The types of attack - 2 February 2012 - Blog - | LINUX - SECURITY |
Saturday, 2016-12-03, 6:37 PM
Welcome Guest | RSS
Statistics

Total online: 1
Guests: 1
Users: 0
Site menu
Our Documentations
1* METASPLOIT
Blog Category
# Only for beginners [39]
This category contains some introductions and tutorials about UBUNTU and BACKTRACK for those who just start using LINUX.
# Computer Security [11]
In this category, you will find all courses about the Informatique Security
# LINUX [2]
EVERYTHING ABOUT LINUX - UBUNTU & BACKTRACK - (NEWS, VIDEOS, TUTORIALS, ... )
# BackTrack 5 Tutorials [6]
In this categorie, I will post all tutorials about BackTrack5 (Installation, Configuration, Update, Hacking...)
# TechnicDynamic Tutorials [12]
Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link : http://technicdynamic.com
# Vishnuvalentino Tutorials [2]
He is a computer security specialist, and also freelance website designer. Read more : http://vishnuvalentino.com/about/
# Hackers News [6]
All news about the hackers of the world ...
# Tools [18]
All Security Tools
MEMES PICTURES [0]
Entries archive
Shopping


Follow us
facebook
Main » 2012 » February » 2 » The types of attack
7:19 PM
The types of attack
The types of attack

Introduction 

Hackers use several attack techniques. These attacks can be grouped into three different families:
  • Direct attack.
  • Collateral attack by bounce.
  • Attacks by indirect answers.
We will see in detail these three families. 


Direct attacks 

This is the simplest of attacks. The hacker attack directly from the victim's computer. Most of the "script kiddies" using this technique. Indeed, they are using hack programs are only loosely definable, and many of these programs send packets directly to the victim. 



If you get attacked in this way, there are great chances for you to trace the origin of the attack, identifying the same time the identity of the attacker. 


Collateral attack by rebound 

This attack is very popular with hackers. Indeed, the rebound has two advantages:
  • Hide the identity (IP address) of the hacker.
  • If necessary, use the computer resources through because it is more powerful (CPU, bandwidth ...) to attack.
The principle itself is simple: the attack packets are sent through the computer, which affects the attack to the victim. Hence the term rebound. 


The attack FTP Bounce is part of this family of attack. 
If you are a victim of such attacks, it is not easy to trace the source. At its simplest, you will head to the computer intermediates. 


Collateral attack in response 

This attack is a derivative of the bounce attack. It offers the same advantages in terms of the hacker. But instead of sending an attack through the computer so that the repercussions, the attacker will send a query. And it is this response to the request will be sent to the victim computer. 


Again, it is not easy to trace the source ... 


Conclusion :

When you attack, it can be done directly or via one or more intermediate computers.Understanding the attack will let you know how to go back to the hacker. 
Category: # Computer Security | Views: 408 | Added by: Administrator | Rating: 0.0/0
Total comments: 0
Name *:
Email *:
Code *:
Visitors

Share This On:
Google Translator
Search
Login form
Our poll
Rate my site
Total of answers: 17
Clock & Calendar

«  February 2012  »
SuMoTuWeThFrSa
   1234
567891011
12131415161718
19202122232425
26272829