23.1 System Hacking
Overview
Figure 23-1 Basic Concept for
System Hacking
The operating system manages
various system resources. Let's take a look at the system operation from the
point of view of an application. An operating system (Windows in this case)
records the configuration information on a virtual device called the “Registry”
when an application is installed or is running. This information is used as important
data to determine operation when the operating system first starts. When an
application is working, the operating system loads key data from the hard disk
to memory. The data required for the CPU to operate is stored in the internal
registers in the CPU, and applications are executed in the form of processes
that are internally divided into threads. The data used by a process is stored
in a certain area in memory, and the memory is divided into a stack, heap, and
code area according to the corresponding characteristics.
System hacking exploits the
specific operating characteristics of the operating system on which the
applications are running. The first step involves installing a hacking program
inside the system. It is not easy to install a hacking program through normal
routes, and the most commonly used method involves inducing a file to be
downloaded from a web site or a torrent. When video files and music files are
downloaded and opened, a hacking program can be installed on the system without
notice. If the infected user is the administrator for a PC operating as a main
system inside of a firewall, a serious situation can result.
A buffer overflow attack,
which will be described later, can be examined to easily understand how to
plant hacking code inside of Word documents, videos, music, and image files.
First, find vulnerabilities in the application code. If you make a program
execute the stored code in unintended memory areas, you can easily install a
backdoor or registry search program.
The hacking code that is
installed can operate as a backdoor that transmits user information to the
hacker. It can also search registry key information or can change values and
cause problems in the system. Furthermore, it can be used as a means to acquire
the financial information of the user.
Most known attacks can be
blocked by installing system patches and anti-virus programs. However, it is
sometimes necessary to also prevent new types of attacks. Hacking technology
continually evolves, and although vaccines and defense technologies have been
developd for operating systems, the spear is always one step ahead of the
shield, and a variety of hacking attacks are still prevalent on the Internet.
No comments:
Post a Comment