Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 164

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 167

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 170

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 173

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 176

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 178

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 180

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 202

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 206

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 224

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 225

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 227

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 56

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 49
Security Knowledge | Certified Ethical Hackers Security Analyst Malware Hacking Information | Page 2
Currently viewing the category: "Security Knowledge"

In recent years the certified ethical hacker program has taken off and grown in popularity. I have been a certified ethical hacker for about 5 years now and I have had many people ask me exactly what it means to be “ethical” in hacking. Previously before joining the good guys side and “ethical” side of hacking I conducted penetration tests and DDoS testing for many private companies, mostly hosting and shell providers. The difference then and now is how I conduct myself and the methods that I use to make sure I am not violating anyones privacy or stepping into the illegal or gray areas of the law.

One of my concerns in the security world today is the never ending and virtually unstoppable problem of DDoS attacks. For instance there is no real way that an “ETHICAL” hacker can conduct a true and powerful DDoS test against a network. Yes, I know there are many companies out there that claim they can simulate a DDoS attack but rest assured they cannot test for a true real world “in the wild” DDoS attack. For one thing they don’t have access to the 0day DDoS tools that are used on the underground and secondly they simply cannot afford to purchase enough bandwidth to launch a massive DDoS attack. Such attacks in the real world from groups like Anonymous use literally thousands of high bandwidth *nix network servers from around the world and may have as many as a hundred thousand windows based slower connection trojaned computers, mostly which traverse firewalls and connect clients to IRC channels as to avoid leaving traces on the victims computer.

These real world DDoS attacks could potentially generate as much as a petabyte a second of bandwidth at a target or the uplink which will knock any connection offline. An old friend of mine “mafiaboy” tried to prove his point to the world that we need to do something about this problem and that DDoS attacks are unstoppable when he took down eBay, Amazon and VISA at the same time costing millions of dollars in damage and eventually putting him in jail.

So the real question and point of this post is, how to we as security experts, administrators, consultants, workers, etc approach DDoS protection when we cannot legally have our servers tested against a large scale attack? I know unethically I could go and root a thousand servers and test a DDoS attack using their bandwidth but that is not ethical and now as an adult I see that it is completely wrong and misguided.

Please let me know your thoughts and opinions on the matter…

 

There are many types of firewall security solutions offered, many popular types of firewalls include application level, packet filtering, stateful firewalls, appliance-based network firewall for enterprise-level network security and simple software firewalls such as the Windows Firewall that is built into modern Microsoft Operating Systems.

Some of the most popular vendors of firewall technologies and solutions include Check Point, Barracuda and Cisco. Check Point distributes both personal and network level firewall products. Check Point is the creator of Zone Alarm which is a very simple and affordable solution for home PC users as it only costs around $40 a year for two licenses. Check Point also has enterprise firewall solutions such as the 61000 security system which can support 1 Terabyte of firewall throughput and 600,000 sessions per second which puts it in a league of its own. Cisco has hardware based firewall solutions such as their IOS and ASA security solutions. Barracuda offers a next generation firewall solution such as the NG model which provides VPN, NAC, Traffic Management and IPS services all rolled into one.

The obvious disadvantages to the network based higher level hardware firewalls is that they can be extremely expensive, such as the Barracuda NG F900 which retails for around $50,000. This makes it very hard for small businesses to have state of the art security technologies.

For home users and small businesses concerned about having a good firewall solution I would recommend a virtually free solution, install Linux on a PC or server and utilize IPTABLES and proxy software which is completely free and run your network behind it. For enterprise solutions the Barracuda NG F900 is top of the line as far as I’m concerned and you can’t go wrong with such a solution.

Set your Twitter account name in your settings to use the TwitterBar Section.