Skip to main content

Posts

2017 Equifax data breach

  Date = The crisis began in March 10, 2017   Location = USA   Parties involved = Chinese state-sponsored hackers ( Four Chinese military officers were also charged.)   Effect = A data breach that reveals the personal information of 147 million people. Their names, addresses, date of birth, Social Security numbers, and driver's license numbers have been revealed. A small subset of records - about 200,000 in order - includes credit card numbers; This group may consist of people who have paid Ecifax directly to order to view their own credit report. ( The company has entered into global agreements with the Federal Trade Commission, the Consumer Financial Protection Bureau, and 50 U.S. states and territories. That includes up to $ 425 million in aid to help victims of data breaches. ) How it Happen =  The company was initially hacked through a consumer complaint portal. The attacker used a well-known vulnerability that should have been patched but was not patched due to a malfuncti

Mapping your Abilities - 08

When looking for vulnerabilities, you don’t need to check every security protocol you have Install on all your devices at the same time not only will this be confusing, but it may also cause Some problems because there are too many things on your plate. Where possible, let you make your tests easier to manage by breaking the test project into more actionable steps. To make it easier for you to decide which system to use first, ask yourself the following questions: 1. Which systems will cause the most trouble or cause the most problematic losses when under attack? 2. Which parts of your system are most vulnerable to hacker attacks? 3. Which parts of your system are the least recorded, rarely checked, or you know almost nothing? Once you have completed the goal creation and identified the most vulnerable part of the system, you can Now you can decide which ones you should test first. By understanding the results you want to achieve and making An actionable plan where you can set your exp

Goal setting - 07

You need to establish your own hacking target by discovering vulnerabilities in your own system in order to Establish sufficient security to protect them from attacks. Since you have to fight a very cunning enemy, You need to develop very specific goals and schedules to determine when you can start hacking your system. Important note: Remember, before creating a plan, you need to make sure you have all Credentials of the test system. Also, make sure you document the ethical hackers and systems you have tested And provide copies of documents to manage. This will ensure that you have In any case you need to protect yourself when you find the system is threatened or when something happens An accident occurred during your investigation. If you are testing your own system, record everything, including all software peripherals you use Tested and the type of test you performed are required. This will ensure that you have followed all The right steps, if you need to go back to your steps, you

Establishing a Hacking Plan - 06

When you want to protect your system, you need to know where you might be attacked by hackers. This means that in order to catch a thief, you need to think like a person. Now that you know what hackers might be looking for when scanning, you know Where to start creating your security points and where you should test for vulnerabilities. At this point, you understand why a particular hacker might pinpoint a particular organization, individual, Or a separate device as the target. Any smart hacker will target the following vulnerabilities: 1. Users or administrators who may leave the target device unattended 2. Weak or unchanged passwords that may be used on all sync devices 3. Equipment owners who do not understand the complexity of their own systems or do not understand the latest systems Security Protocol When you think about how to manage your computer and Internet connection, you think Most of the systems you use every day are not as safe as you hope. hacker Knowing this, so they can

Things That Hackers Search For - 05

 For a moment, walk into the mind of criminal hackers. If you want to steal information or destroy The system, you know that you can get value from it. 1. Organizational design, filing, and registration Malicious hackers usually perform online searches to find possible targets and are the best of them Candidates for attack are those organizations that provide detailed descriptions of devices Can access, including the type of software and hardware they install. Once the hacker knows Someone has access to possible vulnerabilities in the organization’s technical security, and they will get Thoughts about whom they should attack first. Any hacker can obtain this very useful information through a simple online search. Through online mining, you can find all-SEC registrations, public tenders, publicly accessible documents, subscribers, etc. you can Even search for all the people involved in a particular organization, the time the website was published, and Webmasters are involved in creating

How Hackers Find Their Targets - 04

Criminal hackers may be one of the most strategic researchers you will encounter in the field of the technology world. In order for hackers to obtain as much valuable data as possible in one attack, they will wait Let the perfect victim appear in their raid, study their prey, and then design the attack they think is the best Can focus on their skills. Black hat attacks can target one person or several people at the same time, but in most cases, hackers Operate in a specific niche market. A hacker wants to find a loophole in the banking system Online because this will give them access to millions of deposits and they can steal these deposits through their system. Some people value personal information and continue to conduct personal attacks. Some people prefer to deface the login page And spread their capabilities through website security. Some people choose to hack into accounts so that they can remain anonymous and use the service without paying a penny. Regardless of the criminal ha

Skills That You Need to Have - 03

To become a good ethical hacker, you need to have the following skills: 1. Intermediate computer skills This means that you need to have skills that go beyond creating a Word document or being able to surf theweb. To be a hacker, you need to know how to use different Windows command lines, set up a network, oredit your computer’s registry. 2. Good networking skills Since many, if not most, of hacker attacks are done online, you need to master networking concepts and derms, such as: WEP versus WPS passwords NAT MAC addresses Routers Ports VPN IPv6 DNS Subnetting DHCP Private and public IPs IPv4 OSI modelling Packets TCP/IP 3. Using a Linux operating system Almost all hackers will have to use the Linux OS because it allows programs and tweaks that are not possible in Windows and Mac operating systems. Almost all hacking tools that you can find also make use of this operating system. 4. Virtualization Before you even try testing an attack on a live system, you need to make sure that you k