What Are the Various Methods Hackers Use to Compromise Networks?

Click For Summary

Discussion Overview

The discussion revolves around the various methods hackers use to compromise networks, exploring different types of security threats, vulnerabilities in software and protocols, and the general understanding of network security among participants. The scope includes conceptual clarifications and technical explanations related to hacking techniques and security measures.

Discussion Character

  • Exploratory
  • Technical explanation
  • Conceptual clarification
  • Debate/contested

Main Points Raised

  • Some participants express a limited understanding of hacking, suggesting that malicious applications are the primary threat, while questioning if there are other methods.
  • Others argue that servers can indeed be accessed if they have security vulnerabilities, citing various services (e.g., FTP, telnet, SSH) that can be exploited.
  • Concerns are raised about the potential for any program to serve as a backdoor if security measures are inadequate.
  • Participants discuss the role of social engineering in hacking, emphasizing that tricking individuals into revealing sensitive information is a common tactic.
  • There is confusion regarding the security of telnet compared to SSH, with one participant asserting that telnet is not secure due to unencrypted data transmission.
  • Questions arise about the necessity of secure transmission and the possibility of intercepting electrical signals to read data.
  • Some participants reference external resources, such as a Wiki article and "packet sniffer," to aid in understanding security weaknesses.

Areas of Agreement / Disagreement

Participants generally do not agree on the extent of hacking methods and security vulnerabilities. Multiple competing views exist regarding the security of different protocols and the nature of threats, leaving the discussion unresolved.

Contextual Notes

Limitations include varying levels of knowledge among participants about computer networks and security, as well as differing opinions on the security of specific protocols like telnet and SSH. There are also unresolved questions about the methods of data interception.

Who May Find This Useful

This discussion may be useful for individuals interested in understanding the basics of network security, the methods of hacking, and the importance of secure communication protocols.

Avichal
Messages
294
Reaction score
0
I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc.
Is this the only way hacking can be done?

You can't really access someone's else's server and look at their data so I suppose the only security issue is the availability of dangerous software on the internet? But I know there is more - what else are the threats?

I have not studied about computer networks and security yet so I am really uneducated in this field.
 
Computer science news on Phys.org
Avichal said:
You can't really access someone's else's server and look at their data
Of course you can. Most servers have some way of accessing them in order to administer them, for example FTP, telnet or SSH. If the server (as in the daemon running on the machine to provide that service) has security leaks then these can be exploited to gain full access. In general, any service that talks to the outside world is a potential safety risk. This includes the browser, e-mail program, database server, web server, IM program, Java, any many others even including the operating system itself. Security flaws in any of these may cause a hacker to gain access. For example some browsers used to have a problem with memory pointers overrunning if URLs were too long, so by carefully crafting a long URL an attacker could write certain data / instructions to computer memory not belonging to the browser. By inserting especially constructed data in forms on websites which are not properly secured, the database server can be tricked into giving basically any database content it's not allowed to show. Email programs that are not careful about e.g. scripts in messages may give attackers access to the system.

So basically, any program is a potential backdoor to the system. If the security is not up to date this door is at a crack, and with the proper force may be forced into giving full access to the system.
 
Every computer is connected to each other today right? But you cannot really access any other computer's data or can you?
 
Well, I can't, but that doesn't stop some people from trying. If nobody could, then people wouldn't spend billions of <insert your currency> every year to counter hacking.
 
To each his own, I would put this as an example of networking hack :smile:
 
CompuChip said:
Well, I can't, but that doesn't stop some people from trying. If nobody could, then people wouldn't spend billions of <insert your currency> every year to counter hacking.

Didn't actually refer to you when I said "you". Meant any other person by it.
Anyways ssh/telnet and internet are the ways that I know two or more computers can connect. But though internet you can only retrieve HTML data that the other person wishes to share and ssh/telnet are secure ways to connect that require passwords. I can't see ways for any malpractices here.

I want to know what kind of security breaches exist. Thank You!
 
Also I don't understand why secure transmission is required. Is it possible to intercept electrical signals and then read the data it was transferring?
 
Avichal said:
I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc.
Is this the only way hacking can be done?

You can't really access someone's else's server and look at their data so I suppose the only security issue is the availability of dangerous software on the internet? But I know there is more - what else are the threats?

I have not studied about computer networks and security yet so I am really uneducated in this field.
Start with this Wiki article. It will give you a lot to think about. The article is disjointed and fragmentary, but still can be useful if you are just learning about computer security weaknesses. Good luck.
 
turbo said:
Start with this Wiki article. It will give you a lot to think about. The article is disjointed and fragmentary, but still can be useful if you are just learning about computer security weaknesses. Good luck.
Which wiki article??
 
  • #10
Google "packet sniffer"
 
  • #11
Avichal said:
ssh/telnet are secure ways to connect that require passwords.

Telnet is not secure. Both your login information (username/password) and the data that you exchange with the other computer are transmitted "in the clear" i.e. not encrypted. If someone can intercept that information, either by hooking into a wired network connection, or by picking up unprotected wi-fi packets, or by planting something that intercepts packets at an Internet routing server, they have some of your data right there, and they can also get your login information so they can log on as if they were you, and do anything you have permission to do on that other computer.

ssh does encrypt everything, which makes it much harder to use any intercepted data. But you still have to be careful about your password. If someone finds it out either by guessing a commonly-used one, or "cracking" it by trying a lot of different ones, or "phishing" it out of you in an e-mail or something, the encryption won't do any good.

A lot of "hacking" is done by "social engineering", i.e. tricking you into giving the bad guys your login/access information.

And as Compuchip noted, a lot of network software and applications have bugs or loopholes in them that hackers can exploit by sending them just the right data. That's why most software gets updated so often. People keep finding new loopholes.

The Holy Grail for a hacker is getting system administrator access (e,g, 'root' access on a Unix or Linux machine) because then they can literally do anything on that machine.
 

Similar threads

Replies
2
Views
1K
  • · Replies 1 ·
Replies
1
Views
5K
  • · Replies 3 ·
Replies
3
Views
1K
  • · Replies 15 ·
Replies
15
Views
3K
  • · Replies 27 ·
Replies
27
Views
3K
Replies
2
Views
2K
Replies
7
Views
3K
  • · Replies 15 ·
Replies
15
Views
2K
Replies
3
Views
3K
  • · Replies 1 ·
Replies
1
Views
5K