Knowledge and background on hacktivists and hacktivist

Assignment Help Basic Computer Science
Reference no: EM131578906

Hacktivist

Hacktivists have roots in the hacker's culture. It is an up and coming movement where bad-actors use hacking as a method to promote a group's political agenda. The term originated in a forum called "The Cult of the Dead Cow". Hacktivist as the root of hacktivist can also border on acts of cyber terrorism for the effect of social change. Many hacktivist groups exist, however, one of the more well-known hacktivist groups is the group known as "Anonymous."

Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.

Sandy was a friend of Jamie's from Dr. Wang's security lab course and was always a heavy advocate for different social causes around campus. He seemed to always be angry about something. He was secretly taking the course for two reasons: to learn different hacking and exploitation methods and to recruit other students during class for his cause. Sandy learned the exploitation techniques and methods very quickly. He gathered other students in the class that shared his beliefs and were quick studies as well. He and students that he had recruited often met directly after class on campus. Sandy was essentially starting his own hacktivist organization and encampment right there on campus.

He was always in tune with the latest social and local news of the day. He personally did not like the increase in reports of police brutality across the nation. Sandy did not like any of the potential 2016 presidential candidates, and he did not like how refugees were being treated in different nations and places abroad. Sandy organized the best and the brightest hackers that he could, and they happened to be from Dr. Wang's class. Sandy used the threat model and operandi of the well-known hacktivist group known as "Anonymous." Therefore, he named his first hacking operation "OpRefNation." He targeted different nations' embassies and department offices that handled refugee crises overseas. Sandy was able to Google and social engineer various IPs from the different embassies located inside of the United States. He started his various recon efforts to determine their operating systems and servers. Sandy and his team were soon ready to make their first strike.

"OpRefNation," was soon on its way to full execution. He loaded the IPs into the Metasploit and Armitage penetration testing tools and launched a very orchestrated Denial of Service attack which is also known as a DDOS attack against the targeted IPs. Metasploit and Armitage had embedded system tools such as "Nessus" and "nmap" to scan various systems to determine the victims' operating systems, IP networks and user directories.

The reconnaissance assisted the new hacktivist team in determining whether any types of vulnerabilities could be exploited by known zero-day exploits. One of the vulnerabilities allowed Sandy and his team to conduct a long DDOS campaign by SYN Flood attack. The SYN flood attack is usually conducted during the network connection of various network systems. It's the initial handshake process for synching the network packets for communication across the LAN.

Soon the embassy was inundated. Its network servers were not able to handle all of the packets coming in and crashed all of the embassy's system servers. "OpRefNation" was a success! Sandy and his team immediately announced the attack so that their hacktivist group could immediately take credit for the successful DDOS attack.

Case Study IV Questions:

1. How did Sandy gain his cyber hacking skills?

2. What is a hacktivist?

3. What type of tools did Sandy and his team use to carry out the attack?

4. What type of attack was conducted?

5. How does this particular attack work?

6. What were some of the social issues that attributed to Sandy's hacktivist motivation in the first place?

Note: APA format

Reference no: EM131578906

Questions Cloud

What businesses should do to mitigate or minimize risks : Describe the challenges businesses have in securing data in today's technological environment and what businesses should do to mitigate or minimize risks?
Create a function to read in all the names : Create a function to read in all the names. Create a function to do the sort (modify the bubble sort discussed in class and in the text book).
Problem related to the question quiz : What is the variance in the number of right answers for someone who knows 80% of the material on which a 25 question quiz is based?
Discuss fueling law enforcement misconduct : What role does the police/corrections subculture play in fueling law enforcement misconduct. Defend your position
Knowledge and background on hacktivists and hacktivist : Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.
Analyze the correlation between family structure and crime : Analyze the correlation between family structure and crime. Share your findings and develop a proposal for necessary policy reform
What are social and behavioral and cultural determinants : What are social, behavioral, and cultural determinants? How do social, behavioral, and cultural determinants impact public health?
Compute the variance for the number of right answers : Estimate the probability that a person who knows 60% of the material gets a grade strictly between 50 and 70 in the test of Exercise.
Discuss a website that utilizes json : A website that utilizes JSON. Review the website source, and evaluate how the author created the pages - Identify what you liked or did not like

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the final temperature and the boundary work

Determine the final temperature and the boundary work during this process.

  Finding project schedule if critical path is identified

Describe in scholarly detail how you find out a project schedule once critical path has been identified.

  Problem regarding the middle frequency

The resulting output from the modulation process is known as the middle frequency (MF) signal. True or false?

  Analyze the events of the hacked twitter account

Analyze the events of the hacked Twitter account. Explain the organizational impact of not having strong policies and procedures for securing applications and data.

  Describe an actuator that could accept an electrical input

Each of the variables listed in Problem 1.7 can be brought under feedback control. Describe an actuator that could accept an electrical input and be used to control the variables listed. Give the units of the actuator output signal.

  Describe one real or future (even imaginary) iot

Describe one real or future (even imaginary) IoT (or CPS - Cyber Physical System) usecase. Provide details on the system(s) requirements from user(s)/actor(s) perspective.

  Describe any boundary conditions

Note that the intersection of two lists is a new list containing the elements that the two list have in common, without modifying the two original lists. Describe any boundary conditions that might exist.

  At what times would the group level description be helpful

At what times would the group level description be helpful? At what times would the individual level description be helpful?

  Forms for a new software application or business

Design two forms for a new software application or business web app that will collect data from its user. All you have to design is the format for two text entry pages (4 to 6 data elements each).

  Large number of networks

The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available on line.

  Create and identify the radii of the sheet metal elbow

Then dimension the 90° angle and add the notes. Before you create the leaders, open the Multi leader Style Manager and change the arrowheads to dots. Add the text as shown, and save the drawing as elbow1.dwg.

  How many different arrangements are possible

Biology A biologist needs to determine the number of possible arrangements of 4 kinds of molecules in a chain. If the chain contains 8 molecules with 2 of each kind, how many different arrangements are possible?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd