Question 1
November 2023
INetworld Computers cdl _____________________--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--------_--._-.---C-o-m--mented [BL1): UseWord Art to create a letter head
for this article:
IHI Fill: Gray, Accent Color 3, Sharp Bevel
,?_c:~_i!!g_J~-t~~-?_c:i_c:i_~!~~-r:iJ!M~_g_!=!ri.c;f_Jh~-~-~?<.P!9.iJ!~_g_~E!!=!~___r:_i__E_!_~_-·~_-~_··~_>_-F-!_r=oin.=_t:=?C=_a=l~ib-cr-i-,:-iS_-i~zren=2P=8=,.~u/_c,t_boEld!!'
system or network, usually to gain unauthorized access to personal or organizational
Commented IBLZJ: Insert Drop cap, 2 lines, bold
data.
Introduction
Hacking is not always a flaSty-malicious activity, but the term has mostly negative
connotations due to its association with [cybercrim~----------------··------·----···-··-·-···-··-···-·--···
1.Hacking for Different Reasons
As discussed in previous chapters, there areis more than one reason why hackers
do what they do. Most hackers will attempt to access systems for a challenge, out of
Commented [BL3J: Insert reference link for this journal
article:
https://www.sciencedirect.com/science/article/pii/5266734
5223000238
curiosity, or for more malicious reasons.
3.Nessus
The only true way to defend your system is to look at it through the eyes of your
enemy, the intruder. A number of automated utilities can probe your networks to look
for common exposures and vulnerabilities. One of the foremost freeware tools is a
package called Nessus.
2.Maximize the Access
A skilled ~intruder
appreciates principles of strategy and will not rush into a
system without careful preparation and planning. These rootkits will do everything
from installing Trojan programs to mod-ifyiflg--log&
4.The Five Phases of Hacking
GeAtfary-te--f)opHlaf-GpiAiOA-afld-the-sensatieAal~d---l=lollyweod-image--ef-#le-flaGkef,
even the boldest intruders will not rush in to a site •Nithout careful preparation. Skilled
intruders will assemble a number of strategic and tactical attack maps by which they
can acquire information on a target system or network.
!4.1Creating an Attack Map
When preparing to pest-mount any attack, it is always advisable to know the terrain.
4.2Building an Execution Plan
When building an attack execution plan, one must take into account the following
factors: I·-----·--------·---······················-······--·-·-··---·------------------------------------·----··--·-.-···-
Commented
numbers
V\\vulnerable service must be presently running and accept connections from
the rest of the Internet.
Exploits used must not entail any form of denial of service (DoS), which would
.•-i give away the attack.I_____._____·_-----------------------·-·····-·-········-·--··-------------------. __ Commented
[BL4): Insert double line space between
[BLS]: Insert bullets.d/s