Talk With an Expert

Battle for the Internet: The War is On!

Battle for the Internet: The War is On! (PDF, 2.23MB)Published: 03 Jun, 2003
Created by:
Kevin Owens

There is a battle raging between security professionals and hackers. By placing people into the shoes of a hacker, and teaching them the skills to gain access to a system, one is better able to defend against them. As a hacker, we dig up information on companies/individuals by mirroring their websites, using search engines, whois databases and traceroute. Next, we move to 'Scanning.' We ping their computers look at which ports are open identify their operating system map their networks and see if they have any available modem connections. Then we move to 'Enumeration' looking at valid user accounts and network shares. To 'Gain Access' we search for vulnerabilities our opponent has crack their passwords and sniff the data on their network. 'Escalating Privilege' is the next step to go from a low-level user account to having administrator equivalency. With these privileges we manipulate files and directories to help us 'Maintain Access' with the help of backdoors rootkits and Trojans. Lastly we 'Cover Our Tracks' by modifying or deleting log files hide files and use protocols covertly to hide what we are doing. If computer security professionals stay on the cutting edge of hacker tools and methods of entry they will be able to defeat hackers before they even get started on your systems.