Thursday, April 2, 2015

Advantage and disadvantage of network attack

What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.


Advantages of hacking
-Can be used to recover lost information where the computer password has been lost.
-Teaches u that no technology is 100% secure
-To test how good security is on your own network. ;) 
They call it white hat computer hacking.
-hacking is good with games especially when you are online but the only problem is
if the gaming server finds out that you have been hacking then you could get chucked off the gaming server so watch out


Disadvantages of hacking

-Criminals can use it to their advantage.
-It can harm someone's privacy
-It's Illegal.
-It destroys other works

source:http://tissans.blogspot.com/2011/11/define-hacking-advantages-and.html 

Network Security

NETWORK SECURITY

The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
There is a estimates that 60 to 80 percent of network misuse comes from inside the enterprise where the misuse has taken place.
With the development of large open networks, security threats have increased significantly in the past 20 years. Hackers have discovered more network vulnerabilities, and because you can now download applications that require little or no hacking knowledge to implement, applications intended for troubleshooting and maintaining and optimizing networks can, in the wrong hands, be used maliciously and pose severe threats.

Types of attack:
Classes of attack might include passive monitoring of communications, active network attacks, close-in attacks, exploitation by insiders, and attacks through the service provider. Information systems and networks offer attractive targets and should be resistant to attack from the full range of threat agents, from hackers to nation-states. A system must be able to limit damage and recover rapidly when attacks occur.
There are five types of attack:


Passive Attack
passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks. Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Passive interception of network operations enables adversaries to see upcoming actions. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user
.
Active Attack
In an active attack, the attacker tries to bypass or break into secured systems. This can be done through stealth, viruses, worms, or Trojan horses. Active attacks include attempts to circumvent or break protection features, to introduce malicious code, and to steal or modify information. These attacks are mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or attack an authorized remote user during an attempt to connect to an enclave. Active attacks result in the disclosure or dissemination of data files, DoS, or modification of data.

Distributed Attack
distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.
Insider Attack

An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be malicious or no malicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users. No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task

NETWORK SECURITY RECONNAISSANCE ATTACK
A reconnaissance attack occurs when an adversary tries to learn information about your network
Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.
Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.
Reconnaissance is somewhat analogous to a thief investigating a neighborhood for vulnerable homes, such as an unoccupied residence or a house with an easy-to-open door or window. In many cases, intruders look for vulnerable services that they can exploit later when less likelihood that anyone is looking exists.



Wednesday, April 1, 2015

How that work!

1.  A Remote Access Trojan (RAT) is malware program thatgive an intruder administractive control over a  target computer.RATS are usually downloaded invisibly with a-user-requested program such as game or sent as an email attachment.Once the host system is compromise,the intruder may use it to distribute more RAT for botnet

2. A keylogger is hardware device or small program that monitor each keystroke a user types on a specific computer's keyboard.As a hardware device,a keylogger is a small baterry sized plug that servers as a connector between the user's keyboard and computer

3. On the internet,distributed denial of service(DdoS) attack is one in which a multitude of        compromise system attack a single target,thereby causing a denial of service for users of the targeted  system

4.A denial of service(Dos)attack is a malicious attempt to make a server or network resource unavailable to users ,usually by temporarily interrupting or suspending the service of a host connected to the internet.



5.A brute force is a trial and error method to use information such as password and personal identification number (PIN).In brute force attack,automated software is used to generate a large number of consecutive guesses as to as the value of the desired data.Brute force attack may be used by criminal to cracked encrypted data,or by security analyst to test an organizations network security.



6 Sniffing is the technique that is used for intercepting took this or steal or diffrent data traffic on a network.For example,there are 3 computers connected together via a single link.When computer A to computer B intercouse,then the pull of this technique is the computer C (sniffer) that are in the network can participate listen to and record all activities performed by the computer A and computer B.Computer C would then pretend be computer B to A.thus,if lucky then the password to enter or access of both system can get easily.


7. A botnet is a collection of internet connected program communicating with other similar program in order to perform task.This can be as mudane as keeping control of Internet Relay Chat (IRC) channel,or it could be used to send spam email or participate in distribute of denial of service attacks


8.Website defacement is attack on a website that change the visual appereance of the website or web page.This is typically of the work of the system crackers,who break into a system server and replace the hosted website of one of their own.Defacement is generally meant of the kind of electronic grafiti,althought recently it has become a means to spread messages by politically motivate "cyber protesters" or hacktivits.


9.Phishing is an email fraud in which perpetrator send out legitimate looking email in an attempt to gather personal and financial information from recipients.


10.Worm is self replication viruses that does not alter file but resides in active memory and duplicate itself.


11. Hijacking is a type of network security attack in which the attacker takes control of the communication-just an airplane hijacker takes control of the flight-between two entities and masquerades one of them.

12.Sql injection is a type of security exploit in which the attacker adds Structured Query Language (Sql) code to a web form input box to gain access to resources or make change to data.




Source:http://searchsecurity.techtarget.com/

Tuesday, March 31, 2015

Type of internet and network attack

Type of Internet and Network Attack


There are many type of Internet and Network Attacking that other people don't know what is it. Here we will show it.

1. Rat

2. Keylogger

3. Ddos

4. Dos

5. Brute force

6. Sniffing

7. Botnet

8. Defacing

9. Pishing

10. Worm

11. Hijacking

12. Sql Injection

There is the type of internet and network attack but there is many more that we don't know what other type of attack. next post we will discuss how that type work on internet and network attack.



Network Attack Surface

The network attack surface is the totality of all vulnerabilities in connected hardware and software that are accessible to unauthenticated users.

Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or capture data from.

A network’s attack surface is most often exploited through remote access and intrusion but Wi-Fi and even local area networks (LANs) must also be considered in a complete view of the attack surface.

 A complete attack surface analysis is crucial to proper set up of breach detection systems (BDS), firewall, intrusion prevention systems, data policy and other security measures. Many attack approaches exploit a combination of attack surface types to gain access to desired resources


.
Mean Of Vulnerablities = is a weakness which allows an attacker to reduce a system's information assurance
Mean Of Malware =  is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs
Mean Of APTs = An advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The purpose of an APT attack is to steal data rather than to cause damage

How Does The Internet Work?


How does the Internet work? Good question! The Internet's growth has become explosive and it seems impossible to escape the bombardment of www.com's seen constantly on television, heard on radio, and seen in magazines. Because the Internet has become such a large part of our lives, a good understanding is needed to use this new tool most effectively.
This whitepaper explains the underlying infrastructure and technologies that make the Internet work. It does not go into great depth, but covers enough of each area to give a basic understanding of the concepts involved. For any unanswered questions, a list of resources is provided at the end of the paper. Any comments, suggestions, questions, etc. are encouraged and may be directed to the author at rshuler@gobcg.com.


Where to Begin? Internet Addresses

Because the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address. (IP stands for Internet Protocol; more on this later.)
The picture below illustrates two computers connected to the Internet; your computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8. The Internet is represented as an abstract object in-between. (As this paper progresses, the Internet portion of Diagram 1 will be explained and redrawn several times as the details of the Internet are exposed.)


Diagram 1
Diagram 1
If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP address.





source from this web . CLICK HERE

Introduction of Internet and Network

Internet


A means of connecting a computer to any other computer anywhere in the world via dedicated routers and serversWhen two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs.

Network

A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.



Example of Network 



  • Personal area network, or PAN
  • Local area network, or LAN
  • Metropolitan area network, or MAN
  • Wide area network, or WAN

Friday, March 13, 2015

About Us !

Welcome to Blog Network Attacking 


My name is Sheikh Amin Bin Habib Rahman. I from Perak and learning in the field of information technology. I am 19 years old. I do this blog to tell everybody about the internet and network attacking. Tq ;)

My name is Wan Saiful Aidie Bin Wan Samson.I from Penang and learning Information Technology UNIKL
I am 19 years old.I am the leader of this group.I hope this blog will give benefit to everyone.

My name is Muhammad Haziq Bin Sulaiman.I am from Shah Alam Selangor and study Information Technology in Unikl.I am 19 years old.Me and my group will present you about Network Attacking in this Blog.

My name is Wan Nor Diana binti Mior Daniel. I came from Seri Iskandar Perak and study course Information Technology at Unikl MIIT. I'm 19 years old.

My name is Amirul Syafiq Widad bin Ahmad Rizal.I am 19 years old.I am from Wangsa Maju Kuala Lumpur and currently studying information technology at Unikl Miit.