Posts

Showing posts from December, 2016

LET’S TALK ABOUT HACKERS - PART 2

LET’S TALK ABOUT HACKERS - PART 2 Main Concept : A cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system" HACKING TECHNIQUES AND OTHERS: VULNERABILITY SCANNER : A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. FINDING VULNERABILITIES : Hackers may also attempt to find vulnerabilities manually. A common approach is to search for possible vulnerabilities in the code of the computer system then test them, sometimes reverse engineering the software if the code is not provided. BRUTE-FORCE ATTACK : Password guessing. This method is very fast when used to

RANSOMEWARE, WHAT IS AND HOW DOES IT WORKS

Image
RANSOMEWARE, WHAT IS AND HOW DOES IT WORKS? Ransomware is computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to decrypt it or not publish it. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer's Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key.  MECHANISM: ATTACKER -> VICTIM: The attacker generates a key pair and places the corresponding public key in the malware. The malware is released. VICTIM