Knowledge and background on hacktivists and hacktivist

Assignment Help Basic Computer Science
Reference no: EM131578906

Hacktivist

Hacktivists have roots in the hacker's culture. It is an up and coming movement where bad-actors use hacking as a method to promote a group's political agenda. The term originated in a forum called "The Cult of the Dead Cow". Hacktivist as the root of hacktivist can also border on acts of cyber terrorism for the effect of social change. Many hacktivist groups exist, however, one of the more well-known hacktivist groups is the group known as "Anonymous."

Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.

Sandy was a friend of Jamie's from Dr. Wang's security lab course and was always a heavy advocate for different social causes around campus. He seemed to always be angry about something. He was secretly taking the course for two reasons: to learn different hacking and exploitation methods and to recruit other students during class for his cause. Sandy learned the exploitation techniques and methods very quickly. He gathered other students in the class that shared his beliefs and were quick studies as well. He and students that he had recruited often met directly after class on campus. Sandy was essentially starting his own hacktivist organization and encampment right there on campus.

He was always in tune with the latest social and local news of the day. He personally did not like the increase in reports of police brutality across the nation. Sandy did not like any of the potential 2016 presidential candidates, and he did not like how refugees were being treated in different nations and places abroad. Sandy organized the best and the brightest hackers that he could, and they happened to be from Dr. Wang's class. Sandy used the threat model and operandi of the well-known hacktivist group known as "Anonymous." Therefore, he named his first hacking operation "OpRefNation." He targeted different nations' embassies and department offices that handled refugee crises overseas. Sandy was able to Google and social engineer various IPs from the different embassies located inside of the United States. He started his various recon efforts to determine their operating systems and servers. Sandy and his team were soon ready to make their first strike.

"OpRefNation," was soon on its way to full execution. He loaded the IPs into the Metasploit and Armitage penetration testing tools and launched a very orchestrated Denial of Service attack which is also known as a DDOS attack against the targeted IPs. Metasploit and Armitage had embedded system tools such as "Nessus" and "nmap" to scan various systems to determine the victims' operating systems, IP networks and user directories.

The reconnaissance assisted the new hacktivist team in determining whether any types of vulnerabilities could be exploited by known zero-day exploits. One of the vulnerabilities allowed Sandy and his team to conduct a long DDOS campaign by SYN Flood attack. The SYN flood attack is usually conducted during the network connection of various network systems. It's the initial handshake process for synching the network packets for communication across the LAN.

Soon the embassy was inundated. Its network servers were not able to handle all of the packets coming in and crashed all of the embassy's system servers. "OpRefNation" was a success! Sandy and his team immediately announced the attack so that their hacktivist group could immediately take credit for the successful DDOS attack.

Case Study IV Questions:

1. How did Sandy gain his cyber hacking skills?

2. What is a hacktivist?

3. What type of tools did Sandy and his team use to carry out the attack?

4. What type of attack was conducted?

5. How does this particular attack work?

6. What were some of the social issues that attributed to Sandy's hacktivist motivation in the first place?

Note: APA format

Reference no: EM131578906

Questions Cloud

What businesses should do to mitigate or minimize risks : Describe the challenges businesses have in securing data in today's technological environment and what businesses should do to mitigate or minimize risks?
Create a function to read in all the names : Create a function to read in all the names. Create a function to do the sort (modify the bubble sort discussed in class and in the text book).
Problem related to the question quiz : What is the variance in the number of right answers for someone who knows 80% of the material on which a 25 question quiz is based?
Discuss fueling law enforcement misconduct : What role does the police/corrections subculture play in fueling law enforcement misconduct. Defend your position
Knowledge and background on hacktivists and hacktivist : Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.
Analyze the correlation between family structure and crime : Analyze the correlation between family structure and crime. Share your findings and develop a proposal for necessary policy reform
What are social and behavioral and cultural determinants : What are social, behavioral, and cultural determinants? How do social, behavioral, and cultural determinants impact public health?
Compute the variance for the number of right answers : Estimate the probability that a person who knows 60% of the material gets a grade strictly between 50 and 70 in the test of Exercise.
Discuss a website that utilizes json : A website that utilizes JSON. Review the website source, and evaluate how the author created the pages - Identify what you liked or did not like

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd