What is hacking in networking?

In summary: Getting that level of access is extremely hard, because the system administrator (and the program that lets them become the system administrator) are the most important security features on any computer. But there are ways.In summary, hacking can be done through various methods such as exploiting security flaws in programs, social engineering, and intercepting data. Even seemingly secure methods like ssh can still be vulnerable if proper precautions are not taken. The ultimate goal for a hacker is to gain system administrator access, which is extremely difficult but not impossible. It is important to stay up to date on security measures and be cautious with personal information to prevent hacking.
  • #1
Avichal
295
0
I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc.
Is this the only way hacking can be done?

You can't really access someone's else's server and look at their data so I suppose the only security issue is the availability of dangerous software on the internet? But I know there is more - what else are the threats?

I have not studied about computer networks and security yet so I am really uneducated in this field.
 
Computer science news on Phys.org
  • #2
Avichal said:
You can't really access someone's else's server and look at their data
Of course you can. Most servers have some way of accessing them in order to administer them, for example FTP, telnet or SSH. If the server (as in the daemon running on the machine to provide that service) has security leaks then these can be exploited to gain full access. In general, any service that talks to the outside world is a potential safety risk. This includes the browser, e-mail program, database server, web server, IM program, Java, any many others even including the operating system itself. Security flaws in any of these may cause a hacker to gain access. For example some browsers used to have a problem with memory pointers overrunning if URLs were too long, so by carefully crafting a long URL an attacker could write certain data / instructions to computer memory not belonging to the browser. By inserting especially constructed data in forms on websites which are not properly secured, the database server can be tricked into giving basically any database content it's not allowed to show. Email programs that are not careful about e.g. scripts in messages may give attackers access to the system.

So basically, any program is a potential backdoor to the system. If the security is not up to date this door is at a crack, and with the proper force may be forced into giving full access to the system.
 
  • #3
Every computer is connected to each other today right? But you cannot really access any other computer's data or can you?
 
  • #4
Well, I can't, but that doesn't stop some people from trying. If nobody could, then people wouldn't spend billions of <insert your currency> every year to counter hacking.
 
  • #5
To each his own, I would put this as an example of networking hack :smile:
 
  • #6
CompuChip said:
Well, I can't, but that doesn't stop some people from trying. If nobody could, then people wouldn't spend billions of <insert your currency> every year to counter hacking.

Didn't actually refer to you when I said "you". Meant any other person by it.
Anyways ssh/telnet and internet are the ways that I know two or more computers can connect. But though internet you can only retrieve HTML data that the other person wishes to share and ssh/telnet are secure ways to connect that require passwords. I can't see ways for any malpractices here.

I want to know what kind of security breaches exist. Thank You!
 
  • #7
Also I don't understand why secure transmission is required. Is it possible to intercept electrical signals and then read the data it was transferring?
 
  • #8
Avichal said:
I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc.
Is this the only way hacking can be done?

You can't really access someone's else's server and look at their data so I suppose the only security issue is the availability of dangerous software on the internet? But I know there is more - what else are the threats?

I have not studied about computer networks and security yet so I am really uneducated in this field.
Start with this Wiki article. It will give you a lot to think about. The article is disjointed and fragmentary, but still can be useful if you are just learning about computer security weaknesses. Good luck.
 
  • #9
turbo said:
Start with this Wiki article. It will give you a lot to think about. The article is disjointed and fragmentary, but still can be useful if you are just learning about computer security weaknesses. Good luck.
Which wiki article??
 
  • #10
Google "packet sniffer"
 
  • #11
Avichal said:
ssh/telnet are secure ways to connect that require passwords.

Telnet is not secure. Both your login information (username/password) and the data that you exchange with the other computer are transmitted "in the clear" i.e. not encrypted. If someone can intercept that information, either by hooking into a wired network connection, or by picking up unprotected wi-fi packets, or by planting something that intercepts packets at an Internet routing server, they have some of your data right there, and they can also get your login information so they can log on as if they were you, and do anything you have permission to do on that other computer.

ssh does encrypt everything, which makes it much harder to use any intercepted data. But you still have to be careful about your password. If someone finds it out either by guessing a commonly-used one, or "cracking" it by trying a lot of different ones, or "phishing" it out of you in an e-mail or something, the encryption won't do any good.

A lot of "hacking" is done by "social engineering", i.e. tricking you into giving the bad guys your login/access information.

And as Compuchip noted, a lot of network software and applications have bugs or loopholes in them that hackers can exploit by sending them just the right data. That's why most software gets updated so often. People keep finding new loopholes.

The Holy Grail for a hacker is getting system administrator access (e,g, 'root' access on a Unix or Linux machine) because then they can literally do anything on that machine.
 

Related to What is hacking in networking?

What is hacking in networking?

Hacking in networking refers to the unauthorized access, manipulation, or exploitation of computer systems or networks. It involves using various techniques and tools to gain access to sensitive data or disrupt the normal functioning of a network.

What are the different types of hacking in networking?

There are various types of hacking in networking, including phishing, malware attacks, denial of service (DoS) attacks, SQL injections, and man-in-the-middle attacks. These types of hacking can be further categorized as ethical hacking (performed with permission) or malicious hacking (performed without permission).

What are the consequences of hacking in networking?

The consequences of hacking in networking can be severe and damaging. It can result in data theft, financial loss, privacy breaches, system crashes, and reputational damage. In some cases, it can also lead to legal consequences, such as fines or imprisonment.

How can hacking in networking be prevented?

To prevent hacking in networking, it is essential to have strong security measures in place. This includes using firewalls, encryption, and secure passwords, regularly updating software and systems, and training employees on cybersecurity best practices. Conducting regular security audits and penetration testing can also help identify and address vulnerabilities.

What should I do if I suspect hacking in my network?

If you suspect hacking in your network, it is important to act quickly. First, disconnect the affected devices from the network and change all passwords. Then, conduct a thorough investigation to identify the source of the attack and take steps to prevent it from happening again. It may also be necessary to notify relevant authorities and affected individuals, depending on the severity of the attack.

Similar threads

Replies
5
Views
1K
  • Computing and Technology
2
Replies
35
Views
4K
  • Computing and Technology
Replies
1
Views
2K
  • Computing and Technology
Replies
2
Views
2K
  • Computing and Technology
Replies
10
Views
1K
  • Computing and Technology
Replies
15
Views
2K
Replies
13
Views
1K
  • Computing and Technology
Replies
27
Views
2K
Replies
7
Views
403
  • Computing and Technology
Replies
17
Views
2K
Back
Top