SlideShare a Scribd company logo
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
1
 the term hacker simply referred to an adept
computer user, and gurus still use the term to
refer to themselves in that original sense.
 when breaking into computer systems
(technically known as cracking) became popular,
the media used the hacker to refer only to
computer criminals
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
 Hacking is illegal. Title 18, United States Code,
Section 1030, by Congress in 1984
 the perpetrator must “knowingly” commit the
crime
 notification that unauthorized access is illegal be
posted
 For a computer-related crime to become a
federal crime, the attacker must be shown to
have caused at least $5,000 worth of damage.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
 2004 CANSPAM Act specifically criminalizes the
transmission of unsolicited commercial e-mail
without an existing business relationship.
 Before that, spamming was not a crime! 
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
 Because of the time it takes, there are only two
serious types of hackers:
› the underemployed and
› those hackers being paid by someone to hack.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
 Hackers fall quite specifically into these
categories, in order of increasing threat:
› Security experts
› Script kiddies
› Underemployed adults
› Ideological hackers
› Criminal hackers
› Corporate spies
› Disgruntled employees
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
 Most security experts are capable of hacking but
decline to do so for moral or economic reasons.
 Computer security experts have found that
there’s more money in preventing hacking than
in perpetrating it
 hundreds of former hackers now consult
independently as security experts to medium-
sized businesses.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
 Script kiddies are students who hack
 These hackers may use their own computers, or
(especially at colleges) they may use the more
powerful resources of the school to perpetrate
their hacks.
 joyride through cyberspace looking for targets of
opportunity
 concerned mostly with impressing their peers
and not getting caught.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
 in most instances, you’ll never know they were
there unless you have software that detects
unusual activity or unless they make a mistake.
 These hackers constitute about 90 percent of
the total manual hacking activity on the Internet.
 They use the tools produced by others,
 script kiddies hack primarily to get free stuff
 They share pirated software and serial numbers
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
 Underemployed adults are former script kiddies
 either dropped out of school or failed to achieve
full-time employment and family commitments
 Many of the tools script kiddies use are created
by these adult hackers
 Adult hackers often create the “crackz” applied
by other hackers to unlock commercial software.
 This group also writes the majority of the
software viruses.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
 Ideological hackers are those who hack to further
some political purpose.
 Since the year 2000, ideological hacking has gone
from just a few verified cases to an information war
 They deface websites or perpetrate DoS attacks
against their ideological enemies.
 looking for mass media coverage of their exploits
 have the implicit support of their home government
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
 Criminal hackers hack for revenge, to perpetrate
theft, or for the sheer satisfaction of causing
damage.
 exceedingly rare because the intelligence
required to hack usually also provides ample
opportunity for the individual to find some
socially acceptable means of support
 little risk to institutions that do not deal in large
volumes of computer-based financial
transactions
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
 very rare because it’s extremely costly and
legally very risky to employ illegal hacking tactics
against competing companies
 Many high technology businesses are young and
naïve about security
 Nearly all high-level military spy cases involve
individuals who have incredible access to
information but as public servants don’t make
much money
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
 Disgruntled employees are the most dangerous
—and most likely—security problem of all
 Attacks range from the complex (a network
administrator who spends time reading other
people’s e-mail) to the simple (a frustrated clerk
who takes a fire axe to your database server).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
 There are only four ways for a hacker to access
your network:
1. By connecting over the Internet
2. By using a computer on your network directly
3. By dialing in via a Remote Access Service (RAS)
server
4. By connecting via a nonsecure wireless network
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
 Solving the direct intrusion problem is easy:
 Employ strong physical security at your premises
 treat any cable or connection that leaves the
building as a security concern.
 putting firewalls between your WAN links and
your internal network or behind wireless links
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
 Put your RAS servers outside your firewall in the
public security zone,
 force legitimate users to authenticate with your
firewall first to gain access to private network
resources.
 Allow no device to answer a telephone line
behind your firewall.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
 802.11b came with a much-touted built-in
encryption scheme called the Wired-Equivalent
Privacy (WEP) that promised to allow secure
networking with the same security as wired
networks have.
 It sounded great.
 Too bad it took less than 11 hours for security
experts to hack it
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
 newer 128-bit WEP service is more secure, but it
should still not be considered actually equivalent
to wired security
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
 Target selection
 Information gathering
 Attack
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
 To pass this stage, some vector of attack must
be available, so the machine must have either
advertised its presence or have been found
through some search activity.
› DNS Look-up
› Network Address Scanning
› Port Address Scanning
› Service Scanning
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
› SNMP Data gathering
› Architecture probes
› Directory service look-up
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
 Phishing
 Automated password guessing
 Buffer overflow
 MiM
 Session Hijacking
 Source Routing
 Trojan horse
 Forged e-mails
 Floods
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23

More Related Content

What's hot (20)

DOCX
Final report ethical hacking
samprada123
 
PDF
Lucideus Company Profile 2014
Lucideus Tech
 
PDF
Implementing a comprehensive application security progaram - Tawfiq
OWASP-Qatar Chapter
 
PDF
How to analyze cyber threats
AkankshaPathak27
 
PDF
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
PDF
Ethical hacking
Umang Patel
 
PPTX
Cyber security and Cyber Crime
Deepak Kumar
 
PPTX
What is Phishing - Kloudlearn
KloudLearn
 
PDF
Analytical Study on Network Security Breach’s
ijtsrd
 
PPTX
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
PDF
Cyber crime liability report
Sayali Sawant
 
PDF
Report on Hacking
Sharique Masood
 
PDF
Cyber security awareness for students
Kandarp Shah
 
PDF
IP Spoofing
ijtsrd
 
PPTX
Presentation on cyber security
9784
 
PPT
this is test for today
DreamMalar
 
PDF
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
PPTX
CYBERSECURITY | Why it is important?
RONIKMEHRA
 
PDF
Cyber Security
JamshidRaqi
 
Final report ethical hacking
samprada123
 
Lucideus Company Profile 2014
Lucideus Tech
 
Implementing a comprehensive application security progaram - Tawfiq
OWASP-Qatar Chapter
 
How to analyze cyber threats
AkankshaPathak27
 
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Ethical hacking
Umang Patel
 
Cyber security and Cyber Crime
Deepak Kumar
 
What is Phishing - Kloudlearn
KloudLearn
 
Analytical Study on Network Security Breach’s
ijtsrd
 
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Cyber crime liability report
Sayali Sawant
 
Report on Hacking
Sharique Masood
 
Cyber security awareness for students
Kandarp Shah
 
IP Spoofing
ijtsrd
 
Presentation on cyber security
9784
 
this is test for today
DreamMalar
 
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
CYBERSECURITY | Why it is important?
RONIKMEHRA
 
Cyber Security
JamshidRaqi
 

Viewers also liked (17)

PPT
L2 Intrusion Detection System (IDS)
Rushdi Shams
 
PPT
L4 vpn
Rushdi Shams
 
PDF
L1 l2 l3 introduction to machine translation
Rushdi Shams
 
PPTX
Belief function
Rushdi Shams
 
PPTX
Semi-supervised classification for natural language processing
Rushdi Shams
 
PPT
L1 phishing
Rushdi Shams
 
PPT
L3 defense
Rushdi Shams
 
PPTX
Probabilistic logic
Rushdi Shams
 
PPT
L15 fuzzy logic
Rushdi Shams
 
PPT
Knowledge structure
Rushdi Shams
 
PPT
Knowledge representation
Rushdi Shams
 
PPTX
Propositional logic
Rushdi Shams
 
PPT
Syntax and semantics
Rushdi Shams
 
PPTX
Natural Language Processing: Parsing
Rushdi Shams
 
PPT
First order logic
Rushdi Shams
 
PPT
Types of machine translation
Rushdi Shams
 
PPT
Propositional And First-Order Logic
ankush_kumar
 
L2 Intrusion Detection System (IDS)
Rushdi Shams
 
L4 vpn
Rushdi Shams
 
L1 l2 l3 introduction to machine translation
Rushdi Shams
 
Belief function
Rushdi Shams
 
Semi-supervised classification for natural language processing
Rushdi Shams
 
L1 phishing
Rushdi Shams
 
L3 defense
Rushdi Shams
 
Probabilistic logic
Rushdi Shams
 
L15 fuzzy logic
Rushdi Shams
 
Knowledge structure
Rushdi Shams
 
Knowledge representation
Rushdi Shams
 
Propositional logic
Rushdi Shams
 
Syntax and semantics
Rushdi Shams
 
Natural Language Processing: Parsing
Rushdi Shams
 
First order logic
Rushdi Shams
 
Types of machine translation
Rushdi Shams
 
Propositional And First-Order Logic
ankush_kumar
 

Similar to L5 understanding hacking (20)

PPTX
Information-Security-Lecture-7.pptx
anbersattar
 
PPTX
Hacking and Anti Hacking
International Islamic University
 
PPTX
Ethical hacking 2016
arohan6
 
PPTX
Ethical hacking
arohan6
 
PPTX
Ethical hacking
arohan6
 
PPTX
Introduction To Hacking
Raghav Bisht
 
PPT
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPTX
The Basics of Ethical Hacking
Vamshi TG
 
PPT
Introduction to hackers
Harsh Sharma
 
PPTX
Cybercrimes and Cybercriminals
Ashikur Rahman
 
PPT
All about Hacking
Madhusudhan G
 
PPTX
Dhams hacking
dharmesh ram
 
PPTX
hacking basics
dharmesh ram
 
PPT
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
PDF
Introduction of hacking and cracking
Harshil Barot
 
PPTX
Hacking presentation
Ajith Reddy
 
PPT
Hacking
Nirmal Dev
 
PPT
CO1-Concept of ethical hacking Explained
ayushkr0457
 
PDF
Concept of threats and threat environment
Uyoyo Edosio
 
PPTX
Ethical hacking
djkhatri
 
Information-Security-Lecture-7.pptx
anbersattar
 
Hacking and Anti Hacking
International Islamic University
 
Ethical hacking 2016
arohan6
 
Ethical hacking
arohan6
 
Ethical hacking
arohan6
 
Introduction To Hacking
Raghav Bisht
 
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
The Basics of Ethical Hacking
Vamshi TG
 
Introduction to hackers
Harsh Sharma
 
Cybercrimes and Cybercriminals
Ashikur Rahman
 
All about Hacking
Madhusudhan G
 
Dhams hacking
dharmesh ram
 
hacking basics
dharmesh ram
 
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
Introduction of hacking and cracking
Harshil Barot
 
Hacking presentation
Ajith Reddy
 
Hacking
Nirmal Dev
 
CO1-Concept of ethical hacking Explained
ayushkr0457
 
Concept of threats and threat environment
Uyoyo Edosio
 
Ethical hacking
djkhatri
 

More from Rushdi Shams (14)

PDF
Research Methodology and Tips on Better Research
Rushdi Shams
 
PPTX
Common evaluation measures in NLP and IR
Rushdi Shams
 
PPTX
Machine learning with nlp 101
Rushdi Shams
 
PPT
L2 l3 l4 software process models
Rushdi Shams
 
PPT
L1 overview of software engineering
Rushdi Shams
 
PPT
L13 why software fails
Rushdi Shams
 
PPT
Lecture 14,15 and 16 file systems
Rushdi Shams
 
PPT
Lecture 11,12 and 13 deadlocks
Rushdi Shams
 
PPT
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Rushdi Shams
 
PPT
Lecture 5, 6 and 7 cpu scheduling
Rushdi Shams
 
PPT
Lecture 1 and 2 processes
Rushdi Shams
 
PPT
Lecture 3 and 4 threads
Rushdi Shams
 
PPT
Distributed Database Management Systems (Distributed DBMS)
Rushdi Shams
 
PPT
My slide relational algebra
Rushdi Shams
 
Research Methodology and Tips on Better Research
Rushdi Shams
 
Common evaluation measures in NLP and IR
Rushdi Shams
 
Machine learning with nlp 101
Rushdi Shams
 
L2 l3 l4 software process models
Rushdi Shams
 
L1 overview of software engineering
Rushdi Shams
 
L13 why software fails
Rushdi Shams
 
Lecture 14,15 and 16 file systems
Rushdi Shams
 
Lecture 11,12 and 13 deadlocks
Rushdi Shams
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Rushdi Shams
 
Lecture 5, 6 and 7 cpu scheduling
Rushdi Shams
 
Lecture 1 and 2 processes
Rushdi Shams
 
Lecture 3 and 4 threads
Rushdi Shams
 
Distributed Database Management Systems (Distributed DBMS)
Rushdi Shams
 
My slide relational algebra
Rushdi Shams
 

Recently uploaded (20)

PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 

L5 understanding hacking

  • 1. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 1
  • 2.  the term hacker simply referred to an adept computer user, and gurus still use the term to refer to themselves in that original sense.  when breaking into computer systems (technically known as cracking) became popular, the media used the hacker to refer only to computer criminals Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
  • 3.  Hacking is illegal. Title 18, United States Code, Section 1030, by Congress in 1984  the perpetrator must “knowingly” commit the crime  notification that unauthorized access is illegal be posted  For a computer-related crime to become a federal crime, the attacker must be shown to have caused at least $5,000 worth of damage. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
  • 4.  2004 CANSPAM Act specifically criminalizes the transmission of unsolicited commercial e-mail without an existing business relationship.  Before that, spamming was not a crime!  Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
  • 5.  Because of the time it takes, there are only two serious types of hackers: › the underemployed and › those hackers being paid by someone to hack. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
  • 6.  Hackers fall quite specifically into these categories, in order of increasing threat: › Security experts › Script kiddies › Underemployed adults › Ideological hackers › Criminal hackers › Corporate spies › Disgruntled employees Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7.  Most security experts are capable of hacking but decline to do so for moral or economic reasons.  Computer security experts have found that there’s more money in preventing hacking than in perpetrating it  hundreds of former hackers now consult independently as security experts to medium- sized businesses. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8.  Script kiddies are students who hack  These hackers may use their own computers, or (especially at colleges) they may use the more powerful resources of the school to perpetrate their hacks.  joyride through cyberspace looking for targets of opportunity  concerned mostly with impressing their peers and not getting caught. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
  • 9.  in most instances, you’ll never know they were there unless you have software that detects unusual activity or unless they make a mistake.  These hackers constitute about 90 percent of the total manual hacking activity on the Internet.  They use the tools produced by others,  script kiddies hack primarily to get free stuff  They share pirated software and serial numbers Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
  • 10.  Underemployed adults are former script kiddies  either dropped out of school or failed to achieve full-time employment and family commitments  Many of the tools script kiddies use are created by these adult hackers  Adult hackers often create the “crackz” applied by other hackers to unlock commercial software.  This group also writes the majority of the software viruses. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
  • 11.  Ideological hackers are those who hack to further some political purpose.  Since the year 2000, ideological hacking has gone from just a few verified cases to an information war  They deface websites or perpetrate DoS attacks against their ideological enemies.  looking for mass media coverage of their exploits  have the implicit support of their home government Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
  • 12.  Criminal hackers hack for revenge, to perpetrate theft, or for the sheer satisfaction of causing damage.  exceedingly rare because the intelligence required to hack usually also provides ample opportunity for the individual to find some socially acceptable means of support  little risk to institutions that do not deal in large volumes of computer-based financial transactions Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13.  very rare because it’s extremely costly and legally very risky to employ illegal hacking tactics against competing companies  Many high technology businesses are young and naïve about security  Nearly all high-level military spy cases involve individuals who have incredible access to information but as public servants don’t make much money Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
  • 14.  Disgruntled employees are the most dangerous —and most likely—security problem of all  Attacks range from the complex (a network administrator who spends time reading other people’s e-mail) to the simple (a frustrated clerk who takes a fire axe to your database server). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
  • 15.  There are only four ways for a hacker to access your network: 1. By connecting over the Internet 2. By using a computer on your network directly 3. By dialing in via a Remote Access Service (RAS) server 4. By connecting via a nonsecure wireless network Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
  • 16.  Solving the direct intrusion problem is easy:  Employ strong physical security at your premises  treat any cable or connection that leaves the building as a security concern.  putting firewalls between your WAN links and your internal network or behind wireless links Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
  • 17.  Put your RAS servers outside your firewall in the public security zone,  force legitimate users to authenticate with your firewall first to gain access to private network resources.  Allow no device to answer a telephone line behind your firewall. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
  • 18.  802.11b came with a much-touted built-in encryption scheme called the Wired-Equivalent Privacy (WEP) that promised to allow secure networking with the same security as wired networks have.  It sounded great.  Too bad it took less than 11 hours for security experts to hack it Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
  • 19.  newer 128-bit WEP service is more secure, but it should still not be considered actually equivalent to wired security Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
  • 20.  Target selection  Information gathering  Attack Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
  • 21.  To pass this stage, some vector of attack must be available, so the machine must have either advertised its presence or have been found through some search activity. › DNS Look-up › Network Address Scanning › Port Address Scanning › Service Scanning Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
  • 22. › SNMP Data gathering › Architecture probes › Directory service look-up Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
  • 23.  Phishing  Automated password guessing  Buffer overflow  MiM  Session Hijacking  Source Routing  Trojan horse  Forged e-mails  Floods Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23