Page 2 of 2 FirstFirst 12
Results 11 to 18 of 18

Thread: Types of hacking attacks

  1. #11
    And that really is the point, and the most difficult thing for us to ascertain here. Is the question really a security question, or a hacking question masquerading as one?
    I think what really pisses people off is that the more people say words like hack or hacker, the less people talk about computers. And the fact of the matter is that right now you, me, and even the administrator of this site are just taking things one extra step downward.

    Not much to add.
    Um... hah!
    Last edited by rlt; June 11th, 2007 at 02:58 AM.

  2. #12
    Just Another Geek
    Join Date
    Jul 2002
    Location
    Rotterdam, Netherlands
    Posts
    3,401
    Quote Originally Posted by VeerGiant
    since it is such a large field i'm having trouble finding appropriate resources.
    This will keep you occupied for a while:

    SANS: Reading Room
    Oliver's Law:
    Experience is something you don't get until just after you need it.

  3. #13
    @ÞΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    Location
    St. Petersburg, FL
    Posts
    1,705
    Meh...

    I've seen two useful responses to his question.



    Oh yeah...
    And that really is the point, and the most difficult thing for us to ascertain here. Is the question really a security question, or a hacking question masquerading as one?
    Quit bitching. Nobody really cares.
    Real security doesn't come with an installer.

  4. #14
    Senior Member JPnyc's Avatar
    Join Date
    Jan 2005
    Posts
    2,734
    Frankly, I don't care whether you do or not. It doesn't concern you.

  5. #15
    Junior Member
    Join Date
    Jun 2007
    Posts
    4
    Hey rtl.........actually i'm working on linux, so should i know the complete details of socket.h instead of winsock
    and thnx SirDice that site is proving to be quite informative

  6. #16
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    VeerGiant,

    It would help if you gave us the precise instructions you have been given.

    In particular, I would like to know what the deliverable is supposed to be. Is it a presentation? a 15,000~25,000 word dissertation or whatever?

    I am afraid that you might be falling into the trap of going for the detail too early on. You really need to create a top level plan of action first

    Professors will not usually ask you to do something that has not already been covered in a course.
    Nobody ever bothered to tell my lot that! Actually, a part of your university education is being able to demonstrate the capacity to conduct independent research in an area you have not been spoon fed.

    As you noted in your first post, this is a huge subject area, so your problem is going to be one of selection. Incidentally, what is your deadline?

    To restrict this project to manageable proportions you are going to have to carefully define your scope, and you need to do this first.

    EDIT: I really don't see how this can be taken as anything other than a request for mentoring/advice regarding an academic project.

    If I wanted to do anything malicious I would need to know:

    1. Hardware platform(s)
    2. Operating System(s)
    3. Applications
    4. Network Architecture
    5. Access Vectors

    Absolutely none of those have been mentioned
    Last edited by nihil; June 12th, 2007 at 07:34 AM.

  7. #17
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,052
    As far as things you can demonstrate without using any special software you should show your teacher XSS and SQL Injections.
    http://en.wikipedia.org/wiki/Cross-site_scripting
    http://en.wikipedia.org/wiki/SQL_injection

  8. #18
    Junior Member
    Join Date
    Jun 2007
    Posts
    4
    Well maybe i've not explained my problem clearly.
    I have just completed my 2nd year in BTech and i approached my prof for a project related to network security. Since both the networking and OS courses are in the next semester, my prof told me that he would not be able to give me a specific task in security but for these holidays told me to study the various types of attacks and try to implement some of them, and implementation of this knowledge will be done in the winter vacations after the next semester when he would give me a specific security related task.
    So for the time being i am trying to categorize all the attacks, and learning raw socket programming.
    I hope this clears things out.

Similar Threads

  1. A look into IDS/Snort Whole thing by QoD
    By qod in forum The Security Tutorials Forum
    Replies: 6
    Last Post: February 27th, 2004, 03:03 AM
  2. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 08:01 AM
  3. Understanding DoS
    By NullDevice in forum The Security Tutorials Forum
    Replies: 21
    Last Post: December 17th, 2003, 10:03 PM
  4. You can be a Certified Ethical Hacker...
    By -DaRK-RaiDeR- in forum AntiOnline's General Chit Chat
    Replies: 13
    Last Post: January 10th, 2003, 07:10 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •