
Like the scam artist, a hacker often uses similar techniques. However, they are simply trying to trick you into providing sensitive information-information that they really have no business knowing. Now, this sounds innocent enough, and there are probably many that fall for this tactic. We need to get the model of your copier for our service records. Here is one such attempt that we get regularly: Straying far from ethical standards of sales technique, such vendors will attempt to trick you into giving them information so they can put your company's name on a mailing list. An inimical form of sales takes the form of thinly disguised telemarketing. One example of social engineering that information technology managers face on a weekly basis is solicitation from vendors. Whether it be haggling for a lower price on a lawn mower at a garage sale, or convincing your spouse you really need that new toy or outfit, you are manipulating the "target." Although your motives might be benign, you are guilty of socially engineering the other party. In fact, many people use this type of trickery every day, both criminally and professionally. Social engineering is not unique to hacking. In fact, this common misunderstanding is one of the hackers' greatest assets. However, because most people have a false stereotype of hackers, they fail to realize that the person they are chatting with or talking to on the phone might in fact be a hacker in disguise. A real hacker must also rely on physical and interpersonal skills such as social engineering and other "wet work" that involves human interaction. In fact, if all you can do is point and click, you are a script kiddie, not a hacker. However, although computer skill is central to a hacker's profession, there are many additional facets that he must master. This mirage might be set off by other imagined features, such as dusty stacks of Dungeons and Dragons lore from the 1980s, empty Jolt Cola cans, and Japanese techno music streaming from the Net. The stereotyped image conjured up by most people when they hear the term "hacker" is that of a pallid, atrophied recluse cloistered in a dank bedroom, whose spotted complexion is revealed only by the unearthly glare of a Linux box used for port scanning with Perl. Therefore, this chapter will review hacking techniques from a generic perspective. When viewed holistically, your wireless network is just another potential hole for a hacker. Each of these attacks can take multiple forms, and many can be targeted against both wired and wireless networks. The following techniques are not specific to wireless networks. Expert users will want to skip ahead to the next chapter (Chapter 7, "Wireless Attacks") and go straight for the goodies. This chapter, which will be a review for advanced users, will introduce the main types of hacker attacks. Therefore, as a security consultant or network administrator, you should be well versed in these occult techniques in order to thwart them. It is more likely that the attacker will need several techniques used in combination to bypass the many layers of protection standing between them and root administrative access.

#Mac atm network wikipedia full#
It is rare that a hacker can get online or dial up on a remote computer and use only one method to gain full access. A typical hacker attack is not a simple, one-step procedure.
