![]() ![]() Telnet) on any Internet-accessible computer will allow the intruder to gain access to the LAN and spread his control over the infrastructure. Thus, a hacker cannot have direct access from the Internet, which presents a certain problem for him. Under normal conditions, it is hardly to compromise LAN security from the Internet, because in most cases LANs are tied to the Internet via reserved addresses such as type 10.0.0.0 or 192.168.0.0 – (for more details, see the RFC 1918 document available at ). This is a certain kind of spoofing where the intrusion logs fool the target system into believing that it is communicating with another, legitimate computer rather than that of an intruder. Perhaps the most common reason hackers tend to settle on another system is the possibility of creating launch pads that attack other computers while disguised as innocent computer addresses. ![]() In some cases, they use compromised machines as launch points for massive Denial of Service attacks. These types of software tend to yield instant access to the system to continuously steal various types of information from it – for example, strategic company’s designs or numbers of credit cards. Obviously, hackers have a variety of motives for installing malevolent software (malware). What is malevolent software intended for? They use sophisticated techniques to install specific “malware” (backdoors) to let them in again later with full control and in secret. ![]() Often electronic intruders do not wish to create a spectacle but prefer to avoid fame by hiding their presence on compromised systems, sometimes leaving certain unexpected things. Not every case of a successful intrusion is “crowned” with a replaced Web site on the server, data theft or damage. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |