Preview

Cyber Crime How and Why Hackers Attacks Systems

Powerful Essays
Open Document
Open Document
1647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime How and Why Hackers Attacks Systems
IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959
International Research Journal of Management Science & Technology http:www.irjmst.com Page 243
Cyber crime How and Why Hackers attacks Systems - IRJMST
By Jagmender Singh
How and Why Attackers Use Proxies
Masking one 's IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity, thereby frustrating law enforcement efforts to identify the original location of the person(s) involved. A proxy allows actors to send network traffic through another computer, which satisfies requests and returns the result. Students or employees can use proxies to communicate with blocked services such as Internet Relay Chat (IRC) and instant messaging, or to browse websites that administrators block. Attackers also use proxies because Internet Protocol (IP) addresses are traceable, and they do not want to reveal their true locations. As one example, iDefense wrote about the fast-flux architecture (ID# 484463), which uses a proxy infrastructure to satisfy requests. Proxies are also a common source of spam e-mail messages, which use open relays (a simple mail transfer protocol [SMTP] proxy).
Proxies are useful to attackers in many ways. Most attackers use proxies to hide their IP address and, therefore, their true physical location. In this way, attackers can conduct fraudulent financial transactions, launch attacks, or perform other actions with little risk. While law enforcement can visit a physical location identified by an IP address, attackers that use one (or multiple) proxies across country boundaries are more difficult to locate
IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959
International Research Journal of Management Science & Technology http:www.irjmst.com Page 244
(see Exhibit 2-1). The endpoint can only view the last proxy with which it is directly communicating and not any of the intermediary proxies or the original location.



References: Varun Tiwari “CRYPTOGRAPHY IN DATABASES”,2011, www.IRJMST.com Julius Plenz, "DNStunnel.de," 2006, http://dnstunnel.de. Phrack, "Phrack Issues," n.d., http://www.phrack.com/issues.html?issue=49&id=6. Daniel Stødle, "Ping Tunnel," 2009, http://www.cs.uit.no/~daniels/PingTunnel/. IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959 International Research Journal of Management Science & Technology http:www.irjmst.com Page 250 Thomer Gil, "ICMPTX (IP-over-ICMP) Howto," 2009, http://thomer.com/icmptx/. Antd, "Simple ICMP Tunnel," SourceForge, 2005, http://sourceforge.net/projects/itun/.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    provides the names and IP addresses of all intermediate systems. That can be used for an attack by…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Web Architecture for P1

    • 1038 Words
    • 5 Pages

    A proxy server, also known as a "proxy" or "application level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    4. What is the purpose of the traceroute command? What useful information does traceroute provide? How can this information be used to attack the targeted website?…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    3. A(n) Proxy server____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A proxy service is an application that acts as an intermediary between systems. Information from the internet is received by the firewall and sent to the requesting system and vice versa.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Schriesheim, C. A., Neider, L. L., & Scandura, T. A. (1998). Academy of Management Journal, 41(3), 298-318.…

    • 7917 Words
    • 32 Pages
    Better Essays
  • Powerful Essays

    Social Media Marketing

    • 6275 Words
    • 26 Pages

    Forget traditional ROI. Instead of calculating the return on the company’s investment, managers should assess consumer motivations to use social media and measure the social media investments customers make as they engage with the marketers’ brands. Measuring customer investments in a social media relationship reveals the likelihood of a long-term payoff, not just short-term results.…

    • 6275 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Dijkstra, Majorie, Berens, Guido, Journal of Management Studies; Nov2002, Vol. 46 Issue 7, p1197-1226, 30p. Retrieved December 5, 2009.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    After viewing his report, I am shocked to hear about the risk our country is in. This report stated various ways in which foreign countries and even our own U.S. Citizens can hack into our databases and steal our countries most vital information. I believe that the thought of our worlds information systems to be attacked is highly possible. They were discussing how people are hacking into banks and stealing thousands to millions of dollars everyday, into our oil and electricity plants, and into our national security. These three things are huge to our country. This country runs on electricity, a blackout will put the country in a more vulnerable position. During these blackouts other countries can be accessing our information…

    • 739 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 310 Words
    • 1 Page
    Satisfactory Essays

Related Topics