The Abc's Of 'hacking' Part 1

1832 words - 7 pages

Hacking is a practice done by the samurai warriors aptly named 'Consultants' securing the information infrastructure of the future. With more patience and persistence than any real technical skill they pound for minutes on end configuring their networks and manipulating webs of other LANs laying LAN mines for future warriors to find and conquer that gauntlet of challenge kept alive in the unending game of cat and mouse.The nine steps of Hacking are Reconnaissance/Discovery, Scanning, Enumeration, Penetration, Penetration, System Elevation, Network Elevation. Expansion, and Housekeeping.The first step is to decide the target you want to hit. It maybe the guy across the street, or the guy in your class that really perturbs you but really do not want to physically hurt him and also you want to play a practical joke on him without him ever finding out that it was you. With that known you can get probably enter the next step. For example, if the target were a person across the street you can probably sniff your community cable network segment traffic and intercept packets for purposes I will explain for later. You can probably try to intercept network traffic through war driving, but that will be explained later. For public institutions like companies and education centers like universities you can go ICANN and do a reverse DNS lookup and find out the publicly available IP addresses allocated to that company. Those different address ranges are the point of your attack.If you are confused with all the technical jargon I just wrote down I will explain each part now. To sniff is have a program sitting on your computer look beyond your computer, possibly your own home network and analyze how your target is surfing the internet, transferring information in his own network and the like. You are asking the question: Why do you need to sniff the traffic, can't you just get into his network? Sometimes you can but in 99.9% of the time you can't. By default, most networks even home networks with file sharing turned on is secure from the ordinary user to stumble upon his/her files residing on her computer. Also, because most Operating Systems, the control center that run your home computer like Windows XP, have built in firewalls an outsider can not readily impersonate a workstation in home network, because without being physically connected to the router, switch, or hub you won't have an internal local address like 192.168.8.xx. Sniffing traffic is a method of gathering enough outgoing and sometimes ingoing information that you can get access to their network.Let's start off; DSL is more secure than Cable internet access. In Cable the whole neighborhood shares that one connection of allocated bandwidth from the ISP to share. That is why in some versions of Windows 98 when you would open Network Neighborhood and had mutually turned on services of file sharing you can actually see the contents of your neighbors computer if you and he/she had your computer's turned...

Find Another Essay On The ABC'S of 'Hacking' Part 1

Globalisation of the Media Part 1 - Ownership

2339 words - 9 pages Essay #1 - Media OwnershipMass media is ideally what its name suggests, a voice for the masses. But, as the line between the business and editorial side of journalism grows hazier, it is instead becoming a tool for the minority of corporate and political elites. Increasingly concentrated ownership has created an oligopoly in the media industry. The result is homogenized and watered down content heavily influenced by owner and advertiser

The Purpose of Part 1: Beloved

557 words - 2 pages The Purpose of Part One: BelovedRhetoric plays a big part in Beloved for several reasons, two of the main ones being that it helps to characterize the extremely unique and different characters while also helping the reader understand the themes and motifs that Morrison is trying to convey as well as the relationships which the characters have.When describing the way Beloved watched Sethe, Morrison writes, "Sethe was licked, tasted, eaten by

the benefit of hacking

1491 words - 6 pages absolutely be that at times, but it is an important part of the digital world. Hacking has contributed to the evolution of cyber space and without it programs would have never reached the current abilities. All hacking does this, not just White Hat hacking. All build structures, even digital, must first be taken apart so that it can be rebuilt stronger. When someone hacks something someone else creates a way to stop the other, which effetely makes it

Part 1: Lord of the Flies vs the crusible

2276 words - 9 pages Part 1: Lord of the FliesCompare and contrast the characters you played in Lord of the Flies with the roles of the girls in Act 3 of The Crucible. You must refer to your performance of your role; you must quote specific moments /lines from both plays where relevant.The Era they are set in, and the way we used movementIn Lord of the Flies our group played the characters as twenty-first century girls, whereas in the Crucible the girls lived in the

The Uniform Crime Reports -Part 1 offenses

600 words - 2 pages The Uniform Crime Reports (UCR) is an annual FBI publication that summarizesthe incident and crime rate of reported crimes throughout the United States. The UCRProgram was designed to permit comparison over time through construction of a CrimeIndex. The Crime Index is an inclusive measure of the violent and property crimecategories of the UCR. The Uniform Crime Reports also include information on what theFBI calls Part 1 Offenses. These offenses

Anita Desai's "Village by the Sea": Chapter 1, part 1.

1711 words - 7 pages and lets the reader imagine the sound that is coming from the bird. Throughout this part, the bird's colors and voices is re-enacted to give the reader a real picture of the happenings in the village. This is like the "voice of the village" along with the "roar of the waves and the wind in the palms". There seems to be a harmony in nature that "seemed to tell Lila to be calm and happy and all would be well and all would be just as it was before

The War on Drugs: Failures of the Drug Law Part 1

1685 words - 7 pages . This demonstrates the extent of the dangers that drug users entail for the society and the failure of the policies in curbing these illicit activities. Works Cited 1. Becker, Gary S., and Kevin M. Murphy. "Have We Lost the War on Drugs?" WSJ.com. 2. Benson, Bruce L., David W. Rasmussen, and David L. Sollars. "Police bureaucracies, their incentives, and the war on drugs." Public Choice 83.1-2 (1995): 21-45. 3. "Drugs and

China: Pros and Cons of the Regional Comprehensive Economic Partnership Part 1

1502 words - 6 pages Comprehensive Economic Partnership is that it has the potential to boost China’s GDP. In the third quarter of 2011, China’s GDP growth was at an all-time high of 2.5%, as shown in Figure 1. Following that peak, it saw a decline and has not been able to reach that point since. It has been on a constant decline since the fourth quarter of 2013, hitting one of its lowest points recently in the second quarter of 2014 of 1.4%. The countries in this agreement

The Use of Hacking to Identify Weaknesses in Computer Security

1740 words - 7 pages , to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses: 1. Unauthorised access to computer material. 2

Developmental Origins of Resident Central Nervous System Microglia Part 1

2164 words - 9 pages arise in studying hematopoiesis: 1) the primary site (e.g. yolk sac, aorta-gonad-mesenephros, fetal liver, bone marrow) to generate HSCs shifts during embryonic development and 2) the migration of HSCs through the developing vasculature following the onset of circulation. Microglia, as well as CNS-associated macrophages, are tissue-resident macrophages in the CNS derived from mononuclear phagocytes. Mononuclear phagocytes originate from HSCs

Part of the Pack

3875 words - 16 pages had loved him dearly and would always watch over him. No Catelyn Stark could never be his mother and she never pretended she was. On his worst days he wished she had pretended. Maybe he would be a part of their family, if he felt like their son and not the orphaned nephew. It wasn’t fair he knew and deep down he knew he might have resented them more had they pretended to be his parents but he still wishes he had parents like them. Two people who

Similar Essays

The Abc's Of 'hacking' Part 2

1421 words - 6 pages in class of this utility and brought its importance to the forefront. Although I knew that the ARP utility was important I didn't know exactly that if it were not part of the TCP/IP protocol suite that the internet and networks will all crawl to a standstill. We used this utility in class but didn't change the individual mac addresses on the ARP table for each computer, but this article gave me hands on material to actually see how ARP poisoning

A Beginner's Guide To Hacking Part 1

1755 words - 7 pages proper command (which is 'start notepad') to the kernel, which runs through all the scripts required to open Notepad, and then opens it. It calls the shell and says, "Done. Tell the GUI layer to open such and such scripts to display it interactively.". They shell relays this to the GUI, which displays an interactive Notepad window.This concludes part 1 of my basics tutorial.BIBLIOGRAPHY:I WROTE THIS OUT OF KNOWLEDGE. NO ACTUAL SOURCES EXCEPT MY MIND.

Abc's Of The American Revolution Essay

2215 words - 9 pages brought freedom to this country, which makes him an important part of the Revolution. “Happiness and moral duty are inseparably connected.” G is for King George III. King George III was known for many things, but one of them was not his vast intelligence. He was mocked by Patriots in the Declaration of Independence for being a “tyrant” and some, unlike John Hancock, wrote their names very small so he had trouble reading them. He was known for

Ethical Hacking: The Different Types Of Hacking

1061 words - 4 pages from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder. This type of hacking is known as an “inside hack,” as Mr. Snowden was on the inside when he illegally acquired the classified documents. Another form of hacking known in the technology world is called an “outside hack.” This type of hacking is when a user attempts to hack a remote server from a different