bullet Back

 

The open internet, be aware:

Data communication is insecure. The main goal in the early days of computer communication was probably not to secure the data, but to get the data through.  Internet is using the same protocol as if only a few local university computers were to send information to each other.

 

Where to listen to our data:

 

bullet optical cables (bend the wires and you get leaks)
bullet ethernet (all ethernet stations are monitoring the transmission to avoid collisions, it's possible to configure a system to read all of the information it receives and load it to a file)
bullet tcp/ip (information travel openly, like your mail details or pop3 password (post office protocol) )
bullet hubs/routers/wireless (can physically connect to a hub or router or wireless)
bullet twisted pair cabling (sniffs the signal by measuring the electromagnetic radiation)
bullet Space-Based Transmissions
bullet Leased point-to-point WAN (wide area networks)

 

What a hacker would do:

 

bullet

Profiling/footprinting (find out as much as possible about the company, he/she might call you or talk to you and ask questions about who is in charge and maybe also about the computer network generally).

bullet

Scanning (will sit on the outside and scan the data ports for where to get in and might be using a machine not belonging to him or her since they might have hacked through on a different machine and is using another persons IP address)

bullet

Enumeration (tries to find passwords and users on the network)

bullet

Exploiting (stealing data or other information)

 

bullet

Back to start