In 2004, Mark
Zuckerberg, a student at Howard University, created a social networking site
called Facebook, which was exclusively for students at the school and was
opened to the public in September 2006. In 2007, Facebook was introduced to be
used by other means of social media. Over time, Facebook spread to users not
only in the United States but around the world. And its revenue will continue
to grow through advertising. With that in mind, Microsoft bought 1.6 percent of
its shares for 240 million, bringing the total value of Facebook to 15 billion.
The total population of the world is seven billion people, of which three
billion people use Facebook on a daily basis. Prior to October 2021, Facebook
renamed the company Meta Platform, commonly known as Meta, and became part of the
Metavers, which is used in the broader sense of the Internet. Facebook has
announced that it is hiring tens of thousands of people from Europe to develop
Metavers. This is a concept that people are going to talk about the future of
the Internet. But what does Facebook want and what will be the future of the
world because of social media dependent on the Internet? It may seem like a
soup-up version of virtual reality, but some people think that Metavers is the
future of the Internet. In fact, the virtual reality "VR" concept is
similar to the one invented by the modern Smartphone in the 1980's, the first
mobile phone. The use of computers is introducing a new world in which users
will become part of the digital world using Metavers, which will be the environment
of a virtual "artificial" world. But in the human mind it would be
like a real gift of feeling. There will be a sense of cross-border and
unlimited social life. Unlike the current VR, which can be used for more online
or offline games, the virtual world can be used for virtually anything. It can
be used for work, sports, concert, and cinema or even for sightseeing. There is
a lot of excitement about Metavers among the rich, investors and big tech firms
and no one wants to be left behind if it proves to be the future of the
internet. There is also a sense that this is the first time this technology has
come to the fore. With the development of VR gaming and connectivity, this may
be required. Facebook has stated that building Metavers is one of its top
priorities. Many tech firms, including Facebook, are investing in virtual
reality, making it cheaper than competitors. According to some analysts, this
could be harmful. VR apps are also being developed for these social hangouts
and work-spaces. Despite a history of buying competitors, Facebook claims that
Metavers will not build a company overnight and has promised to cooperate. It
has recently invested 50 million in financing nonprofit groups to help build
the Metavers responsibly, but it may take another ten to fifteen years for the
concept of the real Metavers to emerge. Significantly, the world has decided to
modernize the traditional style and functioning of the Internet, and the
situation that arises from it, that is, the scenario, includes goals such as
the formation of a facilitated society. Metavers will not only enhance the
sense of reality in social networking but will also make 3D technology in the
fields of education, health and tourism accessible to all special and common
people and will revolutionize the development of different fields and inform
consumers. And the details of the activities will not be kept secret.
METAVERS
THAT'S THE TIK TOK
TIKS TOK is the most downloaded in the world. The
most interesting. The most infamous. Tick tock, even a tea stall holder can
show off their talent. Everyone and Knox have complete freedom to perform in
this short video. But with the use of it, young people and young people are at
high risk of death. This web is appearing in the face of society in a strange
way, which has changed a lot of society. That's the TIK TOK. It is just a well
of death. It was a straight path to entertainment. Video Share Platform.
Laughter spreads on the faces of sad people. But it has been turned into a well
of death. How many people have fallen into it? Then how many of them fell out
of it and where did they fall? How many young and blooming buds have been
burdened with dust. The faces of his family are wet with tears. Make a tick
talk video a hundred times and a hundred and one times again. But don't play
with your life and stop making tick-tock videos in dangerous places. Sitting in
front of the oncoming train, the boy tried to make a tick-tock video with the
help of the rear camera, but the train reached his head in such a short time.
He is not in a position to describe the situation. Another woman fell into a
manhole while making a TIK TOK video. Another girl, who was making a tick-tock
video by the river, slipped on her feet and looked at the waves. In
another case, some friends got confused and made bets with each other about who
would swim from one side to the other in a short time. As soon as he said this,
a friend jumped into the river and as soon as he saw it, the boy drowned in the
river and the rest of the friends had no choice but to shout and thus he lost
his life. TIK TOK is a platform for children, old and young alike to present
their art to both boys and girls. There is an excuse to learn and teach the
style and manners inside the house. Parents should keep a close eye on their
children. Guess which of our kids is keen to make TIK TOK videos indoors. This
needs attention, because they want to gain fame and impress the viewers by
making any inversion and astonishing them. He will not do it himself but
unknowingly his life may be in danger. There have been many incidents with tick
talk stars. But still these people do not give up. Just think that something
has happened or will happen to the next one. But nothing will happen to me and
in this delusion he leaves this world. In this way, they take risks and make
some videos, but in this risk, they also risk their lives. Tick tock is
another name for scattering laughter and smiles on sad faces. But if someone
sees you and shakes your hand with regret, it is very immoral. If it had been
banned, it would have removed the good Thamgar. TIK TOK will not create the
wrong content. We must use it in a positive way. China has blocked the accounts
of millions of users to control the website. There is a special ban on
13-year-olds, but where does the new plant comply with the ban? This refreshed
website is being used by a certain group to advance their thinking instead of
entertainment. Wealth does not come from TIK TOK but fame does come from hand.
But that too to someone. At the moment, I have a few names that I refrain from
writing. But they will change their style in their own way and reach the
heights of fame overnight. Modern development has brought a lot of benefits,
but people have also used it in an ugly way and lost their lives. Now fans have
also started taking pictures with TIK TOK stars. The tick-tock application was
developed by China and is now in a state of disarray. Because it also faces
opposition from the United States. Tick tock company has lost millions of
videos. But the next day millions of videos will be made. Children do not have
bats. Annoyingly Libran - always rational, easily hurt emotionally, very
passionate and maybe a little too intense. Well, I have to write about the
young people who put their lives in the fire. Very few die intentionally and
most unknowingly.
MOBILE PHONE USES
The
International Telecommunication Union (ITU) has said in its report that by the
end of this year, mobile will reach 92% of the world's population. And the
number of mobile users globally will exceed 110 million. Scientific inventions
have undoubtedly brought many conveniences to our lives, including electricity,
airplanes, cars and much more. Just think how our life would have been without
electricity. This means that every invention has made human life easier. One of
these inventions is the invention of the mobile phone. The advent of mobile
phones in Pakistan was terrifying. People used to look at it with great
amazement without having to put any tarti or switch etc., its size and its box
was so big that noble type people had an employee with them for mobile phone
who He used to pick up his mobile phone and walk with them. Then slowly its
size began to decrease. At the same time, the price will go down. Even so,
owning one is still beyond the reach of the average person. But now this mobile
phone, which was considered a sign of wealth and which parrots in our hands
used to fly when I saw it, is now crying its worthlessness, when I remember its
past and look at its condition. So the focus is on the rise and fall of
Muslims. Currently, the largest industry in Pakistan is the mobile phone.
Innovation in every field will increase in Pakistan during the last two decades
and now thanks to modern technology, Pakistanis are also benefiting from more
and more modern inventions than in the past. The work of the world's first
mobile phone was only to make calls and this first generation of mobile phones
was named as 1G ie first generation and this mobile phone had no other option
but to make calls and listen. Some time later, when the system for sending and
receiving messages came in mobile, it was named as 2G, the second generation.
Then in the era when it will acquire the ability to send pictures through
mobile, it was called 3G, ie the third generation, and when the development of
movies and movies through the Internet, it was called 4G, ie the fourth
generation. Gone and now when the world of mobile is moving towards 5J,
everything in the world has been shifted to mobile. There will be any work in
the world today that is not being taken from mobile. But surprisingly, despite
so much progress and going through new stages, this mobile has not forgotten
its basic function even today. Whether you are playing a game or watching a
movie, the purpose is to do ten things in the mobile, but as soon as the call
comes, the mobile first leaves all the work and tells you that the call is
coming. Stops all work for the sake of basic work. We should also consider some
limitations in the use of mobile phones. It is better to leave it with him,
especially in important and important places, because during prayers he can
neither hear the phone nor answer the caller. Similarly, the use of mobile
phone while driving is tantamount to playing with one's life. In our country,
even if you leave the motor car, the use of mobile phone continues even while
driving a motorbike. Similarly, if you are eating and a morsel is stuck in your
throat, you have a cough. You are in the washroom, you are sitting at a party,
the phone rings, you tell this gentleman that I am in trouble at the moment, so
I will talk to you later, but until then he will tell you. Someone has gotten
into more trouble. There is a need for us not to bother with this useful tool
and to keep it in the category of convenience so that its disadvantages can be
avoided.
DENIAL OF SERVICE ATTACKS
Introduction
By now you are aware
the dangers of the Internet and have also find a few basic rules for protection
as well as safety on the Internet. In previous article I explored ways to
investigate a target system and to learn a great deal about it. The time has
come that we explain that how the attack on the system. Now we will examine in
this & coming articles, one category of attack that might be used to cause
harm to a target computer system. In the depth, the working of the Denial of Service (DoS) attack. This
threat is one of the most common attacks on the Internet, so it is prudent for
you to understand how it works and how to defend yourself against it.
Overview
As was said in the
introduction, one of the most common and simplest forms of attacks on a system
is a Denial of Service (DoS). This attack does even attempt to intrude on your
system or to obtain sensitive information; it simply aims to prevent legitimate
users from accessing the system. It is easy to perform this type of attacks. Basically
technical expertness is needed. It is fact that every machine has its own
limitation, it can’t exceed from its limitation. For example, a truck has its
own limitation, it carries limited goods for limited distance, like this
computer has limitations, it performs limited operation for limited time. A
workload for a computer system may be defined by the number of simultaneous
users, the size of files, the speed of data transmission, or the amount of data
stored. If you give the extra load of work to the system then it will stop to
reply. For example, if you can flood a Web server with more requests than it
can process, it will be over loaded and will no longer be able to respond to
further requests (Webopedia, 2004). This reality underlies the DoS attack.
Simply overload the system with request, and it will no longer be able to
respond to legitimate users attempting to access the Web server.
|
IN PRACTICE:
Illustrating an Attack |
|
On simple way to illustrate this attack, especially
in a classroom setting, involves the use of the pig command discussed in
previous articles. 1.
Start a Web server
service running on one machine (you can use Apache, IIS or any Web server. 2.
Ask several people to
open their browsers and key the IP address of that machine in the address
bar. They should then be viewing the default Web site for that Web server. Now you can do a rather primitive DoS attack
on the system. Recall from previous article that typing in ping/h will show
you all the options for the ping command. The –I option changes the size of
the pocket you can send. A TCP packet can be only of a limited size. Thus,
you are wanted to set these packets to be almost as large as your requirement.
The –w option decides how many milliseconds the ping utility will wait for a
response from the target. When you use –O so that the ping utility does not
wait. Then the –t instructs the ping utility to keep sending packets until
explicitly told to stop. 3.
Open the command
prompt in Windows 2000/XP (that is the DOS prompt in Windows 98 and the Shell
in Unix/Linux). 4.
Key ping <address of target machine goes
her>-I 65000 –w O –t. What is happening at
this point is that this single machine is continually pinging away at the
target machine. Of course, just one machine in your classroom or lab that is
simply pinging on your Web server is not going to adversely affect the Web
server. However, you can now, one by one, get other machines in the classroom
pinging the server in the same way. After each batch of three or four
machines you add, try to go to the Web server’s default Web page. After a
certain threshold (certain numbers of machines pinging the server), it will
stop responding to requests and you will no longer be able to see the Web
page. Howe many machines it
will take to deny service depends on the Web server you are using. In order
to see this denial happen with a few machines involved as possible, you could
use a very low-capacity PC as your Web server. For example, running an Apache
Web server on a simple Pentium III laptop running Windows 98, it can take
about 15 machines simultaneously pinging to cause a Web server to stop
responding to legitimate requests. This strategy is, of course, counter to
what you would normally select for a Web server – no real Web server would be
running on a simple laptop with Windows 98. Likewise, actual DoS attacks use
much more sophisticated methods. This simple exercise, however, should
demonstrate for you the basic principle behind the DoS attack: Simply flood
the targe3t machine with so many packets that it can no longer respond to
legitimate request. |
|
FYI: Buffer
Overflows |
|
|
A Denial of Server
attack is “ one of the most common” attack on a system. Another extremely
common type of attack is the buffer overflow. Which of these is the leading
form of attack is subject to debate among the experts. Regardless,
understanding DoS attacks and how to thwart them is clearly on important
component of system security. |
|
Generally,
the method used for DoS attacks are significant more sophisticated than the
illustration. For example, a hacker might develop a small virus whose sole
purpose is to initiate a ping flood against a predetermined target. Once of
virus has spread, the various machines that are infected with that virus then
begun their ping flood of the target system. This sort of DoS is easy to do,
and it can be hard to stop. A DoS that is launched from several different
machines is called a Distributed Denial of Service. (DDoS).
Common Tools Used for DoS
As with any of the
security issues in previous articles, you will find that hackers have at their
disposal a vast array of tool with which to work. The DoS arena is no
different. While it is certainly well beyond the scope this & previous
articles to begin to categorize or discuss all of these tools, a brief
introduction to just a few of them will prove useful. The two tools discussed
here, TFN and Stacheldraht, and typical of the type of tools that some one
wishing to perform a DoS attack would utilize.
TFN
and TFN2K TFN also known as Tribal Flood Network, and TFN2K
are not viruses, but rather attack tools that can be used to perform a DDoS.
TFN2K is a newer version of TFN that supports both Windows NT and Unix
platforms (and can easy be ported to additional platforms). There are some
feature which make its complex more than predecessor.
|
FYI:
What is DoS? |
|
|
The
name for DoS attacks comes from the fact that such attempts literally deny
legitimate users the service provided by the site in question. These attacks
began to become widely known in 1995 when the simple Ping of Death DoS attack
began to be used frequently. |
|
including sending decoy information to avoid being
traced. Experts of TFN2K can use the resources for attack against more than one
target. Additionally, TFN and TFN2K can perform various attacks such as UDP
flood attacks, ICMP flood attacks, and TCM SYN flood attacks.
TFN2K works on two fronts.
First, there is a command-run client on the master system. Second, there is a
daemon process operation on an agent system. The attack works like this:
1. The
master instruction its agents to attack a list of designated targets.
2. The
agents respond by flooding the targets with a barrage of packets.
With this tool,
multiple agents, coordinated by the master, can work together during the attack
to disrupt access to the target. Additionally, there are a number of “safty”
features for the attacker that significantly complicates development of
effective and efficient countermeasures for TFN2K.
·
Master-to-agent communications are
encrypted and may be mixed with any number of decoy packets.
·
Both master-to-agent communications and
attacks themselves can be sent via randomized TCP, UDP and ICMP packets.
·
The master can falsify its IP address
(spoof).
Stacheldraht:
Stacheldraht, which is
German for “barded wire”, is a DDoS attack tool that combines features of the
Trinoo DDoS tool (another common tool) with the source code from the TFN DDoS
attack tool. Like TFN2K, it adds encryption of communication between the
attacker and the Stacheldraht master. It also involve in automatic updating of
the agents.
Stacheldraht can perform a variety of attacks including UDP flood, ICMP flood, TCP SYN flood and Smurf attacks. This source address also detects forgery and enables it automaticallyDoS Weanknesses
The weakness in any DoS
attacks, form the attacker’s point of view, is that the flood of packets must
be sustained. As soon as we stop sending packets, the target system is backed
up. As DoS/DDoS attack, however, is very often used in conjunction with another
form of attack, such as diabling one side of a connection in TCP hijacking or
preventing authentication or logging between servers.
If the hacker is using a distributing attack, as soon as the administrator or owners of the infected machines realize their machine is infected, they will take steps to remove the virus and thus stop the attack. If a hacker attempts to launch an attack from her own machine, she must be aware that each packet has the3 potential to be traced back to its source. This fact means the single hacker using a DoS will almost certainly be caught by the authorities. For this session, the DDoS is quickly becoming the most common type of DoS attack.
Common Tools Used for DoS
As with any of the
security issues in previous articles, you will find that hackers have at their
disposal a vast array of tool with which to work. The DoS arena is no
different. While it is certainly well beyond the scope this & previous
articles to begin to categorize or discuss all of these tools, a brief
introduction to just a few of them will prove useful. The two tools discussed
here, TFN and Stacheldraht, and typical of the type of tools that some one
wishing to perform a DoS attack would utilize.
TFN
and TFN2K TFN also known as Tribal Flood Network, and TFN2K
are not viruses, but rather attack tools that can be used to perform a DDoS.
TFN2K is a newer version of TFN that supports both Windows NT and Unix
platforms (and can easy be ported to additional platforms). There are some
feature which make its complex more than predecessor.
|
FYI:
What is DoS? |
|
|
The
name for DoS attacks comes from the fact that such attempts literally deny
legitimate users the service provided by the site in question. These attacks
began to become widely known in 1995 when the simple Ping of Death DoS attack
began to be used frequently. |
|
including sending decoy information to avoid being
traced. Experts of TFN2K can use the resources for attack against more than one
target. Additionally, TFN and TFN2K can perform various attacks such as UDP
flood attacks, ICMP flood attacks, and TCM SYN flood attacks.
TFN2K works on two fronts.
First, there is a command-run client on the master system. Second, there is a
daemon process operation on an agent system. The attack works like this:
1. The
master instruction its agents to attack a list of designated targets.
2. The
agents respond by flooding the targets with a barrage of packets.
With this tool,
multiple agents, coordinated by the master, can work together during the attack
to disrupt access to the target. Additionally, there are a number of “safty”
features for the attacker that significantly complicates development of
effective and efficient countermeasures for TFN2K.
·
Master-to-agent communications are
encrypted and may be mixed with any number of decoy packets.
·
Both master-to-agent communications and
attacks themselves can be sent via randomized TCP, UDP and ICMP packets.
·
The master can falsify its IP address
(spoof).
Stacheldraht:
Stacheldraht, which is
German for “barded wire”, is a DDoS attack tool that combines features of the
Trinoo DDoS tool (another common tool) with the source code from the TFN DDoS
attack tool. Like TFN2K, it adds encryption of communication between the
attacker and the Stacheldraht master. It also involve in automatic updating of
the agents.
Stacheldraht can
perform a variety of attacks including UDP flood, ICMP flood, TCP SYN flood and
Smurf attacks. This source address also detects forgery and enables it
automatically
DoS
Weanknesses
The weakness in any DoS
attacks, form the attacker’s point of view, is that the flood of packets must
be sustained. As soon as we stop sending packets, the target system is backed
up. As DoS/DDoS attack, however, is very often used in conjunction with another
form of attack, such as diabling one side of a connection in TCP hijacking or
preventing authentication or logging between servers.
If the hacker is using
a distributing attack, as soon as the administrator or owners of the infected
machines realize their machine is infected, they will take steps to remove the
virus and thus stop the attack. If a hacker attempts to launch an attack from
her own machine, she must be aware that each packet has the3 potential to be
traced back to its source. This fact means the single hacker using a DoS will
almost certainly be caught by the authorities. For this session, the DDoS is
quickly becoming the most common type of DoS attack.
PORT MONITORING AND MANAGING
Using
the tool I have already outlined in previous article, you have access to a
great deal of information about the ports in use on a system. There are
however, some additional tools that allow you to obtained more specific
information about port in use and the9ir state, as well as about the flow of
information in and out of those ports. Some of these tools also allow you to
link listening port to its application.
NetStat Live
One
of the most popular protocol monitors is NetStat, which is on free ships with
Microsoft Windows. A version of this, NetStat Live (NSL), which is freely
available on the Internet, is a small, easy-to-use TCP/IP protocol monitor that
can be used to see the exact throughput on both incoming and outgoing data
whether you are using a modem, DSL or even a local network. It allows you see
the speed at which your data goes from your computer to another computer on the
Internet. It will even tell you how many other computers your data must go
through to get to its destination. It also graphs the CPU usage of the NSL
system. This can be especially useful if, for example, you are experiencing
slow connection speeds. It can identify whether your computer is the reason for
the slow down or if it is you Internet connection.
After
you download and install the program, you simply run it. When the program
launches.
It
displays the last 60 seconds of display data. It shows the average data rate,
the total amount of data sent after the last reboot, and the maximum data rate.
It tracks all incoming and outgoing messages. Default display window, but this
window can be customized to display what you want, but this window can be
customized to show exactly what you want. To enable or disable a pane, simply
right – click on the window, choose Statistics and then place a check next to
any statistics that you would like to see. Your choices are:
Ø
Local
Machine. Monitoring current machine name, IP address and network interface.
Ø
Remote
Machine. The remote machine, including average ping time and number of hops.
Ø
Incoming
Data. Data on the incoming (Download) channel.
Ø
Incoming
Totals. Total for the incoming data.
Ø
Outgoing
Data. Data on the outgoing (upload) channel
Ø
Outgoing
Totals. Totals for the outgoing data.
Ø
System
Threads. Total number of threads currently running in the system.
Ø
CPU
Usage. Graphs the CPU load.
Notice
that a machine is listed in the remote section and some information about it.
You can easily change the server you are collecting information for. Simply
open your Web browser, go to a Web page and copy the URL (including the
http://) into the clipboard by using Ctrl + C). Notice that a machine is listed
in the remote section and some information about it. You can easily change the
server you are collecting information for.
In
addition to adjusting the display, NSL can also9 be configured to operate in
several different ways from the Configure dialog box. To access the Configure
options, right-click on the NSL display and choose the configuration as your
demand.
From
this dialog box, you can configure the program in many ways. Your configuration
option are:
Ø
Auto
Minimize. If enabled, when NSL start up, it will automatically show up in the
system tray instead of as a window on the screen.
Ø
Auto
Start. If enabled, NSL will automatically run time you reboot your machine.
(this is good to use with Auto Minimize option).
Ø
Always
on Top. If enabled, the NSL dialog box will always be on top of other windows.
This allows you to see the information no matter what else is on the screen.
Ø
URL
ClipCap. If enabled, NetStat will scan Windows clipboard for URL and if it
finds one, will automatically ping/traceroute it.
Ø
Close
Minimize. If enabled, pressing the Close button doesnot actually close NSL, but
rather minimizes it to the system tray.
Ø
TCP/IP
Interface. This drop-down list allows you to select from the TCP/IP interface
currently available or to monitor. All available interfaces (if a specific
interface can not be found, it defaults back to all.)
Ø
Displays
values in. this drop-down list allows you to select whether or not the values
are displayed in bits or bytes (the default).
NetStat
Live tracks all network activity. This means that you can see how quickly data
moves across the local network (as long as you are using TCP/IP) as well as to
and from remote sites. Additionally, this means that when used on a modern connection,
you will see the actual throughput and not just what the dial-up networking
adapter or modem says it is doing. This allows you to see exactly what kind of
performance you are getting while you are browsing around Web page.
Active Ports
Active
Ports is another easy-to-use tool for Windows. Through it you will enable to
monitor all open TCP and UDP ports on the your local computer. Active Ports
maps ports to the owning application so that you can watch which process has
opened which port. It also displays a local and remote IP address for each
connection and allows you to terminate the owning process. Active Ports can
help you detect Trojan horses and other malicious programs.
Like
so many of these types of programs, Active Ports is available as free download
from many sites on the Internet.
Fport
Like
Active Ports, fport reports all open TCP/IP and UDP ports and maps them to the
owning application. Additionally, it maps those ports to running processes.
Fport can used to quickly identify unknown open ports and their associated
application.
TCPView
TCPView
is a Windows program that will show you detailed listings of all TCP & UDP
endpoints on your system, including the remote addresses and the state of TCP
connections. TCPView provide a conveniently presented subset of the Netstat
program.
In-Depth Searches
Port
scanners and other types of scanners can only tell you so much about a target
system. At some point, you will probably have taken your investigation to a
deeper level. For example, if you find out that particular server is running
IIS 5.0, that discovery probably means the company has Windows 2000. If you
then uncover default shared folders and default registry settings, you know
that the system is probably entirely set up with default settings. It is also
less likely that this system is routinely patched and updated because a
security-conscious administrator would not have left default setting in the
first place. Your next step is to scan the Internet using various search
engines (e.g. www.yahoo.com, www.google.com, www.lycos.com)
to find out whether there are any known vulnerabilities with the target system
and its configuration. There is a good chance that someone has actually
documented the specific vulnerabilities and how these faults can be exploited. Once
you have studied the potential vulnerabilities in a target system, yu can take
one of several actions, depending on your role in the investigation.
1.
If
you are a system administrator, you must correct those vulnerabilities
promptly.
2.
If
you are a “sneaker” (or an “ethical” white hat hacker), you would document what
you have found to then report to your client.
3.
If
you are a cracker, you can use this information to select the most appropriate
way to compromise the target system. However, be aware that such activities are
illegal and can culminate in severe civil penalties, including a prison
sentences.
Web
search and newsgroup searches (you can use Google’s “groups” tab for this task)
can also provide other interesting information about it site. You will often be
able to find details about a company, such as its key personnel and ISP. There are
several ways to use this information. For example, if you find that a company
has a high turnover in its systems department (for example, you see the same
job posted frequently, indicating rapid turnover), then it is less likely that
the system is as secure as it should be. Or, if you see that one company is
being bought out by another, this event might lead to some confusion in the two
companies’ IT departments as they try to merge. This information can help you
identify other vulnerabilities in a target system.
SCANNING
A number of utilities
freely available on the Internet for performing scans. Some of the more common
Once you have used VisualRoute or perhaps simply used the traceroute utility
and manually looked up information on www.internic.net, you are
now ready to move to the next phase in gathering information about a target
system. This phase is completed by scanning.
The process of scanning can
involve many tools and a variety of techniques. The basic goal of scanning is
to identify security host or network. Scanning is best in science, but
considered an art by many because a skilled attacker is patient and has a knack
for knowing (usually based on experience) precisely where and how to scan
target devices.
There are tools are as
under:
1. Nmap
(Powerful tool available for Unix or Windows that finds ports and services
available via IP)
2. Hping2
(Powerful Unix-based tool used to gain important information about a network.)
3. Netcat
(Others have quat4ed this application as the “Swiss Army knife” of network
utilities)
4. Ping
(available for testing IP connectivity on at most every platform and operating
system)
5. Traceroute
(Map out the hops of the network to the target device or system)
Of these, Nmap (“Network
Mapper”) is probably the best known and most flexible scanning tool available
today. It uses IP packets in a new way to determine which hosts are available
on the network. What operating systems are running, and what firewalls are in
use. It also provides options for fragmentation; use to decoy IP addresses,
spoofing stealth scans and a number of other features. Nmap is the most widely
used tool by both cracker and security professionals for the purpose of port
scanning and operating system identification. Formerly, this was only a
Unix-based utility; however, it has recently been extended for use with Windows
systems. If you have access to or will be working on a UNIX system or care to
obtain the newer Windows-based Nmap, this is a utility with which you should
certainly become familiar.
Network mapping is a
process in which you discover information about the topology of the network.
This can include gateways, routers and servers. The first step is to sweep for
a live system. To find live hosts, hackers ping them by sending ICMP packets.
If a system is live, it will send an ICMP echo reply. ICMP messages can be
blocked, so an alternative is to send a TCP or UDP packet to a p[rot, such as
80 (http), that is frequently open, and live machines will send a SYN-ACK
(acknowledgment) packet in response. Once the live system is known, utilities
such traceroute or the others already discussed can pro0vide additional
information about network by discovering the paths taken by packets to each
host. This provides information about the routers and gateways in the network
and general layout of the network.
In following sections, we
will examine some methods for performing port scans. Fortunately, there are a
number of utilities freely available on the Internet for doing port scanning.
We will also discuss network mapping and vulnerability scanning.
|
FYI: Scanning Utilities |
|
|
You can find a list of additional
URLs for port scanning software in Appendix B of this book. You can also
search the Internet using the keywords “port scanning.” |
|
Port Scanning
Once the IP address of a
target system is known, the next step is port scanning & network
scanning, such scanning is the process of sending packets to each
port on a target system to see what ports it has open (in the LISTEN state). A
system has 65,535 port numbers, with one TCP port and one UDP port for each
number. Each port has an affiliate service that may be exploited or vulnerable.
Thus, viewing the ports tells you what sort of software is running. If someone
has port 80 open , then he or she is probably running a Web server. If you see
that all the default ports are open, the discovery probably indicates a network
administrator who is not particular security conscious and may have left all
default setting on all of his or her systems. Th9is deduction gives you
valuable clues as to the kind of target you are examining. In the following
section, we will experiment with a few port scanning utilities.
Now that you have a tool to
find out which ports are open on the target machine, what can you do with this
information? As we already mentioned, an open port can tell you a great deal
about a system. We briefly reviewed a number of well-known ports. This lidt was
not exhaustive, but the list should give you an idea. The following list
well-known ports.
· www.networkssorcery.com/protocol/ip/ports00000.html
· www.iana.org/assignments/port-numbers
· www.techadvice.com/tech/T/TCP_well_known_ports.htm
Using this information
about well-known ports, you should be able to tell whether a system is using
NetBIOS because such a system will have ports 137, 138 & 139 open. If a
system is running an SQL server, then it may have port 118 open. This
information can then be used by a hacker to begin to explore possible flaws or
vulnerabilities in the service running on a given port number. Therefore, this
information is quit important from a security perspective. If you are scanning
your own machine and see ports that are open (once that you do not use), then
close them. All firewalls give you the option of blocking ports. That function
is necessary purpose of any firewall. A basic rule of thumb in security is that
any port that you are not actively using should be blocked.
|
FYI: SQL Server |
|
|
Generically, an SQL server is any
database management system (DBMS) that can respond to queries from client
machines formatted in the SQL language |
|
Some
port scanners do more than just scan open ports; some even give you extra
information. One such product is NetBrue form RawLogic. Located at www.rawlogic.com/netbrute/. This one is quite proper with both the security
and hacker community. No computer security professionals should be without this
item in their tool chest. This utility will give open ports, as well as other
vital information in future. Once you install and launch NetBrue, you will see
a screen such as the one depicted.
We
will concentrate on the NetBrute lab first. You can elect to scan a range of IP
address (per feet for network administrators assessing the vulnerability of
their own systems), or you can choose to target an individual IP. When you are
done, it will show you all the shared drives on the computer.
With
the PortScan tab, you can find ports. It works exactly like the first tab
except that, instead of giving you a list of shared folder/drives, it gives you
a list of open ports. That way, with NetBrute, you get a port scanner and a
shared folder scanner. The WebBrute tab gives the permission to you to scan
your required targeted Web site and obtain information similar to what you
would get from Netcraft. This scan gives you information such as the target
system’s operating system and Webserver software. Shared folders and drives are
important for security because they provide a possible way for hackers to gain
access to the system. If a hacker can gain access to this shared folder, it can
use this area to upload Trojan horses, viruses, key loggers, or other devices.
Cerberus Internet Scanner
Perhaps
one of the most popular scanning utilities is the Cerberus Internet Scanner (a
number of download locations are listed in Appendix B). this tool is very
simple in use as well as informative for us.
From
this screen, you can click the button on the far left that has an icon of a
house or you can go to “File” and select “Host”. Then key the URL or IP address
of the machine you want to scan. Click the "S" button or go to
"File" and select "Start Scan". Cerberus will then scan
that machine and give you back wealth of information. You can see all the
various categories of information that you r4eceive.
For
review the report click on the third button. A Hypertext Markup Language (html)
will launch by the reprot (thus the document is easy to save for future
reference) with links to each category.
One
of the most interesting parts to review, especially for the security
administrator, is the NT Registry Report. This report will examine the Window
Registry and information you of any security flaws found there and how to
correct them.
This
list shows specific Windows registry settings, why those settings aren't
particularly secure, and what you can do to keep them safe. For obvious
reasons, this tool very popular with hackers. Cerberus can provide a
comprehensive map of all potential vulnerabilities of the system, including,
but not limited to, shared drives, insecure registry settings, running
services, and known bugs in the operating system.
All
of those tools (and others we have not examined) have one thing in common: They
provide information to anyone who wants it. Information is a powerful weapon,
but it is also a double-edged sword. Any information is network administrator
can use to secure his network; a cracker can also use to break into the
network. It is imperative that all network administrators be comfort with the
virus scanning tools that are available. It is a good idea to make a routine
habit of scanning your own system to search for vulnerabilities – and then
close these vulnerabilities.
Port Scanner for UNIX: SATAN
UNIX
administrator for years (as well as hackers) is SATAN. This tool is not some
evil supernatural being, but an acronym for Security Administrator tool for
analyzing networks. It can be downloading
for free from any number of Web sites. Many of those sites are listed at www.fish.com/satan/mirrors.html. This tool is strictly for Unix
and will not work in Windows. For that reason, we will not be discussing it
here, but it is important that you be aware of it. If you inte3nd to work with
Unix or Linux, you should definitely get this utility.
Vulnerability Scanning
In
addition to the utilities and scanners we have already discussed, another
essential type of tool for any attacker or defender is vulnerability scanner. A
vulnerability scanner, or security scanner, will remotely audit a network and
determine whether someone (“or something, such as worm) may break into it or
misuse it in some way. These tools allow the attacker to connect to a target
system and check for such vulnerabilities as configuration errors, default
configuration setting that allow attackers access, and the most recently
reported system vulnerabilities. As with port scanners, there3 are both
commercial as well as free open-source versions of vulnerability scanners. We
will discuss two vulnerability scanners here, but there are many others
available.
SAINT
SAINT
is a network vulnerability assessment scanner that takes a preventatives
approach to securing computer networks. It scans is system and finds security
weaknesses. It prioritizes critical vulnerabilities in the network and
recommends safeguards for your data. SAINT gives you benefits in several ways:
·
Prioritized
vulnerabilities let you focus your resources on the most critical security
issues.
·
Fast
assessment results help you identify problems quickly.
·
Highly
configurable scans increase the efficiency of your network security program.
NetBrute
Some
port scanners do more than just scan open ports; some even give you extra
information. One such product is NetBrue form RawLogic. Located at www.rawlogic.com/netbrute/. This one is quite proper with both the security
and hacker community. No computer security professionals should be without this
item in their tool chest. This utility will give open ports, as well as other
vital information in future. Once you install and launch NetBrue, you will see
a screen such as the one depicted.
We
will concentrate on the NetBrute lab first. You can elect to scan a range of IP
address (per feet for network administrators assessing the vulnerability of
their own systems), or you can choose to target an individual IP. When you are
done, it will show you all the shared drives on the computer.
With
the PortScan tab, you can find ports. It works exactly like the first tab
except that, instead of giving you a list of shared folder/drives, it gives you
a list of open ports. That way, with NetBrute, you get a port scanner and a
shared folder scanner. The WebBrute tab gives the permission to you to scan
your required targeted Web site and obtain information similar to what you
would get from Netcraft. This scan gives you information such as the target
system’s operating system and Webserver software. Shared folders and drives are
important for security because they provide a possible way for hackers to gain
access to the system. If a hacker can gain access to this shared folder, it can
use this area to upload Trojan horses, viruses, key loggers, or other devices.
Cerberus Internet Scanner
Perhaps
one of the most popular scanning utilities is the Cerberus Internet Scanner (a
number of download locations are listed in Appendix B). this tool is very
simple in use as well as informative for us.
From
this screen, you can click the button on the far left that has an icon of a
house or you can go to “File” and select “Host”. Then key the URL or IP address
of the machine you want to scan. Click the "S" button or go to
"File" and select "Start Scan". Cerberus will then scan
that machine and give you back wealth of information. You can see all the
various categories of information that you r4eceive.
For
review the report click on the third button. A Hypertext Markup Language (html)
will launch by the reprot (thus the document is easy to save for future
reference) with links to each category.
One
of the most interesting parts to review, especially for the security
administrator, is the NT Registry Report. This report will examine the Window
Registry and information you of any security flaws found there and how to
correct them.
This
list shows specific Windows registry settings, why those settings aren't
particularly secure, and what you can do to keep them safe. For obvious
reasons, this tool very popular with hackers. Cerberus can provide a
comprehensive map of all potential vulnerabilities of the system, including,
but not limited to, shared drives, insecure registry settings, running
services, and known bugs in the operating system.
All
of those tools (and others we have not examined) have one thing in common: They
provide information to anyone who wants it. Information is a powerful weapon,
but it is also a double-edged sword. Any information is network administrator
can use to secure his network; a cracker can also use to break into the
network. It is imperative that all network administrators be comfort with the
virus scanning tools that are available. It is a good idea to make a routine
habit of scanning your own system to search for vulnerabilities – and then
close these vulnerabilities.
Port Scanner for UNIX: SATAN
UNIX
administrator for years (as well as hackers) is SATAN. This tool is not some
evil supernatural being, but an acronym for Security Administrator tool for
analyzing networks. It can be downloading
for free from any number of Web sites. Many of those sites are listed at www.fish.com/satan/mirrors.html. This tool is strictly for Unix
and will not work in Windows. For that reason, we will not be discussing it
here, but it is important that you be aware of it. If you inte3nd to work with
Unix or Linux, you should definitely get this utility.
Vulnerability Scanning
In
addition to the utilities and scanners we have already discussed, another
essential type of tool for any attacker or defender is vulnerability scanner. A
vulnerability scanner, or security scanner, will remotely audit a network and
determine whether someone (“or something, such as worm) may break into it or
misuse it in some way. These tools allow the attacker to connect to a target
system and check for such vulnerabilities as configuration errors, default
configuration setting that allow attackers access, and the most recently
reported system vulnerabilities. As with port scanners, there3 are both
commercial as well as free open-source versions of vulnerability scanners. We
will discuss two vulnerability scanners here, but there are many others
available.
SAINT
SAINT
is a network vulnerability assessment scanner that takes a preventatives
approach to securing computer networks. It scans is system and finds security
weaknesses. It prioritizes critical vulnerabilities in the network and
recommends safeguards for your data. SAINT gives you benefits in several ways:
·
Prioritized
vulnerabilities let you focus your resources on the most critical security
issues.
·
Fast
assessment results help you identify problems quickly.
·
Highly
configurable scans increase the efficiency of your network security program.
Nessus
Nessus,
or the “Nessus Project” as it is also known, is another extremely powerful
network scanner. It is one of the most up-to-date and easy-to-use remote
security scanners currently available. It
has fast, reliable and modular architecture that allows you to customize it to
your needs. Works on systems such as Ness Unix (Mac OS X, Free BSD, Linux,
Solaris and more) also has a Windows version called NeWT.
Additionally,
Nessus includes a variety of plug-ins that can be enabled depending on the type
of security checks you want to perform. These plugins work cooperatively with
each test specifying what is needed to proceed with the test. For example, if a
specific test requires a remote FTP server and a previous test shows that none
exists, it will not be tested. Not performing futile test speeds up the
scanning process. This plug-ins is updated daily and is available from the
Nessus Web site.
The
output from Nessus scan of a system is incredibly detailed & there are
multiple formats available for the reports. These reports give information
about security holes, warnings & notes. Nessus does not attempt to fix any
security holes that it finds. It simply reports them and gives suggestions on
how to make the vulnerable system more secure.
THE IMPACT OF AI ON THE FUTURE OF HUMAN LIFE
Artificial Intelligence (AI) is rapidly transforming the world, and its influence will continue to grow in the coming decades. From healthca...
-
ARROW TOOL In CorelDRAW, the arrow tool is used to create and manipulate lines with arrowheads. This tool allows you to draw straight li...
-
OUTLINE PEN DIALOG CorelDRAW is a vector graphics editor software used for designing and creating various types of digital artwork, such as ...
-
Microsoft Word, commonly referred to as MS-Word, is a word processing software developed by Microsoft. It is a part of the Microsoft Offic...