Hackers Trade Tips On DDoS, SQL Injection

  /     /     /  
Publicated : 22/11/2024   Category : security


Hackers Trade Tips On DDoS, SQL Injection


Study of hacker bulletin boards reveals focus on attack techniques, tips for beginning hackers, buying and selling of fake social network endorsements.



What do hackers talk about amongst themselves?
These days, the two hottest topics -- comprising 19% of all discussions -- involve
distributed denial of service (DDoS) attacks
and
SQL injection attacks
.
Those findings come via a new
report
released by data security firm Imperva, which reviewed the chatter on 18 underground forums -- including one with 250,000 members -- to see what participants discussed. Beyond DDoS and SQL injection, the other top topics, based on a keyword analysis, were shell code (16% of all discussions), spam (14%), cross-site scripting (12%), and brute-force techniques (11%).
[ What do we know about the U.S. bank hackers? Read
Who Is Hacking U.S. Banks? 8 Facts
. ]
Imperva also found that the majority of forum threads were devoted to beginner hacking, hacking tools and programs, and website and forum hacking. Other information security topics, such as wireless hacking and cryptography, were also discussed, but with much less frequency.
Beyond tutorials and education, hacking forums also serve as a place for people to buy and sell their goods or services. The pages are filled not only with job offers, but with advertisements for paid services, buy/sell, ads, and trading goods, read the Imperva report. Goods in the cyber world can be anything from Facebook likes, hacking tools, and e-books to botnets and pornographic material. Some simple tools are shared for free, just to increase the status of the developer. Transactions are usually made in ways that allow anonymity, like Bitcoins, Liberty Reserve, or even PayPal.
One area of increasing interest on hacking forums involves so-called e-whoring attacks. E-whoring, according to the Imperva report, is a practice of selling pornographic content, while pretending to be the person, usually girl, photographed. The report continued, It is considered a form of social engineering, when the victim is misled to believe he is interacting with a girl who is sending him nude photos and video clips of herself. To facilitate such attacks, hackers -- or more precisely, social engineers -- actively share, if not buy and sell, e-whoring packages, which typically include photographs and videos. An attacker then lurks in adult chat rooms, using the photos and videos to pretend to be the pictured woman, to try and lure buyers into paying to see more racy material.
While these types of social-engineering ruses may be popular, some of the most devastating exploits being launched today involve DDoS attacks, aided in part by a number of
free but effective DDoS tools
. DDoS attacks involve flooding a network with fake packets, to make it effectively unreachable. Such attacks have recently been used to disrupt the websites of
major U.S. banks
.
The most common type of hack attack seen these days, however, involves
SQL injection
. Attackers --
including hacktivists
-- favor SQL injection attacks because they allow attackers to inject their own commands into databases. When databases arent configured to properly screen inputs for signs of attack, attackers have an easy-to-use, remote technique for obtaining any information stored by the database.
According to Imperva, SQL injection attacks are the most common type of attack launched against websites -- and more often than not are the favored attack type for stealing sensitive data. For example, numerous security experts suspect that SQL injection attacks were used in the
online attack against South Carolina state systems
announced Friday by state officials. All told, the breach involved the social security numbers of some 3.6 million state residents, as well as 387,000 credit and debit card numbers. Unfortunately, the social security numbers, along with about 16,000 card numbers, werent
stored in encrypted format
.
Attackers are increasingly using a simple method for finding flaws in websites and applications: They Google them. Using Google code search, hackers can identify crucial vulnerabilities in application code strings, providing the entry point they need to break through application security. In our report,
Using Google To Find Vulnerabilities In Your IT Environment
, we outline methods for using search engines such as Google and Bing to identify vulnerabilities in your applications, systems and services--and to fix them before they can be exploited. (Free registration required.)

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Hackers Trade Tips On DDoS, SQL Injection