Preview

Hackers and Tools of the trade

Better Essays
Open Document
Open Document
3777 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hackers and Tools of the trade
Hackers and the Tools of the Trade

This paper will be about the tools and or software that are used to exploit computer systems. I feel that this is a topic that needs to be discussed due to the ever increasing reliance we have with computer technology. I can remember the days when you wanted to learn about a particular subject, you would have to open up encyclopedias, or go to your local library. Now, with the advancements in technology, we have all that wealth of information in the palm of our hand with Smartphones. These devices have become almost like an extension of our selves. They are with us everywhere we go, keeping us connected to a vast network of social media like Facebook, Twitter, and Instagram, as well as access to online video libraries such as YouTube. We can even conduct business while on the go. You no longer have to wait till you get home to get on your computer to take care of your personal banking. As long as you are on your cellular network, or connected to a Wi-Fi hotspot, you can have access to online banking, as well as everything I mentioned above.
Many restaurants, coffee shops, hotels, and even airports offer free Wi-Fi for their customers to connect to. While this is very convenient for all of us, there are risks that we should be aware of when we use these connections. There are malicious users out there who can intercept our Wi-Fi signals when we attempt to connect to these hotspots. I will discuss how they pull off this trick in more detail, as well as what tools they use to make it all happen. Before I go into all that, I would like to point at that, Wi-Fi hotspots and Smartphones aren’t the only ones that are vulnerable to attacks and exploits. Major companies are at risk as well. Think about all the computers and devices that are connected to each other in a major business network. In those networks, there are servers that contain large amounts of data. Every computer, server, or other device that is



References: Anatomy of a Wireless "Evil Twin" Attack (Part 1). (n.d.). Internet Security Solutions. Retrieved November 16, 2013, from http://www.watchguard.com/infocenter/editorial/27061.asp Black Hat: Top 20 hack-attack tools. (n.d.). Network World. Retrieved November 16, 2013, from http://www.networkworld.com/news/2013/071913-black-hat-attack-tools-272025.html Does Your Wi-Fi Hotspot Have an Evil Twin?. (n.d.). PCWorld. Retrieved November 16, 2013, from http://www.pcworld.com/article/120054/article.html Nmap - Free Security Scanner For Network Exploration & Security Audits.. (n.d.). Nmap - Free Security Scanner For Network Exploration & Security Audits.. Retrieved November 16, 2013, from http://nmap.org/ Throwing Star LAN Tap. (n.d.). HakShop —. Retrieved November 16, 2013, from http://hakshop.myshopify.com/products/throwing-star-lan-tap Trojan Horse Attacks. (n.d.). IRCHelp.org — Untitled Page. Retrieved November 16, 2013, from http://www.irchelp.org/irchelp/security/trojan.html USB Rubber Ducky | Home. (n.d.). USB Rubber Ducky | Home. Retrieved November 16, 2013, from http://192.64.85.110/ WiFi Pineapple Mark V Standard. (n.d.). HakShop —. Retrieved November 16, 2013, from http://hakshop.myshopify.com/collections/wifi-pineapple/products/wifi-pineapple Getting Owned: The USB Keystroke Injection Attack. (2013, June 27). > World Views. Retrieved November 16, 2013, from http://www.ciscopress.com/articles/article.asp?p=1636214&seqNum=3 Introduction to Port Scanning. (n.d.). About.com Internet / Network Security. Retrieved November 16, 2013, from http://netsecurity.about.com/cs/hackertools/a/aa121303.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Notenboom, L. (2008). Retrieved February 21, 2013, from What 's a port scan, and should I be worried about them?: http://ask-leo.com/whats_a_port_scan_and_should_i_be_worried_about_them.html…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    This report is to provide insight on nefarious computer activities called ping sweeps and port scans as a request from management. I will identify them, explain what they are use for, how they are used and how to stop them from attacking a network. Finally I will discuss how they can be eliminated as security risk. The information in this report is designed to increase the understanding and knowledge of these two activities so that this company’s IT department will be in a better position to recognize them and block potential attacks from their use.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s report I will give a basic definition of and explain to the best of my ability what port scanning is and also what a ping sweep is and I will also try to provide examples of these techniques. Lastly I will show how these simple this can be done and or avoided and how they can affect us as a company.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Sarrel, M. (2003, December 30). Network Security: Know Your Weaknesses | Roundup | PCMag.com . Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. Retrieved January 30, 2013, from http://www.pcmag.com/article2/0,2817,140…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    Norton. (n.d.). Cybercrime - The Definition of Cybercrime | Norton. Retrieved May 14, 2015, from http://us.norton.com/cybercrime-definition/promo…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Another particularly common problem facing e-commerce and social network applications is the trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. This can be a significant risk since cyber terrorism can be easily carried out.…

    • 1233 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Market Research Reports & Analysis | IBISWorld US. (n.d.). Market Research Reports & Analysis | IBISWorld US. Retrieved January 21, 2013, from http://clients1.ibisworld.com/reports/us/industry/default.aspx?entid=826.…

    • 2053 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    The Internet is the technological genius of the computer age. Although the Internet is a phenomenal tool, providing access to the world, it has also become a Shangri-La for criminals. The Internet because of the ability to remain anonymous is the perfect playground for this type of mayhem. This paper will outline the types of crimes that are being committed via the Internet, it will explain how to protect yourself and your computer against these crimes and then it will focus on why we are morally obligated to report these crimes to the appropriate authorities and how to accomplish this.…

    • 3351 Words
    • 14 Pages
    Powerful Essays