Reveament the hacker's entry!

zhaozj2021-02-16  85

The hacker's topic mysterious hacker empire, the hacker of the cold, the hacker, with agile skills, and the gods went through the gray and dreaming network society. In the dark atmosphere, black, sunglasses with a few sentences, a few sentences, and a sound ... Hacker Very Cool's cold surface image is described. Is the hacker in reality? Many people have broken the hackers who have broken a certain site in the news media, often hoping that they can also control the network world and become the online character. In fact, in English, "Hacker" is the initial meaning refers to a class of computer masters. These people have hobbies that like to study system vulnerabilities. They don't invade others; and people who really invade others are called "CRACKER". In fact, there is nothing wrong with the "hacker" of the website. It is really powerful to find the "hacker" that finds the system vulnerability. This seems that people who will use the game secrets are not very powerful. It is really very good. It is really sincerely, finding the game hidden secrets. However, for those who have never touched the game, he does not have the difference between "use secret techniques" and "finding the secret technique". As long as someone will break it, I feel very powerful, and this is most People who don't know the difference between "hackers" and "geek", they will think that both are masters. These so-called hackers that can invade, really don't imagine such a "magic", don't be deceived by movie's plots! However, since everyone has already "black, blame", then we call them a hacker! Hacker conditions maybe you think that hackers must have a profound, skilled computer network knowledge, in fact, if you just want to be a hacker who can invade the system, I think as long as you have the ability to read English and the basic operating system. In addition, it is enough to add the pattability that the mosquito bitter is bite. Understand English, because of the network security on most websites, the information of the system vulnerability is almost all English; the patience is because it is possible to attack the website to attack the website in 1998. Simulation invading! When the night came, the hacker who only revealed two eyes finally started, press the mouse ... OK! We will explain the basic principles of hackers in this example. In this example, we will assume that if I want to invade a http://www.game119.com (Note: The site is existing, purely coincidence) Website, how should I start? Here, we have three steps to act. The first step: Character, how to use the Operating system of the Game119 website: know each other and know each other! Before invading a website, we must first know which operating system used by the opponent. Some to make our hit rate, if you use the cannon to play a mosquito, it is absolutely not as good as you smoothed with a mosquito fragrant ... The same if you use the equipment, how to choose What are your weapons you use? Judging which operating system of the other party's website can use a network on a network to provide us and determine the operating system's website: http://www.netcraft.com/cgi-bin/survey/whats, as shown in Figure 1. Suppose I know http://www.game119.com from the Netcraft website, using the Solaris's UNIX operating system, the web server is apache / 1.2b4.

Step 2: Finding the vulnerability of the known operating system probably only some of the hackers can be found from nothing, self-reliance discovering the system vulnerability; and the hacker of most intrusion systems is through "secret technology Breaking off, it is to find the vulnerability information of the relevant operating system to invade the website. What we introduce here is the latter method. Through the first step, the operating system used by the GAME119 website is known. This step is naturally to go to the relevant website to check the vulnerability of the operating system. There are many websites on system vulnerabilities on the network. You may have seen it, such as http://www.anticode.com/, this site has many information about operating system vulnerabilities. In the first step by Netcraft website "Http:// www. Game119.com", which is using the Solaris operating system, so I want to invade it, and the focus is of course the top of the various vulnerabilities on Solaris in Figure 2. Step 3: Try the found vulnerability by one by one until the invasion is shown in Figure 3, the operating system is developed all the way, and the version is numerous. Of course, the different system vulnerabilities are gradually tired, and you can see the Solaris of Light 2.4. There is a lot in "http://www.anticode.com/" website. OK! Now I know that Game119 is the type of operating system, and I understand what weaknesses have the system. What are we waiting for? I still don't hurry to try the vulnerability information to "http: // www. Game119.com" this virtual website. This is the beginning of our long simulation, and omitted a few boring intrusion data about 200,000 words) ......

Of course, you will ask which vulnerabilities can invade success, the answer is: "How do I know", I have called to greet, hacker needs to resist. More, you will find hard for a few days, still can't invade, the reason is that the network management is not vegetarian, you know that the system has a vulnerability, he certainly knows, so he will be in your invasion. Try the vulnerability! The invasion between the hacker and the network management, who will win the final victory, the key is to see who is more effort, no network management can guarantee that his system is definitely no problem, it can only be constantly known vulnerability I have made up, of course, if I add a tool for the firewall, it can also defend a while. Back to this theme about the simulation invasion, I mentioned that hackers didn't need too much deep skill. As listed in Figure 3, the vulnerabilities listed in the first chkperm.txt listed below, you read the following narrative, Will you feel very difficult? Of course, you must have the ability to use the basic operating system, which includes some common commands of UNIX, the most important thing, you have to know how to compile the C program under the UNIX system. You can find out in Figure 3, in fact, there are many vulnerabilities attached to a program that extension .c. Of course, if you can read what is written in the program, it is very helpful for understanding the invasion, but for the specific content of the invasion, you can compile these programs into executable files. Here, I will do it. Is there a lot of hackers in the realistic hacker in the movie? Of course, we have never advocated to take the initiative to be a "geek" in invading someone else's website or "harass", but should be a good "hacker" looking for system vulnerabilities. However, don't sigh the heroes, there will often be a "invading Grand Prix" on the Internet, so that you will not only have hackers, but also have a bonus, go to try your "black" martial art bar. .

转载请注明原文地址:https://www.9cbs.com/read-13672.html

New Post(0)