Sunday, November 13, 2011

Hacking Large Companies

We see all these stories on the news of hacker teams going around hacking, and sometimes ruining these large companies. So then we have to ask ourselves, how do people go about hacking suck "secure" systems?

Well, first we have to understand things like this dont happen over night. It takes planning, sometimes months in planning.

First what they do is find out what the server is running. This can usually be done with a simple Nmap scan.

Next, the hackers create their own environment that is an exact replicate of the server they are planning to attack.

They then search for exploits, which takes quite some work. Now I'm not talking about public exploits that you find on the exploit-db im talking private exploits that are created by the hackers

Once this is complete they initiated the attack and all hell breaks loose.

This post was really because I've been getting a lot of questions lately about how this happens so I just thought I would post the process. This is also the VERY Basics of what happens behind the scense just so you get a general idea.

No comments:

Post a Comment