live forex charts
Monday, December 29, 2008
Monday, December 22, 2008
AdSense tips
adsense tips
adsense tips (part 2)
adsense tips (part 3)
adsense ontology
Google AdSense is a pay-per-click (PPC) program that can give you advertising revenue from each page on your website with a minimal investment in time and no additional resources.
AdSense delivers relevant ads that are targeted to the content people find on your site.
In many advertising networks and websites, including AdSense, the advertiser is charged for advertising their ad only when a user clicks on their ad. How much they pay (for that click) is called their Cost Per Click or CPC.
Here you will find some simple and effective AdSense tips that will increase your revenue. If you haven't already joined AdSense program, you should sign up first.
Now it's time to show you some tips and tricks that will optimize your AdSense ads.
Top 15 AdSense tips
AdSense Tip #1: Find your keywords
Before serving ads on a web page, check its keyword density. A free and advanced tool for finding the most prominent keywords in a page can be found here: SEO Density Analyzer. Copy the most important keywords to a text file ([web page name]-adsense-keywords.txt).
AdSense Tip #2: Improve your keywords
Get keyword suggestions from Overture Search Inventory and from Google AdWords Sandbox. Get new keywords that can help you improve your ad relevance. Enter the keywords from [web page name]-adsense-keywords.txt and save the suggestions to [web page name]-adsense-suggestions.txt.
AdSense Tip #3: Keep your website focused on a theme
Use the keyword suggestions to enhance your web pages and to build theme-based content. And also try to get your keywords into the anchor text of your incoming links as much as possible. Don't forget that Google AdSense is keyword-targeted advertising: Google AdSense bases its advert topics on your websites content, this means that content-rich websites of a popular topic should attract a large amount of ads.
AdSense Tip #4: Write a new page every day
One of the best tips is to add a new page to your web site every day. The more content you have, the more visitors you will get. Put an Adsense unit on each and every content page of your site. But where? You will find more about that from the next AdSense tips.
AdSense Tip #5: Choose the right AdSense format
Wider formats are successful because the ads are compact, easy to read and are complementary to the content. The top three AdSense formats are:
336x280 large rectangle
300x250 medium rectangle
160x600 wide skyscraper
Another successful format is the 468x15 horizontal ad links, that can be placed under your navigation bar.
More AdSense Tips
AdSense Tip #6: Color tips
AdSense Tip #7: Position tips
AdSense Tip #8: Increase the number of ads
AdSense Tip #9: Preview Google ads
AdSense Tip #10: What not to do
Plus: official Google AdSense tips
Read these tips in the second part of AdSense tips.
Learn To Earn $200 Per Day With Paid To Click (PTC) Programs
What are Paid To Click (PTC) Programs?These are programs where advertisers pays you to click or view or surf their advertisements. PTC is the most popular internet income opportunity at present and will be more popular in the future.
What does one needs to do?
You watch the advertisements for 30 seconds and get paid for it.
What is the earning potential?
$200.00 per day or more!!! Let me explain you about the earning potential. The explanation is as follows:-
Let's say you have joined 20 PTC programs then those 20 PTC programs will have an average of 5-10 advertisements for you to view per day.
And most PTC will pay you $0.01 per ad you view. Let us suppose that on an average you get to view 5 ads per programs.
Therefore 20 PTC programs x 5 ads = 100 ads.
So you will be getting 100 x $0.01= $1.00/day. In a month you can make $30 on your own. I know it's not enough but that's a guaranteed extra income for you!
So where is the $200/day income?
On PTC websites, there is another system to generate income for the members which is called referral system. Wherein, most PTC sites will pay you 100% of your referral earnings!
Is it very confusing?
Let me explain it as follows:-
Let's say you have 10 referrals for each PTC.
Therefore 20 PTC x 10 referrals = 200 referrals
These 200 referrals, also clicks ads just like you everyday. They also click 100 ads and earn $1.00/day
As their referrer/upline, you earn 100% (in most PTC) of their total earnings.
NOW, let's calculate your potential earnings?
200 referrals x $1.00 = $200.00/day
This is how you can earn $200 everyday.
Unbelievable!? Well, this big earning is very much possible. Just be patient and concentrate on your goal.
But are there just 200 people you can refer? In reality there are millions of people looking forward to join PTC to earn money on line. How big is the chance you get thousands from them, or even more?
How does the referral system work?
You can refer your neighbors, your friends, internet friends, family, strangers, and anybody who knows how to use the internet. Just ask them to sign up using your referral link that looks like the referral link as shown below.
http://isabelmarco.com/?r=sekhar_yeluduti
(The referral link sample above is my referral link for Isabelmarco (a PTC program). Your personal referral link can be found at your own account on each PTC that you will join).
Please note that when somebody signs up or joins a PTC using your link he/she will be counted as one of your referrals.
How does one receive his earnings at PTC?
You can claim your earnings using ALERTPAY, PAYPAL, or E-GOLD. (If you are new to PTC, please register a FREE Alertpay account first because most PTC pays its members via Alertpay)
What are Paypal, Alertpay and E-gold?
They are all Major Payment Processors that Most of PTC use to pay its members. You will also need to register a FREE account at the 3 payment processors mentioned above in order for you to get paid.
All you need to succeed in PTC is patience and an hour of your day. 200 referrals will not register or join in just 1 day. I know that. It will take months or even years. Always remember, There is no such thing as Easy Money.You have to work for it. But.. Is this work hard for you? I don't think so....
How can one get started?
STEP ONE: Make your very own email address if you don't have one.
STEP TWO: Register at ALERTPAY, PAYPAL, or E-GOLD
Click Here To Open A Paypal Account
Click Here To Open An Alertpay Account
STEP THREE: Register a FREE account at all Recommended PTC Programs mentioned below under JOIN THE PTC. (Make a list of your Paid to Click Programs, so you won't forget the PTC you had already joined)
STEP FOUR: Log in to your account and Start earning cash by clicking/viewing/surfing advertisments (use Internet Explorer or Firefox browser in viewing ads. Most PTC are compatible with Internet Explorer and Firefox)
STEP FIVE: Make the Clicking and Viewing of ads a daily habit (1-2 hours per day)
STEP SIX: Refer others to join under you.. Make your own advertisements, blogs, articles like this one. AND BE PATIENT!!! Just keep on clicking.
STEP SEVEN: Cashout your Money when you reach the Minimum Payout
STEP EIGHT: ENJOY your earnings!!!
Remember joining 20 active PTC sites can make you earn bigger and faster! Start smart and get paid!!! Start Clicking Today! Earn $200 per day with paid to click (PTC) programs!
Note:-Please register for FREE using my links below and start clicking daily. These are the links to most reliable and regularly paying PTC programs.
Thank you and Good Luck!!
$6.00 Welcome Survey After Free Registration!
Get Paid $1 to $25 per Survey
Get Paid $1.25 per Friend that Sings Up.
Get Paid $6.00 per on your Welcome Survey.
100% WORKING AND FREE.
How to get money ?
We currently have Three Payment methods.
Option (1) includes United States Postal Service (USPS) and is Free, this option generally takes 4-6 weeks for delivery. Option (1) is available to anybody in the U.S.
Options (2 and 3) include the use of Paypal (www.Paypal.com) or (www.AlertPay.com) and is an electronic payment, this option generally takes 3-5 business days for delivery. Option (2 and 3) have a ($25) Expedited Service Charge and is taken directly from your A.W.Surveys account with us. The Expedited Service Charge is for the faster delivery time (3-5 days compared to 4-6 weeks).
If you are ready for a payment, click the Redeem Money button and you will be presented with the above options.
These are currently the only to payment options A.W.Surveys supports. We are however exploring other payment options.
How to refer a Friend?
Please go to the Refer Friends tab and you will be provided with a link to give to your friends. Once they visit this link and sign up for a Free account you will be credited for the referral. You may also use our Banner images with link code to post on a website.
Earn Online for free
Earn Online for free
Golden rules: Be patient. Because "patience" is the key to success in online
marketing. Be optimistic. As long as the programs are FREE. Why not give it a try. You have nothing to lose here.
N.B. If you are really serious of earning here in the internet. You must join atleast 10 online programs like this.. please give me private message if you are interested in joining other trusted programs like this. Thank you. Contact me for earning money online without investment for free .There are several other methods too for earning money online .if you are intrested please message i will share with you.
Making Money with Affiliate Marketing Business
Making Money with Affiliate Marketing Business
Affiliate Marketing Tips And Tricks
Affiliate Marketing Tips And Tricks
The Best Way To Generate Free Targeted Website Traffic
Forex Affiliate Program Tips
Forex Affiliate Program Tips
Thursday, November 13, 2008
Location
The tests you’re performing dictate where you must run them from. Your goal
is to hack your systems from locations where malicious hackers can access
the systems. You can’t predict whether you’ll be attacked by a hacker from
outside or inside your network, so cover all your bases. Combine external
(public Internet) tests and internal (private network) tests.
You can perform some tests, such as password cracking and network-infrastructure
assessments, from the comfort of your office — inside the network.
But it may be better to have a true outsider perform other tests on routers,
firewalls, and public Web applications.
For your external hacks that require network connectivity, you may have to
go off-site (a good excuse to work from home) or use an external proxy server.
Better yet, if you can assign an available public IP address to your computer,
plug into the network on the outside of the firewall for a hacker’s-eye view of
your systems. Internal tests are easy because you need only physical access
to the building and the network.
Reacting to major exploits that you find
Determine ahead of time whether you’ll stop or keep going when you find a
critical security hole. Your manager or your customer may not ask you to,
but I think it’s best to keep going to see what else you can discover. I’m not
saying to keep hacking until the end of time or until you crash all your systems.
Simply pursue the path you’re going down until you can’t hack it any
longer (pun intended).
Silly assumptions
You’ve heard what you make of yourself when you assume things. Even so,
you must make assumptions when you hack your systems. Here are some
examples of those assumptions:
Computers, networks, and people are available when you’re testing.
You have all the proper hacking tools.
The hacking tools you’re using won’t crash your systems.
Your hacking tools actually work.
You know all the risks of your tests.
You should document all assumptions and have management or your customer
sign off on them as part of your overall approval process.
36 Part I: Building the Foundation for Ethical Hacking
Selecting Tools
The required security-assessment tools (hacking tools) depend on the tests
you’re running. You can perform some ethical hacking tests with a pair of
sneakers, a telephone, and a basic workstation on the network. However,
comprehensive testing is easier with hacking tools.
Not only do you need an arsenal of tools, but you should also use the right
tool for the task:
If you’re cracking passwords, a general port scanner such as SuperScan
or Nmap may not do the trick. For this task, you need a tool such as LC4,
John the Ripper, or pwdump.
If you’re attempting an in-depth analysis of a Web application, a Webapplication
assessment tool (such as Nikto or WebInspect) is more
appropriate than a network analyzer such as Ethereal.
If you’re not sure what tools to use, fear not. Throughout this book, I introduce
a wide variety of tools — both free and commercial — that you can use
to accomplish your tasks.
You can choose among hundreds, if not thousands, of tools for ethical
hacking — everything from your own words and actions to software-based
vulnerability-assessment programs to hardware-based network analyzers.
Here’s a rundown of some of my favorite commercial, freeware, and opensource
security tools:
@stake L0phtcrack (now called LC4)
Ethereal
Foundstone SuperScan
Qualys QualysGuard
GFI LANguard Network Security Scanner
John the Ripper
Network Stumbler
Nessus
Nikto
Nmap
Pwdump2
SPI Dynamics WebInspect
THC-RUT
ToneLoc
Specific tests
You may have been charged with performing a general penetration test, or you
may want to perform specific tests, such as cracking passwords or war-dialing
into a network. Or you might be performing a social-engineering test or assessing
the Windows operating systems on the network. However you’re testing,
you may want to conceal the specifics of the testing to keep what you’re doing
covert or to protect your methodologies. In fact, your manager or customer
may not want the details. Either way, document and make known at a high level
what you’re doing. This can help eliminate any potential miscommunication
and keep you out of hot water.
A good way to provide evidence of what was tested, when it was tested, and
more is to enable logging on the systems you’re testing.
34 Part I: Building the Foundation for Ethical Hacking
Sometimes, you may know the general tests that you’re performing, but if you’re
using automated tools, it may be next to impossible to understand completely
every test you’re performing. This is especially true if the software you’re using
receives real-time vulnerability-testing updates from the vendor every time you
run it. The potential for frequent updates underscores the importance of reading
the documentation and readme files that come with the tools you’re using.
I have experienced surprising vulnerability updates in the past. I was performing
an automated assessment on a customer’s Web site — the same test I had
just performed the previous week. The customer and I had scheduled the test
date and time in advance. What I didn’t know is that the software vendor made
some changes to its Web form submission tests, and I flooded the customer’s
Web application, creating a DoS condition.
Luckily, this DoS condition occurred after business hours and didn’t affect
the customer’s operations. However, the customer’s Web application was
coded to generate an alert e-mail for every form submission. The application
developer and company’s president received 4,000 e-mails in their inboxes
within about 10 minutes — ouch! I was lucky that the president was techsavvy
and understood the situation. It’s important to have a contingency plan
in case a situation like this occurs.
Blind versus knowledge assessments
It may be good to have some knowledge of the systems you’re testing, but it’s
not required. However, a basic understanding of the systems you’re hacking
can protect you and others. Obtaining this knowledge shouldn’t be difficult if
you’re hacking your own in-house systems. If you’re hacking a customer’s
systems, you may have to dig a little deeper into how the systems work so
you know what’s what. That’s how I’ve always done it. In fact, I’ve never had
a customer ask for a fully blind assessment. Most people are scared of these
assessments. This doesn’t mean that blind assessments aren’t valuable. The
type of assessment you carry out depends on your specific needs.
The best approach is to plan on unlimited attacks, wherein any test is possible.
The bad guys aren’t hacking your systems within a limited scope, so why
should you?
Consider whether the tests should be undetected. This isn’t required but
should be considered, especially for social-engineering and physical security
tests. I outline specific tests for those subjects in Chapter 5 and Chapter 6.
A false sense of vigilance can be created if too many insiders know about your
testing which can end up negating the hard work you’re putting into this.
This doesn’t mean you shouldn’t tell anyone. Always have a main point of
contact within the organization — preferably someone with decision-making
authority — that both you and all employees can contact if and when something
goes wrong.
Determining What Systems to Hack
You probably don’t want — or need — to assess the security of all your systems
at the same time. This could be quite an undertaking and could lead to
problems. I’m not saying you shouldn’t eventually assess every computer and
application you have. I’m just suggesting that whenever possible, you should
break your ethical hacking projects into smaller chunks to make them more
manageable. You may decide which systems to test based on a high-level risk
analysis, answering questions such as:
What are your most critical systems? Which systems, if hacked, would
cause the most trouble or the greatest losses?
Which systems appear to be most vulnerable to attack?
Which systems are not documented, are rarely administered, or are the
ones you know the least about?
After you’ve established your overall goals, decide which systems to test.
This step helps you carefully define a scope for your ethical hacking so that
you not only establish everyone’s expectations up front, but also better estimate
the time and resources for the job.
The following list includes systems and applications that you may consider
performing your hacking tests on:
Routers
Firewalls
Network infrastructure as a whole
Wireless access points and bridges
Web, application, and database servers
E-mail and file/print servers
Workstations, laptops, and tablet PCs
Mobile devices (such as PDAs and cell phones) that store confidential
information
Client and server operating systems
Client and server applications, such as e-mail or other in-house systems
32 Part I: Building the Foundation for Ethical Hacking
What specific systems you should test depends on several factors. If you have
a small network, you can test everything from the get-go. You may consider
testing just public-facing hosts such as e-mail and Web servers and their
associated applications. The ethical hacking process is flexible. Base these
decisions on what makes the most business sense.
Start with the most vulnerable systems, and consider the following factors:
Where the computer or application resides on the network
Which operating system and application(s) it runs
The amount or type of critical information stored on it
If you’re hacking your own systems or a customer’s systems, a previous
security-risk assessment or vulnerability test may already have generated
this information. If so, that documentation may help identify systems for
more testing.
Ethical hacking goes a few steps beyond the higher-level information risk
assessments and vulnerability testing. As an ethical hacker, you first glean
information on all systems — including the organization as a whole — and
then further assess the systems that appear most vulnerable. I discuss the
ethical hacking methodology in more detail in Chapter 4.
Another factor to help you decide where to start is to assess the systems that
have the greatest visibility. For example, focusing on a database or file server
that stores customer or other critical information may make more sense — at
least initially — than concentrating on a firewall or Web server that hosts
marketing information about the company.
Creating Testing Standards
One miscommunication or slip-up can send your systems crashing during
your ethical hacking tests. No one wants that to happen. To prevent mishaps,
develop and document testing standards. These standards should include
When the tests are performed, along with the overall timeline
What tests are performed
How the tests are performed, and from where
How much knowledge of the systems you acquire in advance
What you do when a major vulnerability is discovered
This is a list of general best practices. You can apply more standards for your
situation.
Chapter 3: Developing Your Ethical Hacking Plan 33
Timing
You know they say that it’s “all in the timing.” This is especially true when
performing ethical hacking tests. Make sure that the tests you’re performing
minimize disruption to business processes, information systems, and people.
You want to avoid situations like miscommunicating the timing of tests and
causing a DoS attack against a high-traffic e-commerce site in the middle of
the day, or forcing yourself or others to perform password-cracking tests in
the middle of the night. It’s amazing what a 12-hour time difference can make!
Everyone in the project should agree on a detailed timeline before you begin.
This puts everyone on the same page and sets correct expectations.
Notify any Internet Service Providers (ISP) or Application Service Providers
(ASPs) involved before performing any tests across the Internet. This way,
ISPs and ASPs will be aware of the testing going on, which will minimize the
chance that they will block your traffic if they suspect malicious behavior
that shows up on their firewalls or Intrusion Detection Systems (IDSs).
The timeline should include specific short-term dates and times of each test,
the start and end dates, and any specific milestones in between. You can
develop and enter your timeline into a simple spreadsheet or Gantt chart, or
you can include the timeline as part of your initial customer proposal and
contract. For example, you could use a timeline similar to the following:
Test Performed Tester Start Time Projected End Time
War dial Tommy Tinker July 1, 6:00 a.m. July 1, 10:00 a.m.
Password cracking Amy Trusty July 2, 12:00 p.m. July 2, 5:00 p.m.
This timeline will keep things simple and provide a reference during testing.
Developing Your Ethical Hacking Plan
Getting approval for ethical hacking is critical. First, obtain project sponsorship.
This approval can come from your manager, an executive, a customer,
or yourself (if you’re the boss). Otherwise, your testing may be canceled suddenly,
or someone can deny authorizing the tests. There can even be legal
consequences for unauthorized hacking. Always make sure that what you’re
doing is known and visible — at least to the decision-makers. Chapter 20
outlines ten tips for getting upper management’s buy-in on your security
initiatives.
If you’re an independent consultant or have a business with a team of ethical
hackers, consider getting professional liability (also known as errors and
omissions) insurance from an agent who specializes in business insurance
coverage. This kind of insurance can be expensive, but it can be well worth it.
The authorization can be as simple as an internal memo from upper management
if you’re performing these tests on your own systems. If you’re performing
testing for a customer, you must have a signed contract in place, stating
the customer’s support and authorization. Get written approval as soon as
possible to ensure that your time and efforts are not wasted. This documentation
is your security if anyone questions what you’re doing.
Establishing Your Goals
Your ethical hacking plan needs goals. The main goal of ethical hacking is to
find vulnerabilities in your systems so you can make them more secure. You
can then take this a step further:
Define more specific goals. Align these goals with your business
objectives.
Create a specific schedule with start and end dates. These dates are
critical components of your overall plan.
Before you begin any ethical hacking, you absolutely, positively need everything
in writing and signed-off on.
Document everything, and involve upper management in this process. Your
best ally in your ethical hacking efforts is a manager who supports what
you’re doing.
The following questions can start the ball rolling:
Does ethical hacking support the mission of the business and its IT and
security departments?
What business goals are met by performing ethical hacking?
These goals may include the following:
• Prepping for the internationally accepted security framework of
ISO 17799 or a security seal such as SysTrust or WebTrust
• Meeting federal regulations
• Improving the company’s image
How will ethical hacking improve security, IT, and the general business?
What information are you protecting?
30 Part I: Building the Foundation for Ethical Hacking
This could be intellectual property, confidential customer information,
or private employee information.
How much money, time, and effort are you and your organization willing
to spend on ethical hacking?
What specific deliverables will there be?
Deliverables can include anything from high-level executive reports to
detailed technical reports and write-ups on what you tested along with
the outcomes of your tests. You can deliver specific information that is
gleaned during your testing, such as passwords and other confidential
information.
What specific outcomes do you want?
Desired outcomes include the justification for hiring or outsourcing security
personnel, increasing your security budget, or enhancing security
systems.
People within your organization may attempt to keep you from performing
your ethical hacking plans. The best antidote is education. Show how ethical
hacking helps support the business in everyone’s favor.
After you know your goals, document the steps to get there. For example, if
one goal is to develop a competitive advantage to keep existing customers
and attract new ones, determine the answers to these questions:
When will you start your ethical hacking?
Will your ethical hacking be blind, in which you know nothing about the
systems you’re testing, or a knowledge-based attack, in which you’re
given specific information about the systems you’re testing such as IP
addresses, hostnames, and even usernames and passwords?
Will this testing be technical in nature or involve physical security
assessments or even social engineering?
Will you be part of a larger ethical hacking team, often called a tiger team
or red team?
Will you notify your customers of what you’re doing? If so, how?
Customer notification is a critical issue. Many customers appreciate that
you’re taking steps to protect their information. Approach the testing in
a positive way. Don’t say, “We’re breaking into our systems to see what
information of yours is vulnerable to hackers.” Instead, you can say that
you’re assessing the overall security of your systems so the information
is as secure as possible from the bad guys.
How will you notify customers that the organization is taking steps to
enhance the security of their information?
What measurements can ensure that these efforts are paying off?
Maintaining Anonymity
Smart hackers want to be as low-key as possible. Covering their tracks is a
priority. In fact, success often depends on it. They don’t want to raise suspicion
so they can come back and access the systems in the future. Hackers
often remain anonymous by using one of the following techniques:
Borrowed or stolen dial-up accounts from friends or previous employers
Public computers at libraries, schools, or kiosks at the local mall
Internet proxy servers or anonymizer services
Anonymous or disposable e-mail accounts from free e-mail services
Chapter 2: Cracking the Hacker Mindset 27
Open e-mail relays
Unsecured computers — also called zombies — at other organizations
Workstations or servers on the victim’s own network
If hackers use enough steppingstones for their attacks, they are hard to trace.
Planning and Performing Attacks
Hacking styles vary widely:
Some hackers prepare far in advance of a large attack. They gather
small bits of information and methodically carry out their hacks, as I
outline in Chapter 4. These hackers are more difficult to track.
Other hackers — usually, the inexperienced script kiddies — act
before they think things through. For example, such hackers may try to
telnet directly into an organization’s router without hiding their identities.
Other hackers may try to launch a DoS attack against a Microsoft
Exchange e-mail server without first determining what version of
Exchange is running or what patches are installed.
These are the guys who usually get caught.
Although the hacker underground is a community, many of the hackers —
especially the elite hackers — don’t share information with the crowd. Most
hackers do much of their work independently from other hackers. Hackers
who network with one another use private bulletin board systems (BBSs),
anonymous e-mail addresses, hacker Web sites, and Internet Relay Chat (IRC).
You can log on to many of these sites to see what hackers are doing.
Whatever approach they take, most malicious hackers prey on ignorance.
They know the following aspects of real-world security:
The majority of systems that hackers want to attack aren’t managed
properly. The computer systems aren’t properly patched, hardened, and
monitored as they should be. Hackers often can attack by flying below
the average radar of the firewalls, IDSs, and authentication systems.
26 Part I: Building the Foundation for Ethical Hacking
Hacking in the name of liberty
Many hackers exhibit behaviors that contradict
what they’re fighting for — that is, they fight for
civil liberties and want to be left alone, and at the
same time, they love prying into other people’s
business. Many hackers claim to be civil libertarians
supporting the principles of personal privacy
and freedom. However, they act in an
entirely different way by intruding on the privacy
and property of others. They often steal the
property and rights of others, yet are willing to
go to great lengths to get their own rights back
from anyone who tries to take them away.
The case against copyrighted materials and
the Recording Industry Association of America
(RIAA) is a classic example. Hackers have gone
to great lengths to prove a point, from defacing
the Web sites of organizations that support copyrights
to illegally sharing music by using otherwise
legal mediums such as Kazaa, Gnutella,
and Morpheus.
Most network and security administrators simply can’t keep up with the
deluge of new vulnerabilities.
Information systems grow more complex every year. This is yet another
reason why overburdened administrators find it difficult to know what’s
happening across the wire and on the hard drives of their systems.
Time is a hacker’s friend — and it always seems to be on the hacker’s side. By
attacking through computers rather than in person, hackers have more control
over when they can carry out their attacks.
Hack attacks can be carried out slowly, making them hard to detect.
They’re frequently carried out after typical business hours — often, in
the middle of the night. Defenses are often weaker at night — with less
physical security and less intrusion monitoring — when the typical network
administrator (or security guard) is sleeping.
If you want detailed information on how some hackers work or want to keep
up with the latest hacker methods, several magazines are worth checking out:
2600 — The Hacker Quarterly magazine (www.2600.com). I’ve found gobs
of great information in 2600.
PHRACK (www.phrack.org).
Computer Underground Digest (www.soci.niu.edu/~cudigest).
Also, check out Lance Spitzner’s Web site www.tracking-hackers.com for
some great information on using honeypots to track hacker behavior.
Hackers learn from their hacking mistakes. Every mistake moves them one
step closer to breaking into someone’s system. They use this wisdom when
carrying out future attacks.
Why Hackers Hack
The main reason hackers hack is because they can! Okay, it goes a little deeper
than that. Hacking is a casual hobby for some hackers — they just hack to see
what they can and can’t break into, usually testing only their own systems.
These aren’t the folks I’m writing about here. I’m focusing on those hackers
who are obsessive and often have criminal intent.
Many hackers get a kick out of outsmarting corporate and government IT and
security administrators. They thrive on making headlines and being notorious
cyberoutlaws. Defeating an entity or possessing knowledge makes them feel
better about themselves. Many of these hackers feed off instant gratification.
They become obsessed with this feeling. Hackers can’t resist the adrenaline
rush they get when breaking into someone else’s systems. Often, the more
difficult the job is, the greater the thrill.
The knowledge that malicious hackers gain and the elevated ego that comes
with that knowledge are like an addiction and a way of life. Some hackers want
to make your life miserable, and others simply want to be seen or heard. Some
common hacker motives are revenge, basic bragging rights, curiosity, boredom,
challenge, vandalism, theft for financial gain, sabotage, blackmail, extortion, and
corporate espionage.
Hackers often promote individualism — or at least the decentralization of
information — because many believe that all information should be free.
They think cyberattacks are different from attacks in the real world. They
easily ignore or misunderstand their victims and the consequences of hacking.
24 Part I: Building the Foundation for Ethical Hacking
Many hackers say they don’t intend to harm or profit through their bad deeds,
which helps them justify their work. They often don’t look for tangible payoffs.
Just proving a point is often a good enough reward for them.
Many business owners and managers — even some network and security
administrators — believe that they don’t have anything that a hacker wants or
that hackers can’t do much damage if they break in. This couldn’t be further
from the truth. This kind of thinking helps support hackers and their objectives.
Hackers can compromise a seemingly unimportant system to access
the network and use it as a launching pad for attacks on other systems.
It’s worth repeating that hackers often hack because they can. Some hackers
go for high-profile systems, but hacking into anyone’s system helps them fit
into hacker circles. Hackers use the false sense of security that many people
have and go for almost any system they think they can compromise. They
know that electronic information can be in more than one place at the same
time. It’s tough to prove that hackers took the information and possess it.
Similarly, hackers know that a simple defaced Web page — however easily
attacked — is not good for business. The following Web sites show examples
of Web pages that have been defaced in the past few years:
www.2600.com/hacked_pages
www.onething.com/archive
Hacked sites like these can persuade management and other nonbelievers
that information threats and vulnerabilities should be addressed.
Hacking continues to get easier for several reasons:
Increasing use of networks and Internet connectivity
Anonymity provided by computer systems working over the Internet
Increasing number and availability of hacking tools
Computer-savvy children
Unlikelihood that hackers are investigated or prosecuted if caught
Although most hacker attacks go unnoticed or unreported, hackers who are
discovered are often not pursued or prosecuted. When they’re caught, hackers
often rationalize their services as being altruistic and a benefit to society:
They’re merely pointing out vulnerabilities before someone else does.
Regardless, if justice is ever served, it helps eliminate the “fame and glory”
reward system that hackers thrive on.
These criminal hackers are in the minority, so don’t think that you’re up
against millions of these villains. Many other hackers just love to tinker and