rapidly when attacks occur.
    There are five types of attack:


    Passive Attack
    passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks. Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Passive interception of network operations enables adversaries to see upcoming actions. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user
    .
    Active Attack
    In an active attack, the attacker tries to bypass or break into secured systems. This can be done through stealth, viruses, worms, or Trojan horses. Active attacks include attempts to circumvent or break protection features, to introduce malicious code, and to steal or modify information. These attacks are mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or attack an authorized remote user during an attempt to connect to an enclave. Active attacks result in the disclosure or dissemination of data files, DoS, or modification of data.

    Distributed Attack
    distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.
    Insider Attack

    An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be malicious or no malicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users. No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task

    NETWORK SECURITY RECONNAISSANCE ATTACK
    A reconnaissance attack occurs when an adversary tries to learn information about your network
    Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.
    Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.
    Reconnaissance is somewhat analogous to a thief investigating a neighborhood for vulnerable homes, such as an unoccupied residence or a house with an easy-to-open door or window. In many cases, intruders look for vulnerable services that they can exploit later when less likelihood that anyone is looking exists.



    Wednesday, April 1, 2015

    How that work!

    1.  A Remote Access Trojan (RAT) is malware program thatgive an intruder administractive control over a  target computer.RATS are usually downloaded invisibly with a-user-requested program such as game or sent as an email attachment.Once the host system is compromise,the intruder may use it to distribute more RAT for botnet

    2. A keylogger is hardware device or small program that monitor each keystroke a user types on a specific computer's keyboard.As a hardware device,a keylogger is a small baterry sized plug that servers as a connector between the user's keyboard and computer

    3. On the internet,distributed denial of service(DdoS) attack is one in which a multitude of        compromise system attack a single target,thereby causing a denial of service for users of the targeted  system

    4.A denial of service(Dos)attack is a malicious attempt to make a server or network resource unavailable to users ,usually by temporarily interrupting or suspending the service of a host connected to the internet.



    5.A brute force is a trial and error method to use information such as password and personal identification number (PIN).In brute force attack,automated software is used to generate a large number of consecutive guesses as to as the value of the desired data.Brute force attack may be used by criminal to cracked encrypted data,or by security analyst to test an organizations network security.



    6 Sniffing is the technique that is used for intercepting took this or steal or diffrent data traffic on a network.For example,there are 3 computers connected together via a single link.When computer A to computer B intercouse,then the pull of this technique is the computer C (sniffer) that are in the network can participate listen to and record all activities performed by the computer A and computer B.Computer C would then pretend be computer B to A.thus,if lucky then the password to enter or access of both system can get easily.


    7. A botnet is a collection of internet connected program communicating with other similar program in order to perform task.This can be as mudane as keeping control of Internet Relay Chat (IRC) channel,or it could be used to send spam email or participate in distribute of denial of service attacks


    8.Website defacement is attack on a website that change the visual appereance of the website or web page.This is typically of the work of the system crackers,who break into a system server and replace the hosted website of one of their own.Defacement is generally meant of the kind of electronic grafiti,althought recently it has become a means to spread messages by politically motivate "cyber protesters" or hacktivits.


    9.Phishing is an email fraud in which perpetrator send out legitimate looking email in an attempt to gather personal and financial information from recipients.


    10.Worm is self replication viruses that does not alter file but resides in active memory and duplicate itself.


    11. Hijacking is a type of network security attack in which the attacker takes control of the communication-just an airplane hijacker takes control of the flight-between two entities and masquerades one of them.

    12.Sql injection is a type of security exploit in which the attacker adds Structured Query Language (Sql) code to a web form input box to gain access to resources or make change to data.




    Source:http://searchsecurity.techtarget.com/

    Tuesday, March 31, 2015

    Type of internet and network attack

    Type of Internet and Network Attack


    There are many type of Internet and Network Attacking that other people don't know what is it. Here we will show it.

    1. Rat

    2. Keylogger

    3. Ddos

    4. Dos

    5. Brute force

    6. Sniffing

    7. Botnet

    8. Defacing

    9. Pishing

    10. Worm

    11. Hijacking

    12. Sql Injection

    There is the type of internet and network attack but there is many more that we don't know what other type of attack. next post we will discuss how that type work on internet and network attack.



    Network Attack Surface

    The network attack surface is the totality of all vulnerabilities in connected hardware and software that are accessible to unauthenticated users.

    Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or capture data from.

    A network’s attack surface is most often exploited through remote access and intrusion but Wi-Fi and even local area networks (LANs) must also be considered in a complete view of the attack surface.

     A complete attack surface analysis is crucial to proper set up of breach detection systems (BDS), firewall, intrusion prevention systems, data policy and other security measures. Many attack approaches exploit a combination of attack surface types to gain access to desired resources


    .
    Mean Of Vulnerablities = is a weakness which allows an attacker to reduce a system's information assurance
    Mean Of Malware =  is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs
    Mean Of APTs = An advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The purpose of an APT attack is to steal data rather than to cause damage

    How Does The Internet Work?


    How does the Internet work? Good question! The Internet's growth has become explosive and it seems impossible to escape the bombardment of www.com's seen constantly on television, heard on radio, and seen in magazines. Because the Internet has become such a large part of our lives, a good understanding is needed to use this new tool most effectively.
    This whitepaper explains the underlying infrastructure and technologies that make the Internet work. It does not go into great depth, but covers enough of each area to give a basic understanding of the concepts involved. For any unanswered questions, a list of resources is provided at the end of the paper. Any comments, suggestions, questions, etc. are encouraged and may be directed to the author at rshuler@gobcg.com.


    Where to Begin? Internet Addresses

    Because the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address. (IP stands for Internet Protocol; more on this later.)
    The picture below illustrates two computers connected to the Internet; your computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8. The Internet is represented as an abstract object in-between. (As this paper progresses, the Internet portion of Diagram 1 will be explained and redrawn several times as the details of the Internet are exposed.)


    Diagram 1
    Diagram 1
    If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP address.





    source from this web . CLICK HERE

    Introduction of Internet and Network

    Internet


    A means of connecting a computer to any other computer anywhere in the world via dedicated routers and serversWhen two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs.

    Network

    A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.



    Example of Network 



    • Personal area network, or PAN
    • Local area network, or LAN
    • Metropolitan area network, or MAN
    • Wide area network, or WAN

    Friday, March 13, 2015

    About Us !

    Welcome to Blog Network Attacking 


    My name is Sheikh Amin Bin Habib Rahman. I from Perak and learning in the field of information technology. I am 19 years old. I do this blog to tell everybody about the internet and network attacking. Tq ;)

    My name is Wan Saiful Aidie Bin Wan Samson.I from Penang and learning Information Technology UNIKL
    I am 19 years old.I am the leader of this group.I hope this blog will give benefit to everyone.

    My name is Muhammad Haziq Bin Sulaiman.I am from Shah Alam Selangor and study Information Technology in Unikl.I am 19 years old.Me and my group will present you about Network Attacking in this Blog.

    My name is Wan Nor Diana binti Mior Daniel. I came from Seri Iskandar Perak and study course Information Technology at Unikl MIIT. I'm 19 years old.

    My name is Amirul Syafiq Widad bin Ahmad Rizal.I am 19 years old.I am from Wangsa Maju Kuala Lumpur and currently studying information technology at Unikl Miit.