Hacking Basics
Wenger Thema 2
Wenger Thema 2
Kartei Details
Karten | 24 |
---|---|
Sprache | English |
Kategorie | Informatik |
Stufe | Universität |
Erstellt / Aktualisiert | 16.12.2018 / 14.06.2023 |
Lizenzierung | Keine Angabe |
Weblink |
https://card2brain.ch/box/20181216_hacking_basics
|
Einbinden |
<iframe src="https://card2brain.ch/box/20181216_hacking_basics/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
What is the difference between hacker, cracker, attacker?
- a hacker, likes to get into his own computer and understand how it works
- a cracker or attacker, wants to get into other peoples systems and networks
- hacker term is falsely used in public for the malicious hacker (cracker or attacker)
What is a critical inftastructure?
- government websites
- industry websites - process control networks (nuclear systems)
- airports
- harbours
- railway station
- base internet infrastructure
- internet core routers
- DNS root name server
What two main categories of attackers do exist?
- insiders (work for the company - legitimated to use internal systems)
- outsiders (remote attacker - attack public systems or break into internal systems)
How does the insider (attacker) attack the system?
What's it's motivation?
- abuse privileges
- impersonate higher privileged users
- motivation: Gier, Veruntreuung, Betrug, Rache, Verärgernis, ehemaliger MA
What targets does the outsider have? (100 answers)
- deface web servers (entstellen)
- forward spam (misuse mail servers)
- ddos attacks (bring down services)
- go around firewalls
- create bot nets for spamming, ddos attacks
- sell, rent those networks
- steal confidential information
From where do outsiders attack?
- internet
- wireless networks
- dial-up lines
- physical breakins
- linked partner networks
Motivation of outside attackers?
- Gier, Respekt,
- identity / credit card theft
- espionage
- hacktivism, pranking
- script kiddies: -> fun/ignorance
Tell the 3 main intrustion techniques
- physical intrustion
- system intrustion / privilege escalation
- remote intrusion