TOP Port Attack
Then, Proeds lodges itself vie the web
incerface of the printer. Now, i
supervises the network traffic and picks
up the NTLM hashes and other access
data, through which the attacker finally
gots the access to the individual PCs,
Praed!
the hacker's PC and stores a log file
there by the name af . It
contains the info stolen vie the printer.
‘The defence: Change the standard
password given by the manufacturer of
the print
‘creates a new falder n
i
i
é
f
or and work with limited userEmulator: Mobile Phone
Hacks The PC
“Can | charge my smartphon
With this simple request @ hacker can
heck into your computer while you sre
sitting in front of i. All that the hacker
needs is an Android smartphone with @
usb cable.
‘The attack: Antivirus programmes and
Windows oversee the USB ports
sage as coon as a
memory stick is sttached there.
‘That's for a good reason, since USB
flash drives can contain dangerous
malware. Wf you plug in @ USB
keyboard, there is no security check
{25 the keyboards do not smuggle in
malware,
The hacker makes use of these
tacts. He instals an Emulator app in
‘and shaw @
@ wortamags
The Site rch ek Pramte
eae am pars sagan! be
his emarephone that makes Windows
believe that the equipment attached is
‘not @ phone, but @ keyboard. The
‘application now autor
ccontral cammand to the computor that
‘can open a hidden Internet connection
(Backdoor for the hacker, through
which he can corry out further hacks.
ut it gets even nastier. If the hacker
‘app gets in your smartphone without
your knowiedge, it hacks your PC as
‘Soon as you charge the phone through @
USB cable.
The defence: Microsoft and sofware
manufactures ere feveriehty searching
for @ solution even right now. Unt# one
| found, there is just one solution - Turn
down the friend's request. If your own,
2d, i holps you
‘synchronize i just via the network
tically sends @
phone ie contamin
Thorn Ure py als
es ae wary
Puppy Linux: Evade
Passwords
leis easiest forthe necker ihe finds
your computer unguarded. & Liu Ue
(0 is sufficient to eancel password
protection in Windows
“The attack: In order to porform the
attack as quickly as possible and
without leaving @ trace, the hacker
reeds @ quick bosting Linux tr runs in
the RAM end hence does not leave
behind say traces. The Puppy
Ostribution offers exect these
features (puppynux org). At first, the
sttacter has to dowrioad an 160 fe
that s just 127 MB and burn ito @ CO.
‘As s00n as the airs clean, ne boots
Your PC with this CD. He mey have to
fet the DVD ROM as in 8108 for thes.
When the Min Linu i running, the
ip magn € may 11 051»> Feature
hacker mounts the hard disk vie