Senin, 14 September 2009

HOW TO BE HACKER ( Part 3)

After the crackers have identified a weak network components and can be conquered, then the cracker will run programs to conquer the weak daemon program on the server. Daemon program is a program on a server that normally run in the background (as daemon / demon). The success of the program conquer this daemon will allow a Cracker to gain access as 'root' (the highest administrator in the server).

To remove tracks, a cracker usually do clean-up operation 'clean-up' operation by cleaning the log files. And add the program to enter from the back door 'backdooring'. Changing the file. Rhosts in / usr / bin for easy access to the machine via rsh conquests & csh.

Furthermore a cracker can use a machine that had conquered for his own benefit, such as taking sensitive information that should not be read; mengcracking another machine with a jump from the machine in the conquered; install the sniffer to see / record the traffic / communications passing; can even turn off the system / network by running the command 'rm-rf / &'. The latter will be very fatal consequences because the system will be destroyed at all, especially if all the software on the hard disk Lay. Process re-install the entire system must be done, will be confusing if it is done on machines that run mission-critical.

Therefore, all machines & routers critical missions should always check the security & the patch by the newer software. Backup is very important especially on machines that run mission critical behavior that was saved from a cracker that disable the system with 'rm-rf / &'.

For those of us who wrestle daily on the Internet are just going to really appreciate the existence of hackers (not Cracker). Because hackers thanks to the Internet is there and can we enjoy today, even kept in repair for a better system again. Various weaknesses in the system due to improved intelligence colleagues hackers often they will be working on improvements. voluntarily because of his hobby. Moreover, often the result of his hacking distributed freely on the Internet for the purposes of the Internet community. A cultural values & Noble mutual cooperation instead grow in the Internet virtual world that typically seem futuristic and far from the social sense.

Development of the hobbiest hackers become critical to the sustainability / survival of the spacecraft Internet dotcommers Indonesia. As one of fact, in the near future Inshallah around mid April 2001 will be held hacking competition on the Internet to break into a server that has been in the first set. Hacking is in Motori competition by young children in Indonesia Linux User Groups (KPLI) Semarang is mobilized by young people like Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko @ riset.dinus.ac.id). Like most young kids the other, they are generally capitalized, insufficient - support & sponsorship would be very useful and awaited by the young fellow is.

Hopefully this will add to the spirit of readers, especially young readers, to move in the exciting world of hackers and challenging. If it says Captain Jean Luc Picard in the movie startrek Next Generation, "To boldly go where no one has gone before".

Tidak ada komentar:

Posting Komentar