![]() ![]() ![]() Who are the favourite targets?There is such a huge number
of different mechanisms and instruments involved in computer piracy that it is impossible to mention and
describe all of them; vulnerabilities are lurking at all levels, in
application programmes A cyber attack on a computer system usually
consists of various phases: it often starts with what we might call a "geographic reconnaissance"
of the local network (LAN
At this point, the hacker
can launch attacks on the specific system, or he can intercept, cancel or
manipulate data and programmes. Either "
sniffer
Amongst the instruments at the hacker's disposal are the so-called
"Trojan horses". These are programmes which carry out particular operations but which also contain hidden functions which are carried out unbeknown to the user. For example, a programme which manages a
database The techniques for attacking computers are getting more and more sophisticated and are under continuous development. In some cases software agents are used which can propagate autonomously on Internet and spread all over the world. "Bot" (short for robot) software can be spread on Internet and, by communicating with each other, they can control hundreds of computers which are then compromised with backdoors (access entry points unknown to the system administrator) and can be used to launch coordinated attacks against chosen targets. For example, in February 2000, thanks to a particularly sophisticated attack of "Distributed Denial of Service" (DDoS
Unfortunately, the techniques are not always so complex. In the simpler cases, thanks to a well-known weakness (well-known in hacker circles, obviously), files containing programmes are copied onto the target computer. When these programmes are activated they can perform various tasks, e.g. create illegal accesses (backdoors), activate hidden connections, probe files, etc, depending on the particular interests of the hacker. Nowadays you do not need to be a computer expert to be able to gain illegal access to a computer; you can simply use "ready-made" programmes available on line, which exploit well-known vulnerabilities. Computer piracy also uses what is called in jargon "social engineering", a form of attack on a computer through its user, who is sometimes more defenceless than the computer itself. By pretending to be a system administrator, a new collaborator or a potential client, they use the phone, e-mail or fax to ask for specific technical details such as a password, modem telephone numbers for access from outside, programmes used or network configurations. These techniques exploit the good faith of the user, just like in other all too frequent cases of fraud in our society. Computer piracy operates through the human psyche too! |