The majority of these people create their own tools and sometimes use existing software with a few custom changes to suite their needs. Recently, I was reading a great title from Steven Branigan named High-tech Crimes Revealed. The author does a great job of placing you in his shoes, explaining in great detail how he managed to help the CIA and FBI uncover some big news stories on hackers. In his book, he clearly mentions how hackers go about obtaining information about their targets, creating maps of all possible checkpoints.
When you read books like these, suddenly you've had hundreds of similar type questions answered, but also have new ones popping up.
I guess the most important thing to remember is that everything is possible using the right tools and having the appropriate level of knowledge!
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Chris Partsenidis
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic ... Continue Reading
SFP ports enable Gigabit switches to connect to a wide variety of fiber and Ethernet cables in order to extend switching functionality throughout the... Continue Reading
A MAC address and an IP address each identify network devices, but they do the job at different levels. Explore the differences between the two and ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.