Thanks Thanks:  0
Needs Pictures Needs Pictures:  0
Picture(s) thanks Picture(s) thanks:  0
Results 1 to 13 of 13
  1. #1
    Join Date
    Nov 2010
    Location
    Gippsland Victoria
    Posts
    706

    Default Broadly - How does Hacking work ?

    Hello,

    On the news a few days ago - America concerned about Chinese Hackers stealing confidential information.

    It seems incredible to me that somebody can jump on the internet in China and "hack" secrets from a computer in America.

    Do they have superduper computers and programs to do this ?

    Here I am sitting at home with an internet connection and some browsers and I just cannot imagine how anybody could begin to remotely log in to my PC and steal my secrets or vice versa.

    Are there any good books or web sites that explain in broad terms how a chinese destop can access confidential information in other countries ?

    I have got AVG and a firewall installed but I get the impression that this simply means nothing to the super hackers out there. Surely the American businesses had much better protection than that ?

    Do they rely upon bogus window cleaners planting subversive software in the computers or can they really just "hack" into the systems from China over the internet ?

    Bill

  2. # ADS
    Google Adsense Advertisement
    Join Date
    Always
    Location
    Advertising world
    Posts
    Many





     
  3. #2
    Join Date
    Jul 2005
    Location
    Oberon, NSW
    Age
    63
    Posts
    13,360

    Default

    You don't need a supercomputer. Just a basic computer, a modem and a modicum of know-how.

    Every computer that's connected to the 'net needs to broadcast some basic info, such as it's address. It also tends to broadcast what OS it's using, what browser and a few other things. Various other software, like MSN Messenger and GTalk, UTorrent, Skype, etc., like to advertise their presence as well... all in the name of 'ease of connectivity.' ie. so that other computers know how to talk to yours.

    Ever been to a site that said you were running, say, Windows XP using Explorer 5.0 and your IP address is xx.xx.xx.xx? It's just echoing back what your computer is announcing to everyone.

    Further, most SW announce what versions they are running. (eg. the Explorer v5.0 mentioned above)

    Anybody with a Windows OS knows that updates are frequently announced, along with very general reasons for the update. So, we know that the preceding version has a flaw in the code which may allow access (if you know what the flaw is) and not everybody bothers updating automagically.

    So a hacker can just do a quick 'scan' of several hundred/thousand computers and look for which ones are announcing - quite literally - that they still have this bodgey sw installed! ie. it narrows down the field of potential candidates. And assuming that the hacker does know how to exploit the flaw, well...

    It doesn't even have to be a SW flaw. Many new computers come with the Operating System installed, but aren't really configured for security. They have all sorts of protocols, etc. installed and running 'just in case the new user wants to use them.' When, in fact, most users don't even know they exist. For example, my latest computer had a file server running in the background with no restrictions. It was open to all and sundry... although it hadn't also been configured to access my filebase, so my computer didn't have anything to send, it still meant people could connect to it without my knowledge.


    Then there's the other bug-bear... trojans. Have you ever had a problem with a program refusing to work 'cos it's missing a .DLL or similar file, so gone to the web to find & download the missing file? Or downloaded pirate sw?

    That's really, really not a good idea. But people do it every day. Let's be gracious and assume that the vast majority are legitimate... but every now'n'again a hacker will release just such an item with a 'backdoor' built into it. A Trojan. You install it, then the next time you're on the 'net this 'backdoor' quite happily calls home and says "come on in & play."


    It's a fun world, innit?
    I may be weird, but I'm saving up to become eccentric.

    - Andy Mc

  4. #3
    Join Date
    Nov 2010
    Location
    Gippsland Victoria
    Posts
    706

    Default Thanks

    Thanks Skew,

    That takes some of the mystery out of it.

    I guess that in any big company the IT guys should be right on top of this and making sure that the various computers connected to the internet are not broadcasting too much "come and get me" information.

    Reminds me of the plaque we put on a rocket and sent it into outer space - many people said at the time that it was a clever thing to do whilst others said "We are telling the monsters where we are and what we taste like - come and dine"


    Regards

    Bill
    Last edited by steamingbill; 21st February 2013 at 04:45 PM. Reason: change title

  5. #4
    Join Date
    Dec 2007
    Location
    Gold Coast
    Age
    63
    Posts
    847

    Default

    Larger organizations and better security don't always go hand in hand. People break systems - either delibrately or inadvertently.

    And anyone who has worked in IT security any length of time, will have more than one war story about how a complex system was circumvented by the simplest of inadvertent illicit or undocumented user behaviour. My favourite one is about the router password written in permanent maker on a whiteboard (it was too important to accidently rub off after all). Govt entity btw!

  6. #5
    Join Date
    Jun 2007
    Location
    North Of The Boarder
    Age
    68
    Posts
    16,794

    Default

    Remember Hogans Hero's and The Great Escape

    Tunneling protocol - Wikipedia, the free encyclopedia

  7. #6
    Join Date
    Jul 2006
    Location
    Port Huon
    Posts
    2,685

    Default

    It's basically a race between the discovery of operating system, application and network vulnerabilities and the exploitation of those vulnerabilities by the bad guys.
    The vulnerabilities can be caused by bad design and/or programming or by the use of certain features in a way the designer never envisaged.

    If a system is connected to the Internet, then it's going to be attacked or at least probed, by someone. The more valuable the prize, the more effort the hackers will put in. There may be nothing of commercial value on your home computer but there is value in being able to hijack it to attack another site, especially if you have a few thousand hijacked PC's to utilise.

    I'm glad I'm not involved in computer security any more.

  8. #7
    Join Date
    Nov 2012
    Location
    Thornbury
    Posts
    262

    Default

    Everything said has been true..but..

    The hackers in the story work on a completely different level. They are the type that buy the latest hardware firewalls and security appliances then pull them apart - litterally and figuratively.

    They go through the code line by line and look for points of exploitation.
    There is an immense amount of effort here, but once an exploit is found they test and record the outcomes.

    If it is good, they then a secret way in to many different companies.

    On a smaller scale they do the same thing with software - particulalry databases - learning and trying to inject new code back to the database to take control and get data they are not supposed to have. And so on down the stack -(online applications).

    The 'way in' through the intrernet is generally secured adequately - some better than others, but if the hacker goes through the security appliance - they can get full access.

    It takes a lot of work and knowledge to protect a system from a determined hacker - and it's a cost that a lot of companies are reluctant to pay.

    On the plus side - the reward to actively hack a private system is not worth the effort for these people. They might use some automation to utilise common flaws, but itis unlikely they will expend any real effort.

    Get yourself a decent antivirus/firewall with a spyware and malware detection and you should be OK. - oh - and make sure they are urned on.

    [Edit] I hate it when someone else types what your typing - only faster. But i agree
    Can you imagine what I would do if I could do all I can? -- Sun Tzu

  9. #8
    Join Date
    Dec 2010
    Location
    Ipswich
    Posts
    33

    Default

    Having worked at Microsoft and seen all the moving parts to a platform such as .NET / Windows all I can say is there are a variety of reasons for a hack to occur.

    The most common one is 3rd party vendors writing bad code, that is to say since Windows Vista and above the exploits made available in the OS have been somewhat minor and not prone to security breaches given the layering that took place post Windows XP to basically prevent even trusted solutions from getting direct access to the Kernel.

    In reality products that get installed on an OS generally act as the vulnerable points of fail, given the best hacks are the ones that dont' get advertised and you won't necessarily even hear of a hack until a security agency wishes to brag about their ability to find productX has xyz flaw(s). Most frequently used apps get security audits by 3rd party agencies whether the ISV (Independent Software Vendor) likes it or not and they are typically the ones who do so in order to perk up their own stock in "hack prevention" fear.

    An example comes to mind. Did you know Flash is considered a virus internally in Microsoft security database. In that for years Microsoft would release patches to surround Flash given the latency between Macromedia/Adobe was to long for release(s) (hence you saw often updates etc).

    The Chinese hackers etc aren't a bunch of kids goofing around sniffing ports for exploits, they will often attack from both within and outside whilst at the same time not having to layer in a lot of groundwork to ensure anonymous cover... they simply brute-force their way into the network(s) which can be a case of running dictionaries over password(s) or leveraging the awesome existence that most people just dont keep cryptic passwords, expose areas within their network that aren't firewall / DMZ etc.

    It can also be a case of installing a trojan on a person work computer waiting for the said person to then log in via work network, then extract that data and begin to do the same thing over and over internally until they puddle jump their way into areas of need. That's a bit of an old approach but if you look at some of the sophisticated virus creation out there today it's not a case of "spamming your inbox with viagra" viruses ..they are getting much smarter and quieter about their attachment(s).

  10. #9
    Join Date
    Jun 2007
    Location
    North Of The Boarder
    Age
    68
    Posts
    16,794

    Default

    Ah yes Bill Gates speaks "Not my fault"

    This is true what he says.

    So whats does Microsoft have to do with hacks using LINUX or Apple??

  11. #10
    Join Date
    Jul 2006
    Location
    Port Huon
    Posts
    2,685

    Default

    There are far fewer successful hacks against Linux or IOS.
    This may be in part due to the fact that virus writers go after Windows as it's both an easier target and a larger one.

    Once a vulnerability in Linux has been found, the response to it is quick and a patch is soon produced.
    I can;t speak for IOS as I've never used it.

  12. #11
    Join Date
    Jun 2007
    Location
    North Of The Boarder
    Age
    68
    Posts
    16,794

    Default

    Here's the strange part.

    Most Motherboards and add on cards and other hardware are made in Asia and yes some have had code installed which allows easy access to your machine once installed. They have been discovered.

    USB thumb drives have also be known to come with software installed and code which allows access made where oh yeh Asia.

    Software comes with almost every hardware item you have signed by Microsoft or not.

    Then of course there is net access itself


    Its a case of chase the tail can't have a fix till the leak is found, reported and fixed.

  13. #12
    Join Date
    Nov 2010
    Location
    Gippsland Victoria
    Posts
    706

    Default How they did it - explained ?

    Hello,

    I found this

    How Chinese Hackers Steal Secrets - Business Insider

    Which supposedly details how the recently publicised hacking was done.

    I get lost pretty quickly bit some of you more knowledgeable folk will understand it better than me.


    Bill

  14. #13
    Join Date
    Jul 2006
    Location
    Port Huon
    Posts
    2,685

    Default

    The methods discussed there still rely on having a piece of malware on the target computer.
    The most common vector for installation of malware and viruses is still the computer owner/user.

    The safeest approach is to consider any software that you install to be suspect unless you absolutely trust the source and can verify it's origins. Even then ...

    You can never be too paranoid where your computer is concerned.

Similar Threads

  1. RFQ: Lathe Work And Mill Work
    By twistedfuse in forum METALWORK FORUM
    Replies: 4
    Last Post: 18th January 2012, 04:23 PM
  2. Torque work centre for work space
    By carrom in forum WOODWORK - GENERAL
    Replies: 0
    Last Post: 30th December 2009, 05:29 PM
  3. Minaret, Wood Hacking Novice
    By Minaret in forum G'day mate - THE WELCOME WAGON -Introduce yourself
    Replies: 3
    Last Post: 8th August 2009, 06:42 AM
  4. Been hacking at it for years and...
    By Skew ChiDAMN!! in forum WOODCARVING AND SCULPTURE
    Replies: 5
    Last Post: 14th September 2008, 07:10 PM
  5. Hacking up Larry's damage
    By Cliff Rogers in forum TIMBER
    Replies: 17
    Last Post: 10th July 2006, 09:56 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •