![]() A real hacker must also rely on physical and interpersonal skills such as social engineering and other "wet work" that involves human interaction. In fact, if all you can do is point and click, you are a script kiddie, not a hacker. ![]() However, although computer skill is central to a hacker's profession, there are many additional facets that he must master. This mirage might be set off by other imagined features, such as dusty stacks of Dungeons and Dragons lore from the 1980s, empty Jolt Cola cans, and Japanese techno music streaming from the Net. The stereotyped image conjured up by most people when they hear the term "hacker" is that of a pallid, atrophied recluse cloistered in a dank bedroom, whose spotted complexion is revealed only by the unearthly glare of a Linux box used for port scanning with Perl. Therefore, this chapter will review hacking techniques from a generic perspective. When viewed holistically, your wireless network is just another potential hole for a hacker. Each of these attacks can take multiple forms, and many can be targeted against both wired and wireless networks. The following techniques are not specific to wireless networks. Expert users will want to skip ahead to the next chapter (Chapter 7, "Wireless Attacks") and go straight for the goodies. This chapter, which will be a review for advanced users, will introduce the main types of hacker attacks. ![]() Therefore, as a security consultant or network administrator, you should be well versed in these occult techniques in order to thwart them. It is more likely that the attacker will need several techniques used in combination to bypass the many layers of protection standing between them and root administrative access. It is rare that a hacker can get online or dial up on a remote computer and use only one method to gain full access. A typical hacker attack is not a simple, one-step procedure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |