Instant download (Ebook) Computer Security and Penetration Testing by Alfred Basta, Nadine Basta, Mary Brown ISBN 9780840020932, 0840020937 pdf all chapter
Instant download (Ebook) Computer Security and Penetration Testing by Alfred Basta, Nadine Basta, Mary Brown ISBN 9780840020932, 0840020937 pdf all chapter
https://ebooknice.com/product/linux-operations-and-
administration-4577238
ebooknice.com
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
ebooknice.com
https://ebooknice.com/product/database-security-10004958
ebooknice.com
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312
ebooknice.com
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II Success)
by Peterson's ISBN 9780768906677, 0768906679
https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018
ebooknice.com
(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT
Subject Test: Math Levels 1 & 2) by Arco ISBN 9780768923049,
0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-
arco-master-the-sat-subject-test-math-levels-1-2-2326094
ebooknice.com
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
ebooknice.com
https://ebooknice.com/product/basta-de-amores-de-mierda-iv-50580646
ebooknice.com
https://ebooknice.com/product/careers-in-high-tech-1557548
ebooknice.com
Computer Security
and Penetration Testing
Second Edition
Alfred Basta
Nadine Basta
Mary Brown
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Computer Security and Penetration Testing, © 2014, 2008 Cengage Learning
Second Edition
ALL RIGHTS RESERVED. No part of this work covered by the copyright
Alfred Basta, Nadine Basta, and Mary Brown herein may be reproduced, transmitted, stored, or used in any form or by
any means graphic, electronic, or mechanical, including but not limited to
Vice President, Careers & Computing: Dave Garza photocopying, recording, scanning, digitizing, taping, web distribution,
Acquisitions Editor: Nick Lombardi information networks, or information storage and retrieval systems, except
as permitted under Section 107 or 108 of the 1976 United States Copyright
Director, Development—Careers and Computing: Act, without the prior written permission of the publisher.
Marah Bellegarde
Product Development Manager: Leigh Hefferon For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
Senior Product Manager: Natalie Pashoukos
For permission to use material from this text or product,
Developmental Editor: Kent Williams
submit all requests online at www.cengage.com/permissions
Technical Editor: Robert Zemelka
Further permissions questions can be emailed to
Editorial Assistant: Torey Schantz permissionrequest@cengage.com
Vice President, Marketing: Jennifer Ann Baker
Marketing Director: Deborah Yarnell Library of Congress Control Number: 2013939807
Production Director: Wendy A. Troeger ISBN-13: 978-0-8400-2093-2
Production Manager: Andrew Crouth ISBN-10: 0-8400-2093-7
Content Project Manager: Brooke Baker
Art Director: GEX Cengage Learning
200 First Stamford Place, 4th Floor
Media Editor: William Overocker
Stamford, CT 06902
Cover Photo: ©iStockphoto.com/pheonix3d USA
Purchase any of our products at your local college store or at our preferred
online store www.cengagebrain.com.
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
CHAPTER 1
Ethics of Hacking and Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CHAPTER 2
Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CHAPTER 3
Scanning Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
CHAPTER 4
Sniffers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
CHAPTER 5
TCP/IP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
CHAPTER 6
Encryption and Password Cracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
CHAPTER 7
Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
CHAPTER 8
Session Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
CHAPTER 9
Hacking Network Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
CHAPTER 10
Trojan Horses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
CHAPTER 11
Denial-of-Service Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
CHAPTER 12
Buffer Overflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
CHAPTER 13
Programming Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
CHAPTER 14
Mail Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
CHAPTER 15
Web Application Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
CHAPTER 16
Windows Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
CHAPTER 17
UNIX/Linux Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
CHAPTER 18
Incident Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
iii
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
CHAPTER 1
Ethics of Hacking and Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
The Impact of Unethical Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Hacker Communities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Hat Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Hacker Profiling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Hacker Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Ethical Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Evolution of Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Vendor-Neutral Security Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Vendor-Specific Security Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
What Needs to Be Secured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Hands-On Project. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
CHAPTER 2
Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Introduction to Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Legal Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Questionable Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Illegal Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Impact of Context on Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Social Engineering Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Physical Intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Communication Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Countering Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Dumpster Diving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Importance of Proper Discarding of Refuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Prevention of Dumpster Diving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Internet Footprinting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Social Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Web Searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Network Enumeration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Domain Name System–Based Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Network-Based Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
v
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Table of Contents
CHAPTER 3
Scanning Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Evolution of Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
How Scanners Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Types of Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
TCP Connect Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Half-Open Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
UDP Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
IP Protocol Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Ping Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Stealth Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Review of Scanner Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Vulnerability Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Exploitation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
CHAPTER 4
Sniffers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Sniffer Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Bundled Sniffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Commercial Sniffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Free Sniffers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Sniffer Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Sniffer Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Placement of a Sniffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Data Transfer over a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Role of a Sniffer on a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Sniffer Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Wireshark (Ethereal). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
tcpdump/WinDump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Snort. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Network Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Cain and Abel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Kismet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Fluke Networks Protocol Analyzers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Detecting a Sniffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
DNS Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Network Latency Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Source-Route Method. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Decoy Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Time Domain Reflectometer (TDR) Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents vii
CHAPTER 5
TCP/IP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Introduction to TCP/IP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Data Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
IP (Internet Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Connection Setup and Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
TCP/IP Timers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Vulnerabilities in TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
IP Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Source Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Connection Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
ICMP Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
TCP SYN Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
RIP Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Securing TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
IP Security Architecture (IPSec) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
CHAPTER 6
Encryption and Password Cracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Introduction to Encryption and Password Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Symmetric and Asymmetric Key Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Symmetric Key Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Asymmetric Key Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Descriptions of Popular Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Symmetric Key Ciphers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Asymmetric Key Ciphers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Cryptographic Hash Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Attacks on Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Dictionary Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Hybridization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Brute-Force Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Observation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Keyloggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Table of Contents
CHAPTER 7
Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
The Process of an IP Spoofing Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Costs of Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Kinds of Tangible Loss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Types of Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Blind Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Active Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
IP Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
ARP Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Web Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
DNS Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Spoofing Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Mausezahn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Ettercap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Arpspoof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Prevention and Mitigation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
CHAPTER 8
Session Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
TCP Session Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Session Hijacking – Hacker’s Point of View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
TCP Session Hijacking with Packet Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Session Hijacking Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Hunt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
UDP Hijacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Prevention and Mitigation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Storm Watching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents ix
CHAPTER 9
Hacking Network Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Categories of Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Concealed Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Routers and Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Attacks on Routers and Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Router Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Limitations of Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Types and Methods of Firewall Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Threats through VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Ways to Safeguard a Network from Attacks through VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
CHAPTER 10
Trojan Horses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
How Trojan Horses Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Functions of a Trojan Horse Attack. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Famous Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
PC-Write (1986). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
AIDS.exe/PC Cyborg (1989) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Back Orifice (1998) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Pretty Park (1999) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
NetBus (2001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
SubSeven (1999) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
BO2K (2000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Zeus Trojan (2007) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Detection and Prevention of Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Detecting Trojan Horses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Distributing Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Table of Contents
CHAPTER 11
Denial-of-Service Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Causes of DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Types of DoS Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Preventable DoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Non-Preventable DoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Flood Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Software Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Isolated Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Distributed Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Known DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
TCP SYN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
SMURF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Known DDoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Trinoo. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Stacheldraht. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Botnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Prevention and Mitigation of DoS and DDoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Prevention Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Mitigation of DoS and DDoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
CHAPTER 12
Buffer Overflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Standard Execution of a C Program. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Types of Buffer Overflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Stack Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Process of a Stack Overflow Exploit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Heap Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
More Methods for Causing a Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Character-Set Encoding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Nybble-to-Byte Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Buffer Overflows: Detection and Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Detecting Buffer Overflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Preventing Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Hands-On Project. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
CHAPTER 13
Programming Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
C and C++. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Vulnerabilities in the C and C++ Programming Languages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
C and C++ Security Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xi
CHAPTER 14
Mail Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Major Mail Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Simple Mail Transfer Protocol (SMTP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Post Office Protocol (POP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Internet Message Access Protocol (IMAP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Server Application Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Microsoft Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
IBM Lotus Domino Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
E-mail Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
List-Linking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
E-mail Bombing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
E-mail Spamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
E-mail Sniffing and Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
E-mail Attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
419s, Scams, and Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Browser-Based Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Microsoft Outlook 2010. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Mozilla Thunderbird 15 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Opera Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Personal E-mail Security Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Corporate E-mail Security Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
CHAPTER 15
Web Application Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Why the Web Is Vulnerable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Weak Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii Table of Contents
CHAPTER 16
Windows Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Windows Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Windows Server 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Windows 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Windows 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Vulnerabilities in Windows Server 2008/XP/Vista/7/8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Default Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Windows Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Trust Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Windows Server 2008 Viewer Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Vulnerabilities to Obtain or Elevate Privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
RPC Service Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
SMTP MX Record Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Code Execution Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xiii
CHAPTER 17
UNIX/Linux Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
UNIX-Based Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Linux Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Vulnerabilities from Default Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Basic Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Login Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Bad System Administration Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Utility Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Trivial File Transfer Protocol (TFTP) Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Kernel Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Printing Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Vulnerability in mem_write Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Integer Overflow Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Buffer Overflow Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
UseLogin Vulnerability of OpenSSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
wu-ftpd Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
BIND Exploit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Review Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
CHAPTER 18
Incident Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Need for Incident Handling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Types of Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Approach to Incident Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Detection Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Phases of Incident Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Preparation for Incident Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Classification of Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Establishing the Impact of an Incident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Establishing the Likelihood of an Incident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Reporting and Communicating Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Reporting the Incident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Communicating the Incident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Eliminating the Bug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Correcting the Root Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Identifying and Implementing the Steps to Fix the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Denial-of-Service Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Table of Contents
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction
This text was written to provide a large number of options for further study for interested
individuals or enrolled students who desire an accurate and interesting introduction to the
fascinating realm of network security.
This work is designed to give students, professionals, and hobbyists accurate and well-
researched examples of current security topics. The field of information security changes
quickly, and this text is formulated to provide a solid foundation to enable the reader to
understand and differentiate between hype and fact. Readers will acquire a firm grasp of the
concepts and history of network development and network security as they have evolved.
This platform is anchored to real-world examples and techniques to glean the most useful
information from the Internet. It is intended to burst the mystique, shine a light into how and
why people attack computers and networks, and prepare the reader with the right techniques
to begin winning the network security game.
This text is primarily intended for students in the second or third year of programs in:
● Information technology
● Network security
● Network engineering
● Computer science
xv
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi Introduction
This work is also valuable to upper management of small companies that do not have
IT departments, and it will bring IT professionals up-to-date on the latest security
concepts.
Features
Read This Before You Begin
Technical considerations and assumptions about hardware, software, and lab setup are listed
in one place early in the book to save time and eliminate surprises later on in the book.
Chapter Objectives
Each chapter begins with a list of the concepts to be mastered. This list gives you a quick
reference to the chapter’s contents and serves as a useful study aid.
Tips
Tips provide additional information, such as background information on a technology, mis-
takes to watch out for, or Web resources where users can obtain more information.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction xvii
Chapter Summaries
Each chapter contains a summary of the key content covered in the chapter, which serves as
a helpful tool for study and for reinforcing the main ideas presented in the chapter.
Key Terms
All terms in the chapter introduced with bold text are gathered together in the Key Terms list
at the end of the chapter, with a full definition for each term. This list encourages a more
thorough understanding of the chapter’s key concepts and is a useful reference.
Review Questions
The end-of-chapter assessment begins with review questions that reinforce the main concepts
and techniques covered in each chapter. Answering these questions helps ensure that you
have mastered important topics.
Hands-On Projects
Projects at the end of each chapter provide students with the ability to apply some of the con-
cepts they have read about in the chapter. The ability to “learn-by-doing” helps students soli-
dify their understanding of the material.
Instructor’s Manual
The Instructor’s Manual that accompanies this book includes additional instructional mate-
rial to assist in class preparation, including suggestions for classroom activities, discussion
topics, and additional projects.
Solutions
The answers to all end-of-chapter material, including the Review Questions and, where
applicable, Hands-On Projects, are provided.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Introduction
ExamView®
This book is accompanied by ExamView®, a powerful testing software package that allows
instructors to create and administer printed, computer (LAN-based), and Internet exams. Exam-
View® includes hundreds of questions that correspond to the topics covered in this text,
enabling students to generate detailed study guides that include page references for further
review. The computer-based and Internet testing components allow students to take exams at
their computers and also save the instructor time by grading each exam automatically.
PowerPoint® Presentations
This book comes with Microsoft® PowerPoint® slides for each chapter. These are included as
a teaching aid for classroom presentation, to make available to students on the network for
chapter review, or to be printed for classroom distribution. Instructors, please feel free to
add your own slides for additional topics you introduce to the class.
Figure Files
All of the figures are reproduced and can be used to customize the PowerPoint® slides or
made available to students for review.
member of many associations, including the Mathematical Association of America. Dr. Basta’s
other publications include Mathematics for Information Technology, Linux Operations and
Administration, and Database Security.
Nadine Basta, MS, is a professor of computer science, information technology, and security.
Her numerous certifications include MCSE, MSDBA, CCDP, NCSE, NCTE, and CCA. A
security consultant and auditor, she combines strong “in the field” experience with her aca-
demic background. She is also coauthor of Mathematics for Information Technology and
Linux Operations and Administration.
Mary Brown, CISSP, CISA, PhD, is a professor who leads the information assurance and
security and health informatics specializations at Capella University. She manages the
curricula for these programs and works with the NSA to maintain Capella as a Center of
Excellence in IAS, which includes managing a Web site and blog. She is also a member of an
advisory board for Advance IT, which promotes IT in Minnesota, as well as a member of
numerous professional associations, including the Information Systems Security Association.
Additional publications include HIPAA Program Reference Handbook and Ethical Issues
and Security Monitoring Trends in Global Healthcare: Technological Advancements.
Acknowledgments
From Alfred Basta:
To my wife Nadine:
“It is the continuing symphony of your loving thoughts, caring actions, and continuous sup-
port that stands out as the song of my life.”
To our daughter Rebecca, our son Stavros:
“Fix your hearts upon God, and love Him with all your strength, for without this no one can
be saved or be of any worth. Develop in yourselves an urge for a life of high and noble
values. You are like little birds that will soon spread your wings and fly.”
To my mother:
“You are a never-ending melody of goodness and kindness. You are without equal in this
world.”
And to the memory of my father:
“If one is weighed by the gifts one gives, your values given are beyond estimation.”
From Nadine Basta:
First, I would like to thank God for giving me the chance to complete this work. Every day I
thank Him for my three precious gifts: Alfred, Becca, and Stavros.
To my beloved husband, Alfred: Thank you for your continuous love and support throughout
our wonderful 17 years together.
To our children, Rebecca and Stavros: You are the true joy of our lives and our greatest bles-
sing. We pray for you every day to live a life that honors and glorifies God. Fix your hearts
upon Him, and love Him with all your strength.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
chapter 1
Ethics of Hacking
and Cracking
1
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
2 Chapter 1 Ethics of Hacking and Cracking
Hacking and cracking are of great interest to many students of information security
as well as to hobbyists and others. This chapter introduces you to hacking and helps you
understand the characteristics and motivations behind both ethical and unethical hacking
activities. It also explores the wide range of industry-related certifications available to those
interested in a career in ethical hacking. Many of these certifications contain a professional
ethics component—a potential barrier to those who choose to begin their career engaging
in questionable computing activities.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hacker Communities 3
Hacker Communities 1
There are distinct groups of hackers; however, the membership is not limited to a single
group, nor is there a consistent membership within groups over time. There are two common
ways to categorize the broader groups of hackers:
● As White Hat (good hackers) or Black Hat (bad hackers)
● Through psychological profiling, which seeks to understand the motivations of hackers
Hat Categories
The White Hat/Black Hat model is derived from old Westerns in which the “good guys”
always wore white hats and the “bad guys” always wore black hats. The assumption is that
everything the good guys do is right, legal, and justified, whereas everything the bad guys do
is wrong, illegal, and debased. As is often true in life, this model oversimplifies reality but
helps frame discussions among those who feel strongly about the importance of ethical
behavior in the information security industry. Many information security professionals
strongly feel that crackers have violated professional ethics and are, essentially, disqualified
from participation in the industry. Others make allowances for youthful indiscretions. And
some even admire and pursue crackers as possible employees under the belief that they are
in a better position to “know thine enemy.” Whatever one believes, the idea that there is a
distinction between legal and illegal, between ethical and unethical, is at the root of how
hackers and crackers are classified and categorized.
Figure 1-1 presents the range of what motivates White Hat/Black Hat hackers/crackers.
Hacker Profiling
Hacking—like criminalistic forensics or martial arts—requires the practitioner to be inti-
mately familiar with the techniques of one’s opponent. To be successful as an ethical hacker
and network security expert, a person must know not only how to protect a network but
what and whom to protect the network from. The reading material and techniques used by
ethical hackers and unethical hackers are identical; what distinguishes the two groups from
each other is simply the permission of the network owner and the choice of whether to
defend or attack. Figure 1-2 presents a list of hacker profiles that was developed by former
police detective and computer forensics expert Marcus Rogers.3 Despite the popular percep-
tion of a hacker as an antisocial teenager, hackers are not a monolithic group; they represent
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
4 Chapter 1 Ethics of Hacking and Cracking
a wide diversity of lifestyles. One cannot just point to the geekiest-looking person in a line-up
and say, “He’s the one!”
Whether one chooses to act in alignment with current regulations or not, abide by company
policy or not, act ethically or not, to be a successful hacker or cracker, you must devote con-
siderable time and resources to maintaining sufficient knowledge of current threats, vulner-
abilities, tools, and trends. Among the eight types of hackers described in Figure 1-2, most
are able to find ways of justifying their activities. Some engage in behaviors, such as publiciz-
ing a potential vulnerability, that can be seen as either unethical or a valid warning. The sub-
ject of ethics is sufficiently broad and complex to be worthy of an entire book; suffice it to
say that ethics plays an important role in the hacking profession and should be well inte-
grated into project planning and implementation. Novices with the best of intentions can get
in over their heads and inadvertently cause thousands of dollars in damage and loss because
they don’t entirely understand what they are doing.
As noted hacker Kevin Mitnick once wrote, “Are hackers a threat? The degree of threat pre-
sented by any conduct, whether legal or illegal, depends on the actions and intent of the indi-
vidual and the harm they cause.”4
There is a popular convention called the “Black Hat Briefings,” first held in 1997 in Las
Vegas. The stated purpose of the convention and its Web site is to “highlight breaking secu-
rity research submitted by leading corporate professionals, government experts, and members
of the underground hacking community. 5
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hacker Communities 5
Hacker Motivations
Regardless of their profiles, knowledge, or skills, hackers are often motivated by a combina-
tion of the following:
● Curiosity
● Love of puzzles
● Desire for recognition or fame
● Revenge
● Financial gain
● Patriotism or politics
Curiosity Perhaps the strongest motivation is curiosity: “What happens when I do this?”
or “How do these security measures work?” We are trained from childhood to be curious,
open, and sharing. Crackers direct their innate curiosity toward finding the blind spots in
the network systems we build.
Love of Puzzles Hackers gain great satisfaction in finding the solutions to complicated
puzzles. A hacker has to control many variables and master many techniques to successfully
crack systems. These same challenges motivate locksmiths and cat burglars in the physical
security realm. Strong passwords, such as “Tr34$>l drU,”(tr), can be devised that block most
attack attempts, and locks can be keyed with “024642” pin combinations that are almost
unpickable. Think how much fun it is to figure out how to solve these difficult puzzles!
Desire for Recognition or Fame Almost all hackers are motivated by a need for
acceptance, acknowledgment, and fame—at least among their peers. It takes a person of
average intelligence and skill many years to become even a poor hacker. Expertise in the
field is rare and marvelous in ways not necessarily understood by those outside the field.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6 Chapter 1 Ethics of Hacking and Cracking
True, hackers may be deficient in social skills or fashion sense, but they are as susceptible to
the lure of fame as anyone else. As members of an elite group possessing specialized techni-
cal skills, they believe they deserve recognition. Ethical hackers may believe they are merely
the last line of defense against malicious individuals, but script kiddies (hackers with little
knowledge or experience who run scripts they didn’t write themselves) and Black Hat crack-
ers actually enjoy their conquests and the notoriety it brings.
Revenge People who feel that they were wronged, or that their cause or group was
wronged, can easily talk themselves into performing unethical acts by using the simplistic notion
that a badly behaved person, business, or government deserves to be treated as poorly as possi-
ble. It is the cracker’s way of getting even. Groups such as Anonymous, an international and
loosely aligned group of crackers that engaged in a number of high visibility attacks against
political targets in 2011, have heightened the public’s awareness of the increased potential for a
cyber-attack following events that these groups might find offensive. Little is known about
Anonymous other than that it appears highly fluid and basically leaderless, coming together in
distinct groups for a particular action and then falling back to regroup for the next action.
Financial Gain Money is a very common motivation among all classes of hacker, from
the security expert on contract or salary to the script kiddie stealing and selling credit card
information. Plainly, the education required and the time spent learning the craft are not
without cost, so it makes sense that there is some expectation of remuneration. Although
some hackers do their work for free, citing the Hacker’s Ethic that information should be
free and freely shared to all interested parties, many others are in it for the cash.
Patriotism and Other Causes Some hackers, known as hacktivists, are motivated by
patriotism or nationalism or other causes. Their goal may be to secure a network from
cyber-criminals. Alternatively, they may want to attack a network to disrupt services,
thereby causing fear among specific “enemy” populations and communities.
Governments can engage in hacking as well. Stuxnet, a computer worm that seeded
malware-infected USB drives in cars parked outside Iranian nuclear plants, is one of the bet-
ter known examples of state-sponsored hacking. There, the goal was to break into the
plants’ centrifuges. In a paper written for a U.S. Army War College publication, Timothy
Thomas has suggested that China has several state-sponsored schools that train students to
become experts in the art of cyber-terrorism.6 Brodsky has pointed to the increased depen-
dence on SCADA (Supervisory Control and Data Acquisition) systems to run critical infra-
structure, which makes them a potential target of cyber-terrorism.7
Ethical Hacking
Most professions have ethical codes that bind their members into a set of shared values and
help them gain the public’s trust. The profession of network security is no exception, but it is
still emerging from a set of conflicting values that arose from the two communities it draws
on: the hobbyist/student community and the professional community (those on the IT career
track). Many individuals involved in the profession, especially those who come from business
rather than technical backgrounds, believe they need to distance themselves from the commu-
nities they (and most of the better penetration tools) came from. That’s one of the causes
within the profession: to differentiate the bad hackers who threaten the networks from good
hackers who are paid to protect them. Coming up with a set of distinctions that distinguish
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hacker Communities 7
the ethical hacker from the unethical cracker will help the network security profession pres-
ent to the world the benefits that it brings to society. 1
Evolution of Hacking
In the 1940s, universities, government, and large businesses started using computers, but few
people knew about them. There were no computer science students. Most of the profes-
sionals who worked with computers used them to solve complicated mathematics problems.
The modern concept of hacking began in the late 1950s, when students at the Massachusetts
Institute of Technology (MIT) started using their access to the IBM mainframe housed at
MIT to work on new programming languages and other experiments outside of their regular
classes. This was not antisocial or illegal behavior, but the students, while developing their
skills, became a community of hackers as well. In the 1950s, “hacker” was a word for a hob-
byist in any technical area.
The students used their unsupervised computer time to experiment, to find new ways of solv-
ing problems, and to invent applications that did things in a new computerized way. These
early hackers had no malicious intent. They simply believed that there was always room for
improvement. And so, when a new, simpler, more elegant solution was found, it was pub-
lished widely and tested by many. There was little predefined structure to the experimentation.
Many of the students took as much pride in their collaborative solutions as they did in their
individual achievements. Given the open access and freedom they had, many of them indulged
in programmed pranks or discovered ways to access others’ personal files to edit their code.
But these pranks were published just as widely as the more socially acceptable results.
The first password hacks were a response to the Compatible Time Sharing System (CTSS),
which was developed in the early 1960s and first loaded onto an IBM mainframe, again at
MIT. This application enabled the safe sharing of computer time by different users so that
all the processor’s cycles were used and there was no idle time. Usernames and logons kept
people from anonymously accessing the computer, but this flew in the face of the freedoms
that students had previously enjoyed. Some responded by trying to guess usernames and
passwords. Finally, they broke into the CTSS system.
In the 1970s, a new sort of hacker, the phone phreak, appeared. Phone phreaks used various
methods, collectively called phreaking, to access telephone networks in order to make free
calls from pay phones. Eventually, they began combining traditional phreaking tools with
computer programming languages. One popular phreaking program was Blue Beep. It
works with MS-DOS and shell prompts of Windows, using PASCAL and other assembly
languages. Its features include creating digital tones, controlling trunk lines, and scanning
telephone exchanges.
In the 1980s, phreaks discovered that any server with a modem could potentially be entered.
War dialers were developed to search for open modems. Once a hacker gained access to one
server, it was often possible to access another server through the dedicated lines the servers
shared. This was one way to access the fledgling Internet and its precursors—i.e., the bulletin
boards run by CompuServe and AOL.
As personal computer prices dropped and users became more common, hacker communities
grew, too, and the term “hacking” started to take on a new connotation. Hackers were no
longer just young, socially inept males with an insatiable curiosity about computers. They
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8 Chapter 1 Ethics of Hacking and Cracking
were now joined by malicious individuals who attempted to break into and damage sensitive
corporate and government networks that they accessed through the use of modems.
Given that automation was the whole reason for computers in the first place, it is not surpris-
ing that, in the 1980s, people started creating applications that could spread themselves auto-
matically (or nearly automatically) over the Internet and through e-mail systems. Viruses,
worms, and Trojans started appearing in 1988. The thrill of having such simple codes
wreak havoc on servers and workstations was intoxicating, and hackers have continued to
develop viruses and worms to this day. In fact, they have turned to even more hazardous
code over time because it is easy to find existing resources that need just minor modifications
and little skill to alter, then send them back out. Examples of these viruses are the Bagel virus
(which had dozens of variants), Nimda, and Code Red.
The presence of the resources and tools to create malware is a long-term problem that shows
little evidence of resolving in the near future. Viruses are indiscriminate in their damaging
effects, and any script kiddie can set one loose. Also, virus code is available on the Internet,
and skilled crackers can use such code as a starting point to develop better ways to break
into more specific targets.
Hackers’ antisocial actions ultimately made it difficult to hold on to the original definition of
“hacking”; people started to use the label “hacker” to describe computer experts working
with malicious intent. This stereotype persists today and has raised the need for security
experts to distance themselves from the criminal—the same way lawmen in the old West
used their tin badges to separate themselves from the outlaws.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10 Chapter 1 Ethics of Hacking and Cracking
For more information about vendor-neutral certifications, visit the following Web sites:
● Information Systems Audit and Control Association (ISACA): www.isaca.org
● EC-Council: www.eccouncil.org/certification.aspx
● ISC2: www.isc2.org/cgi-bin/index.cgi
● CompTIA: http://certification.comptia.org/getCertified/certifications/security.aspx
● Global Information Assurance Certification (GIAC): www.giac.org/certifications/security
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hacker Communities 11
The majority of hackers employed by organizations understand that they are responsible for
the success of the protective measures they use on their employers’ networks. Such hackers 1
may take pride in making an honest living and may thus feel duty-bound to perform their
penetration and software testing with due diligence. They will strive to uphold their profes-
sion’s reputation and demonstrate an understanding of the ethical responsibilities associated
with maintaining respect for the industry.
Some hackers might find it tempting to copy, download, and use proprietary software and
other copyrighted works. Although they may consider this a harmless activity, it is often ille-
gal (based on the license under which the software is distributed). The controls available to
software manufacturers that manage licensing become increasingly sophisticated. Organiza-
tions that have been on the receiving end of a Microsoft software license audit can attest to
the potential impact of failing to take this responsibility seriously.
There is an ongoing philosophical discussion as to whether free access to information is more
or less important than a creator’s right to protect his or her creations. This is the same sort of
debate as the one over the regulations that govern the distribution and modification of written
works. There are those who feel that proprietary software is a form of elitism that inhibits
progress. The argument is that every person has the right to hear, read, see, or learn anything
that is available. On the other hand, proponents of strong intellectual property rights argue
that there would be no creation at all if there was not some method of ensuring remuneration
for reproduction of that intellectual property. Regardless of the personal opinions a hacker
may hold with regard to intellectual property issues, as a member of the information security
industry, there is an obligation to the organization to uphold and enforce existing laws.
Professional hackers have a responsibility to society that is hard to ignore. Their activities
should help to build and improve upon existing technology. Accessing information in a
quest for knowledge is valuable, but a hacker’s right to free information ought not to infringe
on others’ rights to their own space and property. It is the responsibility of ethical hackers to
ensure that their activities cause no harm to the confidentiality and integrity of information.
They should use their skills and interests as opportunities to learn and teach. Hackers can
use their intelligence and experience to invent new solutions that help the overall develop-
ment of technology.
An ethical hacker is a security professional who applies his or her hacking skills for defensive
purposes. This person accesses a computer system or network with the authorization of the
system’s owner and without causing damage to the system. Hackers who are conscious of
other people’s rights are assets to the IT field. (On the other hand, hackers who act with
malicious intent harm the profession, but at the same time they help security professionals
see where their networks are vulnerable.) It is possible for hackers to gain access to sensitive
and controversial data while they are engaged in the activity of ethical hacking. What that
hacker does with that data reflects on the entire industry. The very cornerstone of success
for ethical hackers rests on trust. Violations of that trust by failing to act honorably and ethi-
cally come with significant consequences.
Why Hire an Ethical Hacker? Companies would rather pay an ethical hacker to dis-
cover their systems’ vulnerabilities than wait for an unethical hacker to do it for them. Fur-
thermore, an increasing number of industries, such as finance and health care, charge orga-
nizations with the specific duty of protecting the sensitive data they collect and store. As
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12 Chapter 1 Ethics of Hacking and Cracking
part of a defensive strategy, organizations may want to hire external security professionals
to try to hack their systems. They can derive further benefits from hiring ethical hackers to
perform security audits, which provide solutions as well as identify potential problems.
Ethical hackers work to protect all IT areas—Web servers and shared printers as well as
e-mail from end to end. The widespread adoption of smartphones, tablets, and other mobile
devices as well as the move to the “cloud” are only the most recent additions to the infor-
mation assets that organizations are responsible for. These organizations have also adopted
social media and technically integrated Enterprise Resource Planning (ERP) systems that
have blurred the boundaries of the traditional internal network, which has only increased
the importance of the work of professional ethical hackers. Hackers must have experience
in software engineering, network engineering, and system security. They must strive to
increase their knowledge of tools and techniques to protect their networks and to check for
forensics evidence when those networks are attacked.
Chapter Summary
■ Computer cracking is illegally hacking into a computer system without the permission of
the system’s owner.
■ Hackers are commonly classified in two groups: White Hat, or “good” and ethical hack-
ers, and Black Hat, or “bad” and malicious hackers.
■ The eight major profiles of hackers include novices, cyber-punks, internals, old-guard
hackers, coders, professional criminals, information warriors (aka cyber-terrorists), and
hacktivists.
■ Ethical hackers and unethical hackers use the same reading materials and techniques;
what distinguishes between the two groups is simply the permission of the network
owner and the choice of whether to defend or attack.
■ Hackers may be motivated by a love of difficult challenges, curiosity, a desire for recog-
nition, a desire for financial gain, a need for revenge, or patriotism.
■ The modern concept of hacking began in the late 1950s when some students at MIT
started using their access to the MIT mainframe in order to work on new programming
languages and other experiments outside of their regular classes. With the advent of
logon accounts and passwords in the 1960s, hackers went from exploring computers to
hacking passwords. The 1970s saw the rise of the phreaks, and the 1980s saw a tremen-
dous growth in computer crime and abuse with the introduction of viruses, worms, and
Trojan horses.
■ Although there are several vendor-neutral and vendor-specific certifications available to
computer security professionals, there is no national certification standard.
■ Professional security experts, technologists, and hackers must develop a public code of
ethics. Without the assurance a code provides, potential clients may resist employing eth-
ical hackers who could defend their networks and computer systems from crackers.
■ An ethical hacker is a security professional who applies hacking skills for defensive pur-
poses. This person accesses a computer system or network with the authorization of the
system’s owner and without causing damage to the system.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Review Questions 13
Key Terms 1
cloud computing Computing that occurs beyond the edges of the trusted network.
cracker Someone who engages in cracking.
cracking The act of illegally hacking into a computer system without the permission of the
system’s owner.
hacker A term originally meant to describe a programmer or someone skilled at computers
and code writing. The term has evolved and is sometimes used as a more pejorative term to
describe a cracker.
hacktivist Hacker or cracker who is motivated by patriotism, nationalism, or some other
deeply held civic or social belief and who may either secure networks from cyber-criminals
or disrupt services, thereby causing fear among specific “enemy” populations and
communities.
malware infection When a host computer or device is surreptitiously loaded via
various routes, including infected attachments or from visiting malicious Web sites.
The objective of malware is to activate functionality on the device that is not sanctioned
by the device owner. Malware can take many forms, including viruses, Trojans, worms,
and rootkits.
phreaking Cracking the phone network to make free long-distance calls, for example.
Also refers to security cracking, especially (but not exclusively) on communications
networks.
SCADA (Supervisory Control and Data Acquisition) Systems designed to run critical
infrastructure.
script kiddies A subset of hacking enthusiasts who, having little knowledge or
experience, find and run scripts that others have made available through various media.
Script kiddies are universally despised by experienced programmers. When an individual is
singled out as being or acting like a script kiddie, this is a derogatory usage.
Stuxnet A computer worm that seeded malware-infected USB drives in cars parked outside
Iranian nuclear plants with the goal of breaking into centrifuges.
war dialer A script that tells a modem to dial a range of phone numbers and then
identifies those that are connected to remote computers. The phone number range is defined
by the user, then the program proceeds to dial these numbers, one after the other,
attempting to establish a remote connection.
Review Questions
1. Using the White Hat/Black Hat model, which kind of hacker is more likely to create a
Web site to teach new hackers how to hack a network?
2. Using the White Hat/Black Hat model, which kind of hacker is more likely to work as a
network administrator?
3. Using the White Hat/Black Hat model, which kind of hacker is more likely to be politi-
cally motivated?
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14 Chapter 1 Ethics of Hacking and Cracking
4. Using the White Hat/Black Hat model, which kind of hacker is more likely to sell credit
card numbers to criminals online?
5. When presenting a talk to a group of business leaders, are you more likely to use the
White Hat/Black Hat model or the Hacker Profiles model to explain the dangers posed
by hackers? If the business leaders were the chief information officers of their respective
companies, would you reverse your decision? Write a short essay explaining your
answers.
6. If your Web site is hacked and all the pages call up the same anti-war slogan and
picture, which profile of hacker has hit your site?
7. If it is discovered that the CEO’s e-mail browser is set to automatically copy all her
outgoing mail to an unknown account called asmith@thecompany.com, what profile of
hacker is probably responsible?
8. Which hacker profile is most likely to try out attack scripts found on the Internet “just
to see what happens”?
9. What is the name for a group of compromised computers that can be used in a distrib-
uted denial of service attack?
10. What are the motivations for the hacker profile “professional criminal”?
11. A security tester can make a network impenetrable. True or False?
12. An ethical hacker is a person who performs most of the same activities a cracker does
but only late at night. True or False?
13. The System Administration, Network, and Security (SANS) Institute offers training and
IT security certifications through Global Information Assurance Certification (GIAC).
True or False?
14. The GIAC program offers a certification that focuses on reverse-engineering malware.
True or False?
15. In the United States, all the state legal systems view port scanning as noninvasive or
nondestructive in nature and deem it legal. True or False?
16. According to the Hacker Profile model, old-guard hackers brag incessantly about their
successful exploits. True or False?
Match each of the following terms with the correct statement below.
a. script
b. port scanning
c. novice
d. ethical hacker
17. Name a way to find open ports on a system.
18. Who copies code from knowledgeable programmers instead of creating the code him-
self/herself?
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
References 15
19. Name the set of instructions that runs in sequence to perform tasks on a computer
system. 1
20. Who is sometimes employed by companies to perform penetration tests.
Hands-On Project
Project 1-1
In this project, you set up the Linux computer that you will be using in many
of the projects throughout the book. There are a variety of free tutorials avail-
able on the Internet that will help you with this task. Entering the name of the
Linux variety you want to explore in your favorite search engine, followed by
the term “installation tutorial,” should reveal an array of resources that will be useful in this
exercise as well as those coming in subsequent chapters.
You need the following:
● An x86 computer with a minimum of 256MB RAM, the equivalent of a Pentium III 900
MHz processor or better, a 20GB hard drive, a high-speed cable or DSL phone modem,
and a 10/100 Ethernet network interface card. Please note that these specifications
should be viewed as minimum requirements; you will get better performance if you have
more RAM, a faster processor, and so on.
● A current version of a popular, robust Linux distribution, such as Fedora, Red Hat
Enterprise, CentOS, Mandriva, SUSE, or Ubuntu. The hands-on projects in this book
assume an installation of Fedora Core 6, and the steps are written accordingly.
However, other Linux distributions can be used, with minor modifications to the steps,
as needed.
● An Internet connection
1. Perform a default installation of the Linux OS. For the purposes of this book, you
won’t need to review or customize partitions, and you can accept the default partition-
ing scheme that the installation program selects.
2. When installation is complete, use the OS’s package manager to install any available
software updates. This will help ensure that your system contains important security
updates and bug fixes. For example, in Fedora, you can start the update process by
entering yum update at a Terminal window (you’ll need to log in as root) or
by clicking Applications, pointing to System Tools, and clicking Software Updater to
run the Software Updater program.
References
1. Computer Security Institute. “CSI 2010/2011 Computer Crime and Security Survey.”
gocsi.com. Retrieved April 9, 2012 @ http://gocsi.com/survey.
2. Verizon. “2012 Data Breach Investigations Report.” verizonbusiness.com. Retrieved
April 9, 2012 @ www.verizonbusiness.com/about/events/2012dbir/index.xml.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 Chapter 1 Ethics of Hacking and Cracking
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Reconnaissance
17
�"'' :111 J.c,11,:•i.o.___ ,..,11 tui111• :ic,....-.M•r,,...., • 1N1,,. .t11 tu . ,...'""" ��..,.,.,._11•1) h> •--"...., 1,0 ,.,._,..aoa
..,;, .i .""•-"'.lq,11<,oHI. 11>""""<><In11,11 .l>o•1<>o1.. ....c 1q1..11,<,
II••
.,.,....., u ,...., _ .i,
....... ,...,..a
...., ,..,. ,..rs,_..J,..,,.,._,._..._ m-i,ur.,,,., , 1111a lumai: ._.p;w1,,_ e.wo..,,...-s _._ ,..,..,.,.,1 .,,.,., .,..,
11,, ""'' "' ..,..,,,. it..-.,.,,.
4 '0'un
.. 11¥1U , ..,,,.11o 11 .
.. 111,,1,.,.
18 Chapter 2 Reconnaissance
Information leakage is a big problem that becomes even bigger with the use of
social networking and other Web-based services, which reveal useful information to mali-
cious hackers. Organizations therefore need to be aware of the potential areas of risk that
can be exploited by attackers. Several techniques can be used to discover viable targets.
These techniques fall within three tactical classes: social engineering, dumpster diving, and
Internet footprinting. Figure 2-1 shows an abridged organizational chart that includes the
reconnaissance methods described in this chapter.
Introduction to Reconnaissance
Reconnaissance is the act of locating targets and developing the methods necessary to attack
those targets successfully. The information that hackers use is the same regardless of whether
it’s used as part of an authorized penetration test or part of a surveillance step by an attacker.
Important sources of information include:
● Physical location of the target
● Data about the users at the facility
● Administrative short-cuts (such as assigning the same password to all new accounts
and expecting the user to change the password later)
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction to Reconnaissance 19
● Operating systems
● Network structure
● Hardware configuration
● Available services
2
● Business strategies
● Employee phone lists
● Staffing structure of the organization
● Internal newsletters
● All available published information about the company, either on its Web site or by
other writers
These types of information allow a hacker to figure out the targeted organization’s security
weaknesses and identify the best possible techniques and tools to conduct attacks.
Reconnaissance is not illegal by definition, nor are many specific reconnaissance techniques.
That’s because these kinds of activities do not result in actual damages, for which the organi-
zation would be able to prosecute. The following sections sort through the various areas of
reconnaissance, identifying which are legal and which may prove illegal or unethical.
Legal Reconnaissance
It is completely legal to look up all the information that’s available about a company on the
Internet, including its phone numbers, office hours, and addresses. In addition, many organi-
zations publicize very detailed information about their technical environments when seeking
trained IT staff; looking up this information is legal as well. Calling the organization with a
problem that requires customer service assistance is legal (even if it is a made-up problem).
Interviewing a member of the staff for a school project is legal. Physically entering a facility,
including attending a tour of the facility, is legal. Making friends with somebody who works
there or used to work there is legal. Company representatives would have to be exceptionally
paranoid not to answer the phone “just in case it is a hacker performing recon.” All these
methods—and many others like them—are completely legal and are done for various reasons
all the time.
Questionable Reconnaissance
Local laws vary, but in much of the world, performing a passive port scan is legal. Reading
the names on the mail that’s sitting on a mail cart or scanning a document that’s lying on a
desk may be legal. Picking up trash in the parking lot and looking at it before you toss it out
or hand it off to a company representative is probably legal. Picking up a copy of the com-
pany’s employee newsletter is probably legal. Asking for a phone list or a business card or
product specs is probably legal. Looking through a garbage can is probably legal. Conduct-
ing a stake-out to discover the movements of key individuals may be illegal; however, if the
hacker is not trespassing or otherwise attracting attention, it may be legal. War driving—
checking for unsecured wireless networks—is legal in some places and not in others. Leverag-
ing these legal types of activities can often be just as fruitful, in terms of providing a toehold
into the organization, as other activities that may cross the line into illegal or unethical
behavior.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
20 Chapter 2 Reconnaissance
Illegal Reconnaissance
There are a number of plainly illegal reconnaissance techniques. Developing a “front” com-
pany and acting as a representative of that company for the specific purpose of robbing or
defrauding a target company, in addition to being quite expensive and time consuming, is
probably illegal. Stealing garbage is illegal in some locales. Entering a home or office to look
for information is illegal, although it often goes undetected if nothing is removed. Surrepti-
tiously installing a keylogger—a tool that records users’ keystrokes—on a vulnerable
machine is illegal. Leaving a sniffer, which intercepts and reads data packets, on a network is
illegal.
Social Engineering
Social engineering involves an act of deception on the part of an attacker, which is meant to
trick well-meaning individuals into providing access to unauthorized information or systems.
Social engineering is typically considered unethical behavior but is sometimes used by ethical
hackers as part of a penetration test.
Social engineering works, for the most part, because people are trusting and want to be help-
ful, which is part of our social conditioning. Suspiciousness and selfishness are not traits we
teach our children, nor do most adults cultivate those traits. But being trusting and helpful
opens an avenue of risk. Security policies and vulnerability checks do provide some basic and
limited protection, but humans remain the weakest link in the security chain. Individual
employees must be responsible for protecting their usernames and complex passwords; for
securing their paperwork, files, and phone conversations; and for carefully selecting their cir-
cles of people they can trust.
Kevin Mitnick, a once-notorious, now well-respected hacker, made up for his lousy technical
skills with some sophisticated social engineering skills. In his book The Art of Deception,
Mitnick wrote, “Social engineering uses influence and persuasion to deceive people by
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Social Engineering 21
convincing them that the social engineer is someone he isn’t, or by manipulation. As a result,
the social engineer is able to take advantage of people to obtain information with or without
the use of technology.”1 Sometimes, social engineering is only part of an attack. The infamous
ILOVEYOU worm attack back in 2000 was caused by a virus, but it also involved social
engineering, exploiting the curiosity that causes people to click on an e-mail attachment.
2
The success or failure of social engineering depends on the ability of hackers to manipulate
human psychology, contacts, and physical workstations. Training and employee-awareness
programs are critically important to reduce social engineers’ ability to manipulate others.
Bribery Bribery can be an effective way to collect information. Here, the hacker pits an
employee’s greed against his or her loyalty to the organization. Once a bribe has been
accepted, blackmail is a common tactic for keeping the target employee working for the
hacker. While looking for victims, a social engineer asks the following questions about
employees:
● Do they work at a level of the company that might provide useful information?
● Are they in financial difficulty?
● Are they addicted to gambling, alcohol, or drugs?
● Are they unsatisfied with the organization?
● Are they focused on short-term gains with the company?
● Are they morally compromisable?
Bribery is a time-consuming technique that requires a lot of research on the target individ-
ual. There is also a potentially expensive front-end matter to consider. During the research,
the hacker will probably be required to invest time and resources in the person or persons
being bribed. The major risk to bribery is that the employee, though ready and willing to
perform, is unable to provide any useful information—or that they may change their mind,
either before or after that segment of the plan is complete. The hacker’s risk level stays high,
and there is at least one individual within the organization who knows some foul plan is in
effect.
Conformity This method depends on people’s tendency to believe that they are “typical”
and that an apparent similarity between themselves and other (unknown) persons is an
actual similarity. The attacker may use this sense of conformity to convince victims that
they have a lot in common and that they share the same values. Establishing this sense of
rapport is used to gain the confidence of the victim. Once the desired information is
obtained, the attacker will likely disengage. This is another area that an ethical hacker may
choose to pursue as part of a penetration testing engagement. If so, it should be done with
the knowledge that those who are the target of attention are likely to feel victimized regard-
less of the fact that the ethical hacker had no malicious intent.
3. Now, the hacker is believed to be a trusted assistant or expert in the field of network
security, and he is therefore given more access to the network in question, including
many critical systems.
4. Finally, the hacker is able to collect information from users and perhaps install hidden 2
running processes on the systems to which he now has access.
Most social engineering attacks are opportunistic; the hacker uses whatever technique he or
she thinks fits the situation. For example, impersonating a user and calling a help desk for
assistance might not be the way to go if the aim is to collect confidential information from
a sysop. All social engineering techniques are affected by ease of physical entry into the tar-
get organization or of communication with the victims within the organization.
Physical Intrusion
Physical intrusion refers to social engineers actually entering an organization’s premises with
the sole purpose of collecting information. The social engineering aspect of physical intrusion
results from the use of impersonation or other forms of deception to gain access to areas to
which the attacker should not be entitled.
First, the social engineer must scope out the premises. “Casing the joint” usually includes:
● Learning the organization’s schedules
● Knowing the floor plan of the building or buildings
● Engaging in surveillance or research to understand the existing security procedures
Learning an organization’s schedules or patterns includes knowing which people are likely to
be there at any one time, their jobs, and their work styles. It is also good to know who holds
which keys and where these people are at various times of the day. The more a hacker knows
about the usual behaviors of the people who work in the building, the less likely he or she
will arouse suspicion or set off alarms.
Failing to secure a building’s floor plans might provide an attacker with an opportunity to
get to the right place quickly while under stress. As in any complex plan, the less left to
chance and improvisation, the better the results.
Knowing the security measures that are in place also helps hackers know where the security
system breaks down. Social engineers normally have close contact with employees on
the inside before entering an organization’s building, and they can get a lot of baseline infor-
mation from those employees. A friendly employee is likely to be unaware of the useful
information he or she is imparting and will consider such divulged information to be just
“office war stories.” However, this information lets the hacker know the company’s physical
security, network security, and response policy to intrusion. There is no reason to assume
that a single hacker cannot have multiple contacts within an organization; he or she could
have a network of interested friends inside a company’s firewall.
Once the hacker acquires some information about the organization, he or she can develop
fake identification cards. Many companies use a laminated card with the employee’s informa-
tion on it. This is very easy to duplicate with a word processor and a laminator—at a copy
shop, for example. Before creating the fake ID, the social engineer must decide whether to
pose as an employee, a contractor, or an authority figure. Large companies with lots of
employees, contractors, and social churn are the easiest to infiltrate. Because nobody is
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
24 Chapter 2 Reconnaissance
expecting an attack, few will challenge a properly dressed individual with authentic-looking
identification, a show of confidence, and knowledge of the building and organization.
The last step is to acquire useful information. Through the development of a viable back-
story, the hacker may have been able to spend a good amount of time in the building unat-
tended, where he or she acquired all the available information using minimally intrusive
methods. In that time, they may have added keyloggers or sniffers to local computers, jim-
mied desk-drawer locks, or broken into filing cabinets, looking for business documents and
passwords. There are several methods for easily gathering information without alarming
other employees. Many users write down their passwords and keep them in plain view, or
they store them in their local computers. A hacker may also just watch users while they’re
typing their passwords and business documents.
How do social engineers perform these physical intrusion activities without generating any
suspicion? They never collect all the required information from a single user or source, and
they never hold a job position after the necessary activity has ended. The more valuable the
information is, the more likely hackers are working with a team or with backing that funds
their efforts. Corporate espionage is alive and well.
When physical intrusion is not a possibility because of a distributed corporate presence or a
strong security perimeter, hackers sometimes use communication media. Communication
media help social engineers perform their activities remotely, thus causing less suspicion.
Communication Media
Social engineers use postal mail, e-mail, instant messaging, social networking, and telephone
communication to get useful information from target individuals within an organization. Let
us briefly overview these various media and examine how they are used by hackers.
Postal Mail A venerable medium of communication, postal mail is a powerful tool for
social engineers to gather personal information about users. In a typical attack, the victim
receives a letter announcing that he or she has won a prize. The content of the mailer is
very professional and slick, asking for verification details in order for the victim to receive
the prize. This can include phone numbers, e-mail addresses, tax information, and so forth.
The greed engendered by the idea of winning a prize leads the victim to happily surrender
all sorts of information, which is then used to further victimize the user. What differentiates
this attack from a typical mailing by a genuine mail-order house is that the genuine mailer is
sent in bulk and manufactured to look that way, whereas a mail attack is usually sent only
to the specific victim. This technique is not illegal, but some of the subsequent uses of the
information may be. The technique also requires more patience; and in a society already
driven by immediate gratification, it may not be as tempting, although it is still more effec-
tive than using e-mail, which organizations are more cautious about.
E-Mail E-mail is used in a variety of scams, but in this chapter, we will look at three uses.
A social engineer can send an e-mail purported to be from a legitimate IT e-mail account,
such as from the network administrator, but using the social engineer’s own return address.
This e-mail itself may claim there is a problem to be fixed and that the user must send his or
her password to help solve it. Most legitimate administrators and technicians are constantly
fending off unrequested username and password combinations, volunteered by users who
think they need to provide this information to have their problem resolved. A legitimate
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Social Engineering 25
administrator never needs a password to troubleshoot a user’s login issues; nevertheless, the
social engineer’s trick of asking for this information as though it were needed to fix a prob-
lem is often successful.
Another trick is to send e-mail message invitations to join online competitions to receive 2
prizes. In these cases, the social engineer attaches forms that must be filled out by users for
joining the competition. The form requests information such as usernames, phone numbers,
passwords, and Social Security numbers. Users fall for this trick out of the desire to win a
prize or money. Many people have the same username and password for multiple online
accounts; thus, by providing this information, they jeopardize all their accounts that use
these username/password combinations.
The final ploy is called phishing, in which a user is tricked into giving private information
about his or her account with a known large organization. A common form of phishing is
for an attacker to send out an e-mail message that appears to be from a source that the
receiver is likely to trust. The message often contains a link to a Web site where the receiver
is tricked into entering confidential information that will then be sold or used to provide
information for a larger attack. Figure 2-2 shows a typical phishing form that users might
encounter by clicking a link that offers helpful ways to keep their information safe.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
26 Chapter 2 Reconnaissance
Internet sites are often used as platforms for phishing expeditions, as well as for phony
“prize-distribution” ploys. It is easy to make professional-looking Web sites in very little
time—so easy, in fact, that it is sometimes difficult to tell the phishing sites from the genuine
ones. Users should check if the form is an https page, which indicates it uses encryption to
guard transmitted data. Fake sites don’t tend to care if data is at risk during transmission
and so will not provide any safeguards. Users should not send sensitive data to sites with
which they are not well acquainted. Phishing sites take advantage of users’ tendency to
employ the same username and password for many similar sites, then they go looking for
the other sites to which the users are subscribed. The level of sophistication that phishers
bring to their techniques is such that even information security professionals can fail to iden-
tify a malicious link, which is why phishing is one of the more common risks experienced by
today’s organizations.
Instant Messaging Instant messaging hacking scripts are prevalent in many public IM
platforms. Here, the social engineer attempts to befriend the victim to gather information
and/or introduce the victim to a Web link he might want to visit. Usually, these sites are
pornography related. Actual people usually contact one another through mutual friends or
by searching profiles for pertinent keywords. Random contacts that are actual people with
legitimate interests declare their intentions outright: “I saw on your profile that you like
model trains. I do, too. How do you make miniature farm animals for your trains?” They
might be selling toy horses, but they say that up front. In contrast, there are automated
scripts that run on ICQ and Yahoo IM. In some cases, it is possible to have a 20-minute
IM session with a set of automated responses! But they are easy to catch as well. Because
they are automated, they are not able to respond to open-ended questions, such as “What
kind of tea do you like?” Their responses are noticeably inappropriate, so it is easy to
block them early in the conversation. It is also possible to set the IM client to accept only
contacts from an approved list.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Dumpster Diving 27
Dumpster Diving
Dumpster diving—the act of combing through an organization’s refuse—often provides the
mother lode of sensitive information as well as actual hardware and software. Hackers look
specifically for sales receipts and paperwork that contain personal data or credit card informa-
tion. This information can be sold to others who will do damage with it, or it can be used by
the hacker himself. Shredded documents can lead to data leaks when all the shredders are
strip shredders and the resultant strips are disposed of in a single bag. Although cross-cut
shredders are more secure, the complicated jigsaw puzzle they create can be reconstructed by
whoever wishes to put in the time. Many people believe that all companies carefully shred
and dispose of their personal information, but this is not necessarily true. In many places,
documents considered less sensitive are dropped directly into publicly available receptacles.
Drafts of letters, even mail-merge documents with hundreds of recipients, are routinely left
whole in the trash. Company directory sheets, catalog lists, unused or misprinted labels, and
policy manuals are not recognized as sensitive data, so they are left whole in the trash as
well, but consider the consequences of a criminal retrieving this information. They are not
concerned with whether the labels are printed properly; they are interested in the names and
addresses, phone numbers, and employee IDs that appear there.
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
28 Chapter 2 Reconnaissance
There are various ways to dispose of trash paper, such as using cross-cut shredders or locked
trash receptacles. As a result of the Health Insurance Portability and Accountability Act
(HIPAA) and similar federal legislation, such as the Sarbanes-Oxley (SOX) Act, a cottage
industry of document-destruction services has emerged. These services involve backing trucks
up to organizations, collecting locked bins, shredding the information, and then issuing certi-
ficates of destruction to the organization, both as a form of insurance policy against misuse
of these documents and to provide evidence of compliance to regulators or auditors.
Old hardware cannot be shredded and takes up space; thus, these items are frequently
thrown out, or given to employees to take home. Hackers search for outdated hardware,
such as tapes, CD-ROMs, and hard disks. There are various tools available to hackers, such
as forensics programs, that can restore data from damaged data-storage devices. Information
recovery services such as Kroll have demonstrated that it is really physical destruction of stor-
age devices that can best ensure that sensitive information cannot be recreated.
Internet Footprinting
Internet footprinting is a technical reconnaissance method that interests budding hackers and
network security specialists alike. Hackers like it because it is clean, legal, and safe; security
specialists often choose it over all other methods of surveillance because of the increased ave-
nues of information leakage experienced by modern organizations. This kind of profiling helps
the social engineer understand the target system’s Internet, intranet, and remote-access setups.
It is easy to implement and almost undetectable by the victim.
There are five Internet footprinting methods:
● Social networking
● Web searching
Network enumeration
Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Exploring the Variety of Random
Documents with Different Content
foreigners writing in America, 510–12;
some American patrons of music, 512–13;
symphony orchestras, 513–4;
opera companies, 514;
twentieth century composers in, 545–6
University of California, open air theatre at, 469
V
Valkyrie, Wagner’s, 367, 368, 369, 371, 374, 375
Van der Stucken, Frank, 490
Varese, Edgar, 511
Vaudeville, origin of the word, 119–20
Venetian school of music, the, 155–7
Venice, first public opera house in, 185
Verdi, Giuseppe, account of his life and work, 377–81
Vielle, or hurdy-gurdy, the, 106
Vikings, the, 91
Viola, the, 216–17
Violin, makers of the, in Cremona, 14–17;
perfecting of the bow, 323;
the growth of violin music, 323–5
Violoncello, the, 216
Viols, of the Arabs, 60
Viotti, Giovanni Battista, 323
Virginal, the, 210, 310, 311
Virginals, in England in the 16th and 17th centuries, 195–6
Vitali, Giovanni Battista, 218
Vivaldi, 218
Volger, Abbé, 327, 328
W
Wagner, Wilhelm Richard, account of his life and work, 359–76;
influence of other musicians upon, 360–1;
first use of leit-motif by, 364;
The Flying Dutchman, 365;
Tannhäuser, 365–6, 370;
Lohengrin, 366, 368, 375;
The Nibelungen Ring, 364, 366 ff.;
Tristan and Isolde and The Meistersinger, 369–71, 372;
Bayreuth, 371–2, 373;
Parsifal, 372–3, 374;
his influence on opera, 374–6;
influence of, on Verdi, 377, 381;
followers of his theories in France, 389;
and Liszt, 405–6, 407, 408
Wagner, Siegfried, 395
Wallace, William Vincent, 341
Walther, Johann, 166
Washington, George, 464
Water organs, 309
Weber, Carl Maria von, 327–9, 333, 334;
influence of, on Wagner, 360
Weelkes, Thomas, 200, 201
Weingartner, Felix, 424
Wellesz, Egon, 533
Welsh folk music, 137–8
Wesley, Samuel, 340
Whiteman, Paul, 508
Whithorne, Emerson, 505
Whiting, Arthur, 482
Whitman, Walt, 474
Widor, Charles Marie, 392
Wieck, Clara, 352–3
Willaert, foundation of Venetian school of music by, 155–6
William the Conqueror, 93
William Tell, Rossini’s, 337
Williams, Vaughn, 543
Wolf, Hugo, 424–6
Wolfe, James, 380
Wolf-Ferrari, Ermanno, 385
Wolle, Frederick, 464
Wood, Sir Henry J., 318
Worde, Wynken de, song book of, 191
Y
Young People’s Concerts, New York, 470
Ysaye, Eugene, 434
Z
Zarlino, books on harmony and theory by, 157
Zither, use of, by the Arabs, 60
TRANSCRIBER’S NOTES
1. Silently corrected obvious typographical errors and
variations in spelling.
2. Retained archaic, non-standard, and uncertain spellings
as printed.
3. The music files are the music transcriber’s interpretation
of the printed notation and are placed in the public
domain.
P. 78, Organum, Subsituted 1/2 note rest for
short bar line indicating break between sung
notes.
P. 78, Discant, missing slur and not whole note.
*** END OF THE PROJECT GUTENBERG EBOOK HOW MUSIC
GREW, FROM PREHISTORIC TIMES TO THE PRESENT DAY ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com