Preview

Cyber Crime How and Why Hackers Attacks Systems

Powerful Essays
Open Document
Open Document
1647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime How and Why Hackers Attacks Systems
IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959
International Research Journal of Management Science & Technology http:www.irjmst.com Page 243
Cyber crime How and Why Hackers attacks Systems - IRJMST
By Jagmender Singh
How and Why Attackers Use Proxies
Masking one 's IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity, thereby frustrating law enforcement efforts to identify the original location of the person(s) involved. A proxy allows actors to send network traffic through another computer, which satisfies requests and returns the result. Students or employees can use proxies to communicate with blocked services such as Internet Relay Chat (IRC) and instant messaging, or to browse websites that administrators block. Attackers also use proxies because Internet Protocol (IP) addresses are traceable, and they do not want to reveal their true locations. As one example, iDefense wrote about the fast-flux architecture (ID# 484463), which uses a proxy infrastructure to satisfy requests. Proxies are also a common source of spam e-mail messages, which use open relays (a simple mail transfer protocol [SMTP] proxy).
Proxies are useful to attackers in many ways. Most attackers use proxies to hide their IP address and, therefore, their true physical location. In this way, attackers can conduct fraudulent financial transactions, launch attacks, or perform other actions with little risk. While law enforcement can visit a physical location identified by an IP address, attackers that use one (or multiple) proxies across country boundaries are more difficult to locate
IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959
International Research Journal of Management Science & Technology http:www.irjmst.com Page 244
(see Exhibit 2-1). The endpoint can only view the last proxy with which it is directly communicating and not any of the intermediary proxies or the original location.



References: Varun Tiwari “CRYPTOGRAPHY IN DATABASES”,2011, www.IRJMST.com Julius Plenz, "DNStunnel.de," 2006, http://dnstunnel.de. Phrack, "Phrack Issues," n.d., http://www.phrack.com/issues.html?issue=49&id=6. Daniel Stødle, "Ping Tunnel," 2009, http://www.cs.uit.no/~daniels/PingTunnel/. IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959 International Research Journal of Management Science & Technology http:www.irjmst.com Page 250 Thomer Gil, "ICMPTX (IP-over-ICMP) Howto," 2009, http://thomer.com/icmptx/. Antd, "Simple ICMP Tunnel," SourceForge, 2005, http://sourceforge.net/projects/itun/.

You May Also Find These Documents Helpful

Related Topics