this blog is an interesting tips and tricks site: http://tipstrickshack.blogspot.com/ (also explains hackers terminology a bit)
The author describes several hacks on vulnerabilities within wordpress 3.51 (today latest is 3.8).
So if you never upgrade your software (wordpress) then it will get hacked
that is how it is, one always needs to be aware of their software updates, where if a vulnerable software will get hacked if not updated.
attacks will come in all types and methods, some will be standard – and some turbo charged.
The reason a new vulnerability is such a big deal, is that any little problem vulnerability can cause a hacker to get a small connection with your systems. And unfortunately any small connection can led to larger ones, and pretty soon it is a tidal wave, or “turbo charged” and then soon enough you are on the headlines.
Denial of Service(DoS) attacks can seem innocuous, as the attack may just slow you down, or make you reboot, which is inconvenient, but not deadly.
But the problem is DoS attacks are a feint or are set to overload the system so a different attack can occur. And then the real attacks occur, we test attacks in our closed environments to review these items for ourselves.
this is a classic attack – actually Kevin Mitnick the famous hacker who got caught and the attack outlined on mcmaster.ca
Hydra, w3af, Scapy are all good as well.
We can create our own scans using scapy – as we can create our own scan reviews depending on the environment that we need to look at.
to make this work – one really needs to understand the tcp networking from rfc793
contact us to learn more…
Penetration testing are several acts on various computers and systems.
First in “recon” one checks the public profile of the company.
Use scan tools, nmap, hping, scapy, burp suite, and others to check the target computers out. (this is the Alpha scan)
Then one can use a few pre-built tools to review vulnerabilities like Nessus, maltegoo, Metasploit or Armitage(a good GUI to Metasploit), OWASP and Tshark/Wireshark are also good tools to review what is going on in the network. (Sigma scan)
Each tool can be used to further your knowledge of the network, or to find out more about how to investigate/exploit the systems.
Little by little a dossier is created with more and more information compiled.
Then at some point the pentester may also use some Social engineering. (custom scan – Omega scan)
Here is where the custom portion of a pentest occurs.
Incidentally the process of pentest “almost” mirrors the hackers methods.
There are some good tools on the Internet (free)
Like this one: http://www.yougetsignal.com/tools/open-ports/
This is just a basic port scan (likely tcp open check)
unfortunately a hacker will use multiple scans and some of the different flags a packet can have. There are 2^8 ports and 6 different flags for packets (SYN/ACK/RST/FIN/URG/PSH)
A good place for the information is rfc 793.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
| Source Port | Destination Port |
| Sequence Number |
| Acknowledgment Number |
| Data | |U|A|P|R|S|F| |
| Offset| Reserved |R|C|S|S|Y|I| Window |
| | |G|K|H|T|N|N| |
| Checksum | Urgent Pointer |
| Options | Padding |
| data |
TCP Header Format
There are also udp scans for the udp programs (like DNS and others)
while you are working and living your life, hackers are trying to get through your devices nonstop and the reason is:
while you are sleeping, China and others in Asia are probing.
Also in early morning east European hackers are attacking.
And of course in the US we have many hackers here as well.
Attacks are coming – nonstop.
Scan your systems and we will create reports