Adversaries And Ports Essay

4593 words - 19 pages

5/4/2015

Adversaries and Ports
IT-520

Contents
Abstract 2
Introduction 3
What is Hacking 4
Modus Operandi of Hackers 4
Common Hacker Ports 8
Port Scanning 8
IP Address Vulnerability 11
How can Hackers Target and Hack your Site 12
Defending Against Port Scans 8

Abstract

A weakness, which an adversary could take advantage of, in any network are the ports which connect the network to the outside world. These ports, or the tools behind them, may have weaknesses or vulnerabilities which render them able to be hacked. This paper will discuss how hackers think, what they look for, and what ports are commonly used.

Introduction

What is hacking? What are ...view middle of the document...

It is then left up to the reader to investigate their own computer, server, or network and see what ports are open and through looking up their version/ platform, to see if they have any known vulnerabilities. This will enable further personal research and growth in the area of computer security. This paper is not directed towards solving anyone’s particular problems but giving them the broad and general sense of how their adversaries work and thus enable them to be able to take the next step.
Lastly, the port scanner can be used by the reader. The reader should be aware that while this paper will focus on the port scanner being used by the adversary, it can be used by the reader in order to see their own ports and what is open and what is not. It is good to have the idea and viewpoint of the adversary so that whatever defense it deemed appropriate, it can be tested against what an adversary might do. As well as simply being able identify potential vulnerabilities.
What is Hacking

Ultimately, the hacker who is looking to control a network is looking for open ports which contain vulnerabilities, which then allows the adversary to utilize to their own advantage. So what is a textbook definition of Hacking? According to whatishacking.org, Hacking is “the practice of modifying the features of a system in order to accomplish a goal outside of the creators original purpose”1. A hacker could be a teenager or an elder, white or black, rich or poor, in this country or another. Hacking can be done in Table 1
relation to espionage or in order to steal corporate secrets or even just as a simply prank on a friend. Hacking is, at this point, mostly referred to what Hackers do, illegally breaking into a network. In the next section, will go through a standard methodology or thinking of how a hacker/ adversary would think when trying to break into a network.
Modus Operandi of Hackers
When an adversary strikes out against a network the only way to do so it through utilizing ports. They won’t be able to see a diagram of the network but let’s assume that the system which they are attacking is a “standard dual screened subnet with a firewall at the front and back”2. This webserver contains a front webserver and a backend database server along with a Domain controller.
When the adversary decides that they wish to attack a network, the first question they must then answer is what to attack. They will need the following to initiate an attack:
* “Network Address Ranges
* Host Names
* Exposed Hosts
* Applications exposed on those hosts
* Operating system and application version information
* Patch state of both the host and of the applications
* Structure of the applications and back-end servers”1
Let’s go through each of these to see how an adversary can penetrate the system and what this will enable them to do, starting with, Network Address Ranges. Let’s assume that the network under attack...

Other Essays Like Adversaries and Ports

Comparing The Moral Virtues Of Antony And Julian The Apostate

1103 words - 5 pages Roman emperor Julian the Apostate and Christian leader Antony both exhibited many qualities of character during their existence. Both of them led very distinctive lives although shared several ethical values. Book 25 of “The Later Roman Empire” and the book “Early Christian Lives” show concrete evidence of this. In the following essay, I will argue how both leaders’ lives were devoted to their religious beliefs and their mutual cardinal virtues

Living In A Cashless Society Essay

1637 words - 7 pages Money in a traditional sense no longer exists. Money is becoming much of a concept than a physical material, and most ordinary bitter have not see the reality of the switch. People today are using credit and debit cards on a regular basis and in everyday situations such as meal purchased at fast food, highway tolls, clothing, groceries, gas stations, etc. all of these means of systems could be regarded as a cashless society or world. The

The French And Indian War: The "Real" First World War

1955 words - 8 pages The Seven Years War, or more commonly referred to as “The French and Indian War”, has been called the true First World War. In this book The French and Indian War: Deciding the Fate of North America, the author and historian Walter R. Borneman paints a detailed and elaborate picture that justifies the claim of it being the first true war of global proportions. If ever there truly was a climax to the never ending feud of the European

Is The Use Of Animals In Medical Research A Necessary Measure?

1513 words - 7 pages Throughout history, animals have been used in experiments to test product safety and obtain medical knowledge that benefits both humans and animals alike. Every year there are numerous medical breakthroughs, such as medications and surgical instruments, which are tested on animals to insure their safety before they are deemed acceptable for human use. Even though the results of the experiments saved millions of human lives, they are also

Education And The Evolving Job Market

2363 words - 10 pages The lives of students today are changing. They are preparing for lives and jobs that have never before existed. If teachers hope to have a significant and worthwhile impact on these quickly changing lives, they must change the way they think, prepare, and instruct our future generations. Children cannot afford to have teachers who remain stagnant in their methods and ideals. Students crave instructors that are willing to allow them to tap

Young And Relentless

1737 words - 7 pages There are numerous influences that can be responsible of teenager’s behaviors and attitude as they develop. One factor that is important to these behaviors is parental figures being over involved or uninvolved in their children’s lives. Many of these effects include illegal substance abuse, rising sexual activity, underage alcohol consumption, and tobacco use. Studies show parental participation plays a key role in the characteristics developed

The Natural Law Theory

1231 words - 5 pages Obeying by the natural law theory is the only true and moral way to live life; especially a life lived in God’s image. God’s presence is a guiding factor to obtaining a moral and virtuous life, which can only be obtained by following the natural law theory. God created a set of laws as a supreme guide for humans to live life, like any law these laws were created to ensure wellbeing for everyone. The laws he created are the civil law, the natural

Resolved: Presidential Signing Statements Threaten To Undermine The Rule Of Law And The Separation Of Powers

1811 words - 8 pages The subject of signing statements has created much debate among the houses of Congress, government officials, and the public alike. These signing statements fall under the categories of constitutional and legislative history signing statements. Constitutional signing statements are those in which the president deems certain provisions of the legislation as unconstitutional, therefore they should not be enforced (Bradley & Posner, 2006

Oppressive Systems Of Government In Egypt And Animal Farm

1529 words - 7 pages As in Egypt, Orwell demonstrates through his allegorical novel “Animal Farm” that leaders are able to establish and maintain power over a people, and in turn create an oppressive and corrupt government system. Orwell shows the significant difference in the education and levels of knowledge in the animals, and how the government takes advantage of this difference. The split between the levels of intelligence is portrayed in the first chapter

The Pathway To Psychosis

1415 words - 6 pages “How all occasions do inform against me” is a line from act IIII, scene IIII of William Shakespeare’s Hamlet. This line, spoken by Hamlet, expresses his emotional state as he is currently overwhelmed by the death of his father, the king of Denmark, and the situation surrounding it. After Hamlet learns of his father’s death he finds out that his mother has married Claudius, Hamlet’s uncle. On top of all of that, Hamlet soon after

Rated “M” For “More Censorship Not Needed”

1241 words - 5 pages Since the moment video games became a commercial success there have been people who have pushed for unfair amounts of censorship to be placed upon the content of the games and its availability to children. These groups push for increased regulations on content but there is already an appointed group to handle this issue, the ESRB. Even though there has been an increase in mature content in the video game industry, increased censorship is not

Related Papers

Truman Doctrine Essay

800 words - 4 pages allies to Cold War adversaries. The Soviet imperialism in Europe delayed withdrawal from postwar Iran and the breakdown of allied cooperation in postwar Germany provided the Lopez 2 backdrop for the Truman Doctrine. Truman himself had first become suspicious in dealing with the Soviets at the Postdam Conference, the Soviet reluctance to withdraw from Iran on schedule in early March 1946, reinforced his concern. A few days

Vicksburg Essay

2008 words - 9 pages northwestern states to the world and a waning support of the war in enthusiasm and economic demand. President Abraham Lincoln said of Vicksburg and the importance of its seizure, “See what a lot of land these fellows hold, and Vicksburg is the key. The war can never be brought to a close until that key is in our pocket… We can take all the northern ports of the Confederacy, and they can defy us from Vicksburg.” He went onto say after a trip made as a boy

The Separation Of Capital Ownership And Control

1577 words - 7 pages The argument of whether the separation of capital ownership and control is an efficient form of organization has constantly been a controversial issue. The criticism whether the controllers’ act is in the best interest of the owners’ wills never end as long as hired managers operate management. As the number of public companies has been increasing over the course of this century, meanwhile the American style of contact based corporation has

The Versatility And Flexibility Of Oled's

1014 words - 5 pages In April 1, 2002, organic light emitting diodes gain rise in the scientific community with their published, more practical form at Ames Laboratory. “Scientists at the U.S. Department of Energy's Ames Laboratory, in collaboration with scientists at the University of Michigan, Ann Arbor, have developed and demonstrated a novel, fluorescence-based chemical sensor that is more compact, versatile and less expensive than existing technology of its