Network Security Professionals
"A victorious army first obtains conditions for victory, then seeks to do battle." - Sun Tzu
A foot print???
What the hell is that? I'll tell you, initially, it was simply a log entry; something easily deleted from a syslog file with VI. Intelligent SysAds would have logs written to non-standard places, or duplicated on other boxes. Believe it or not, some green SysAds still do not do this, or they don't even look at their logs. Moving right along.... Intrusion detection/prevention has maturing quite rapidly. It started with simply looking at the system logs, then tools such as file hashers came out., which looked for changes in files (like hosts and /etc/passwd). Now, they have specialized software/hardware that can sit on a gateway pipe and examine every packet...inbound AND outbound. This stuff looks at packets and compares their contents or services (like TCP/IP port) or source/destination address to a database of known vulnerabilities or sore spots (like known bad-guy IP addresses). This could be similar to how a virus checker works, using "heuristics" (look it up). Anyway, use caution when mapping out a network to attack. SSL is a great way to slip around. Also, a concept borrowed from botnet owners is the stand-off attack.
The military seems to think it is a good idea, so should you. They don't just walk up to the enemy and open fire, they look at the surroundings (what other systems are there), environment (can you easily access a system locally or will it have to be remotely), counterintelligence (intrusion detection???), Size of force (several IDSs, firewalls, etc.), escape routes, and deception (honey pot systems) to name a few. Remember the cartoon G.I. Joe? "Knowing is half the battle." Sun Tzu? "Know your enemy."
Tools! <grunt grunt grunt>
There are two basic tools
you need to attack: hardware and software <duh>. Recommended:
Laptop (because no one with an IQ above 80 hacks from home) with a modem,
a 10/100Mbps ethernet card, and/or wireless NIC. Perhaps the only
smart things in the movie hackers were they distributed their attack
and went to public payphones, not their homes (acoustic couplers???).
Try to find one that you can change the MAC address if possible. Linux and Windows are musts; have a dual boot system. VMware allows a
The Bottom Line
Teach yourself to administer and secure the above boxes. Then you can start attempting to "test" them with scripts from the links in tools, or, if you learn the languages above (a feat alone) scripts you wrote. Look for how your software reacts. See if you can detect the attack. See if you can evade your own detection. Be slow, patient, and methodical. If you can't figure something out, ask someone you trust. Always assume that you are being watched.
KKids, college students, corporations, employees, private investigators, criminals, the government (military and civilian), foreign governments, and terrorists. Yes, it is an incomplete list, but those are some of the most significant participants. The next question is why/em> they hack. Their motives are as diverse as they are. Kids: boredom and notoriety. Students: as many reasons as there are college majors. Companies: corporate espionage and guerrilla marketing. Employees: fraud and misuse. You can guess the rest.