how hacker attacks in internet

Posted on 2005-04-02
Medium Priority
Last Modified: 2010-04-22
          I read at many online documents that in an Internet environment an hacker can attack on user data and thus may lead to steal info in packets or modify it and resend to original destined server. But i reuire that info in diagramaic form and also some practical examples in real world. where to find them?
         What exactly i want to know is that we know hacker attacks but we also know that data travels in internet from routers to routers   then if from src pc to router1 to no. of routers to dst pc is path for data is then where can hacker be located here.
Question by:b123coder
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 51

Expert Comment

ID: 13689250
what you're describing is a MITM - man-in-the-middle attack
it can be anywhere in the middle between source and destination, hence the name: someone on a server or router or even just plugging to the wire

You're safe (in terms of current technology) against this when you use encrypted protocols, like HTTPS/SSL/TLS.
But you're still vulnerable to infinite number of other attacks ...

Author Comment

ID: 13690345
hello ahoffmann,
               So that mean say traffic is from organisation 1 to organisation2 and in that pc1 is in organisation and pc2 is in organisations 2 then when data sent from pc1 to pc2 then it will travel thro' many routers to reah pc2. then where can be MIM be placed himself?
               I think there is no control if no sorce routing is used for how data travels from pc1 to pc2 right??
                 Also can you please tell me besides having SSL/TLS why still attacks are there?
LVL 51

Accepted Solution

ahoffmann earned 400 total points
ID: 13690986
> then where can be MIM be placed himself?
not shure what you mean, but MITM can be anywhere, including source (pc1) and destination (pc2), for example 'cause there is some malware (aka virii, trojans, etc.)

> ..  there is no control if no sorce routing  ..
but even with source routing you usually have no control over the routers, nor the wire (someone plugs to the wire directly)

> .. why still attacks are there?
- any kind of malware on source and/or destination (see above)
- spoofed source or destination
- proxies
- if source or destination is a web server and/or application server:
   cross-site scripting, SQL injection, command injection, session hijacking/fixation/riding, second order code attacks, etc. etc.
Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.


Author Comment

ID: 13699183

what are the aviail solutions to man in middle attack? are they all protecting against MIMA?? if not then what current development is going on ?
LVL 51

Expert Comment

ID: 13701784
MITM is permanent threat, and you never get solutions for threats, that's their nature ;-)
you just can check if you're vulnerable for those attacks, and the solution then is encryption and strong permisions for physical acces to your devices, no development necessary

Expert Comment

by:David Piniella
ID: 13754510
aside from encryption and secure physical access, good and secure authentication of what servers you're connecting to is also a must -- SSL, ssh hashes to verify that the host you're ssh'ing into is the one it says it is, et cetera, but as ahoffman says, there's nothing that you can really do to make the threat go away.

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Fine Tune your automatic Updates for Ubuntu / Debian
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question