31
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. How Hackers Attack Networks This presentation is based on a PowerPoint by security expert Adrian Crenshaw. You can view his original presentation here.

How Hackers Attack Networks

Embed Size (px)

DESCRIPTION

Attack networks

Citation preview

2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. How Hackers Attack NetworksThis presentation is based on a PowerPoint by security expert Adrian Crenshaw. You can view his original presentation here.!! Tech"epublic# $nc. www.techrepublic.co%. All rights reserved. Co%%on plat&or%s &or attacks'indows ()*+e*,P Ho%e -dition.inux# /pen012# Trinux# and other low3cost &or%s o& 4N$,!! Tech"epublic# $nc. www.techrepublic.co%. All rights reserved. .ocal and re%ote attacks.ocal5 Attacks per&or%ed with physical access to the %achine"e%ote5 Attacks launched over the network!! Tech"epublic# $nc. www.techrepublic.co%. All rights reserved. 'hy worry about local attacks on workstations6Hackers can collect %ore in&or%ation about a network and its users.Hackers can obtain the ad%inistrator password on a workstation# which can lead to server access.1pyware can be installed to gather %ore sensitive in&or%ation.!! Tech"epublic# $nc. www.techrepublic.co%. All rights reserved. Co%%on local attacks7etting ad%in*root at the local %achine'indows 'orkstation5 "ena%e or delete c58winnt8syste%98con&ig81A+.inux5 at .$./ pro%pt# type linux sCracking local passwords.!phtcrack :.C;"e%oving hard drive to install in another box-xploiting &iles or co%%ands available upon loginC582ocu%ents and 1ettings8All 4sers81tart +enu8Progra%s81tartup"egistry co%%ands# such as adding users!! Tech"epublic# $nc. www.techrepublic.co%. All rights reserved. Cracking over the network5 A &our3step progra%