Hacking Techniques in Wired Networks

Qijun Gu, Peng Liu, and Chao-Hsien Chu, Pennsylvania State University

Introduction

Principles of Hacking

Seven Steps of Hacking

Overview of Hacking Toolkits

Classifications of Hacking Toolkits

Attacks against the Internet Infrastructure

Attacks against DNS

Attacks against TCP/IP

Attacks against BGP

Attacks against End Systems of the Internet

Morris Worm

Melissa

Sadmind

Code Red I and Code Red II

Nimda

SQL Slammer

W32/Blaster

Attacks against Enterprise Network Systems

Attacks against Private Networks

Attacks against Private Networks with Web Service

Attacks against Firewalls and Virtual Private Networks

Conclusion

Acknowledgements

Glossary

Cross References

References

INTRODUCTION

Nowadays, wired networks, especially the Internet, have already become a platform to support not only high-speed data communication, but also powerful distributed computing for a variety of personal and business processes every day. However, the principles for designing and developing a network mainly targeted at providing connection and communication capabilities, until a series of security “disasters” happened on the Internet recently as shown in Figure 1. As a result, without making security an inherent part of the network design and development process, existing networks are very vulnerable to cyber-attacks because of various security vulnerabilities. Such vulnerabilities, when being exploited by the hacker, can motivate the development of a variety of hacking techniques. ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.