Adversaries and Ports

Submitted by: Submitted by

Views: 10

Words: 4538

Pages: 19

Category: Business and Industry

Date Submitted: 05/06/2016 07:04 PM

Report This Essay

5/4/2015

Adversaries and Ports

IT-520

Contents

Abstract 2

Introduction 3

What is Hacking 4

Modus Operandi of Hackers 4

Common Hacker Ports 8

Port Scanning 8

IP Address Vulnerability 11

How can Hackers Target and Hack your Site 12

Defending Against Port Scans 8

Abstract

A weakness, which an adversary could take advantage of, in any network are the ports which connect the network to the outside world. These ports, or the tools behind them, may have weaknesses or vulnerabilities which render them able to be hacked. This paper will discuss how hackers think, what they look for, and what ports are commonly used.

Introduction

What is hacking? What are ports? What are adversaries and what are common ways that someone may try to break into your computer, server, or network? This paper will discuss all of these with a specific focus revolving around ports. There are many famous hacking cases, be it Jonathan James/ c0mrade, Kevin Mitnick, Albert Gonzalez, Gary McKinnon or Kevin Poulsen. Not matter who they were in order to initiate a hack they had be able to connect to the network from their own computer. That connection was made through ports and these adversaries were able to find the required information from their victims and use it against them for their own personal gain.

Finding of an audit of 20 subcontractors used by large banks: “A hundred percent (100%) of third parties showed signs of compromise or indicators of threats. Our global cyber landscape is a scary place” – Joy Gumz. If we are to move forward as a person, a business, and a country, we need to be fully aware of our vulnerabilities and take the best precautions that we can to address them. While no system is truly safe as long as it is connected to the internet with open ports, we can reduce the vulnerabilities which our computers, servers, and networks have.

Now after studying the landscape of the modus operandi of hackers, and viewing their often used...