ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Hacking A Profession

Updated on October 22, 2011

Small and medium sized IT businesses, from ISPs, call-centres to software and consultancy firms routinely deal with sensitive data. Keeping this information private and out of reach of competitors or disgruntled employees is extremely important in today's high-tech environment where proliferation of new technologies and devices are unprecedented.

This presents a constant threat from the popular hacker community. Hacking is no more a hobby; it is a profession that is no longer people look down at or scorned. The notion ‘to hack is to be bad' has been trashed and replaced with classification of white-hat and black-hat hackers who respectively hack with good and bad intentions.

I will very briefly go through the steps that typical hackers take, and how to counter them. It is only when we know how something works that we can take preventive and mitigating measures against it. In fact, this has been the idea behind some very successful books on the topic, for example, the Hacking Exposed series.

Foot Printing

Hackers begin with selecting a target, which can be either random or targeted. The next step is called ‘foot printing'. Here, hackers try to glean as much public information about the target as possible. Using a variety of freely available network scanning tools, an attacker can compile a comprehensive data set about target's networking including details like domain names in use and the associated IP address, DNS data, search engine-based and newspaper research data to get phone numbers and locations and e-mail addresses since this may result in discovery of more related networks like linkined sister-concerns. An application called Trace Route is also applied to discover network topology and access control devices in place.

Enumeration

This step makes use of foot printing information combined with scanning tools' results which provides data about live machines, their operating systems, names and version of applications running on them. Attackers can make use of free tools such as Nmap, and Netcat, and use a combination of TCP and UDP scan options. NetBIOS information, network file shares and even machines listening for dial-in connections can be detected using various such tools.

Tools such as Ping and automated network discovery utilities can be very useful if the target system administrators have not configured their systems properly to reject such traffic. The best countermeasure against scanning and enumeration is to disable services not in use, for instance, RPC is notorious for exploits and stop suspicious UDP traffic.

Stealth Walk

Using the known exploitable service and vulnerabilities harvested in the last step, attacker breaks in and may access or delete information, install backdoors or root-kits (to replace legitimate system calls with attacker's own versions to avoid detection) and remove system logs to cover their tracks. This can also involve addition of new users in the system and escalating privileges of some junior users for easy access later.

To counter this, it is imperative that no confidential information is placed in plain-text even behind a supposedly secure system since attackers often search for plain-text authentication detail in batch files and automation scripts.

Social Engineering

It is often said, and rightly so, that the weakest link in information security are the people. Social engineering is a threat that is ever persistent and has proved time and again to be externally dangerous. These include the time-tested network administration calling for password trick, innovative techniques like leaving a bunch of USB disks with malicious programs in a company, incite company's own employees and inadvertently install backdoors in their system. For this, only proper training and policy measures can be used to error-proof the system to maximum extent.

How to Fight Back?

There are a number of ways to counter the ever-emerging threats from the wild. The conventional wisdom asks for patching the system that is updating all user and server applications, hardening the operating systems by enabling recommended security settings and following the industry standard best practices like, firewall and anti-virus, besides scouting the vendor or vulnerability disclosure sites for regular security updates.

The next common task is to change the default exploitable settings including all common usernames and password combinations and the administrative settings which give out identification of systems and network devices.

Going a step further, there could be some proactive measures as well, like actively obscuring the banner-type information in an attempt to misguide the attackers, or performing monitoring through IDS (Intrusion Detection System) with well-defined parametres to counter emerging threats rather than relying on defaults.

For all these measures to be effective, there must be policies and procedures in place along with a review and oversight mechanism.

Here, it is worth mentioning that in small and medium-sized organisations, data leaks do take place but are often not reported. This happens primarily because security implementation is misinterpreted as a restrictive measure although it has basically to do with knowing who should have what level of access and rights, without necessarily barring people from using the internet or LAN sharing. This is why it is important to have either a dedicated or a shared resource in an organisation, who as part of job description, takes responsibility of managing enterprise security.

However, such management alone is not enough as some of the specular attacks occur due to insider involvement or some silly mistake. For instance, plugging a company laptop insecurely during a demo at prospective client or during an exhibition can be catastrophic no matter how much secure the company network is.

Therefore, it must be kept in mind that the security can never be implemented in an ad-hoc product installation type approach. Rather, it requires formation of security culture and constant awareness.

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      darkcarn 

      9 years ago

      i concur

    • profile image

      BBSec 

      9 years ago

      There are many great open source tools such as Nmap, OpenVas (or Nessus no longer open source) and nikto for website testing that allow checking of vulnerable services. You can run these tools to test the security of your website or home internet connection to see if you are vulnerable to hackers.

      Once you have secured your internet facing services the next step would be to ensure you are safe from client based attacks - update all software on your PC's, run antimalware software and keep it up to date and do not click on unknown links.

      The biggest weapon against hackers is user awareness.

    • hassam profile imageAUTHOR

      hassam 

      10 years ago from Pakistan

      Yes you are right a person has to be really careful and it is the job of all the good on the internet people to spread this awareness.

    • cgull8m profile image

      cgull8m 

      10 years ago from North Carolina

      There are good and bad hackers, but there are too many vulnerabilities which the common users are not aware off, we have to be very careful.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)