Sunday 11 August 2013

Basics of Hacking


Linux live cd is good option to take files from computer without logging in.When you boot with linux live cd it does not understand windows permission so you can boot into any computer without password and copy files

Hacking is any non conventional way of interacting with computer

using backdoor url used for testing in windows
easter eggs extra feature that programmers aded so that only programmers can make use of .Eg cheat words in games

host file is kept in system 32 folder whenever you put a address in browser it usually looks in the host file if it cannot find then it goes to local dns (which can be your server if in office network) otherwise it goes to public dns

if you install a antivirus it might make a lot of entires in host file and point them to local so that you cant access sites which it consider has viruses

you can use a alternate public dns like opendns.org which has list of sites which are harmful and you can configure so taht everytime your employees try to go to these sites it blocks them

host file can be easily changes with scripts in xp but in windows 7 it wil give a pop up yes no.if you have set a administrator password for your machine then only user with admin access can change host files

Hacking windows registery 

registery can be edited to changes setting like hide task manager proxy serves start up task . scripts can edit your reqistery when you click on certain sites scripts can be embedded that can make this change






below are some of denial of service attacks

•Ping of Death - bots create huge electronic packets and sends them on to victims
•Mailbomb - bots send a massive amount of e-mail, crashing e-mail servers
•Smurf Attack - bots send Internet Control Message Protocol (ICMP) messages to reflectors, see above illustration
•Teardrop - bots send pieces of an illegitimate packet; the victim system tries to recombine the pieces into a packet and crashes as a result


A ping of death (abbreviated "PoD") is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 56 bytes in size (or 84 bytes when the Internet Protocol [IP] header is considered); historically, many computer systems could not handle a ping packet larger than the maximum IPv4 packet size, which is 65,535 bytes. Sending a ping of this size could crash the target computer


Generally, sending a 65,536-byte ping packet would violate the Internet Protocol as written in RFC 791, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.


The Smurf Attack is a denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. Most devices on a network will, in their default settings, respond to this by sending a reply to the source IP address. If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooding with traffic. This can slow down the victim's computer to the point where it becomes impossible to work on.

IP Spoofing In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system.[1]

ICMP request are usually request for machine information and all that


A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address is typically received by all network-attached hosts, rather than by a specific host.

 A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most effective by using the flood option of ping which sends ICMP packets as fast as possible without waiting for replies. Most implementations of ping require the user to be privileged in order to specify the flood option. It is most successful if the attacker has more bandwidth than the victim (for instance an attacker with a DSL line and the victim on a dial-up modem). The attacker hopes that the victim will respond with ICMP Echo Reply packets, thus consuming both outgoing bandwidth as well as incoming bandwidth. If the target system is slow enough, it is possible to consume enough of its CPU cycles for a user to notice a significant slowdown.

A flood ping can also be used as a diagnostic for network packet loss and throughput issues.[1]

No comments:

Post a Comment