Analysis of 9 kinds of attack methods commonly used in hackers

zhaozj2021-02-16  111

Yeskey Many online users may have an inexplicler attitude towards cyber security, think that the most is "hacker" to steal account, they tend to "safe" is only for those large and medium-sized enterprises, and hackers are not complainless Hes, what should I attack myself? In fact, in a virtual network world in which no system, there is no danger and despicable in real life, in such a era, almost everyone is facing a security threat, and it is necessary to network. Safety has aware of understanding, and can handle some security issues, those who usually pay attention to safety, often pay the heavy cost when they are attacked by security, will regret it. Comrades want to remember! Anti-human heart is uncomfortable! In order to reduce the loss to the minimum, we must have a safety concept, and master certain safety precautions, banned hackers without any chance. Let's take a study how hackers find out security vulnerabilities in your computer. Only by understanding their attack methods, we can take accurate countermeasures to deal with these hackers. 1. Get the password, there are three ways: First, the network monitors illegally obtain user passwords, such methods have certain limitations, but the harm is very large, listeners tend to get all user accounts and passwords of their network segments. The security threat to the local area network is huge; second, after knowing the user's account (such as the part of the e-mail @) to use some specialized software forcibly crack the user password, this method is not limited by the network segment, but the hacker has enough patience and Time; third, after obtaining a user password file (this file becomes a shadow file), use the violent crack program to crack the user password, the premise of the method is the hacker's SHADOW file that is a password. This method is harmful in all methods, as it does not need to try to log in again and again, but it can be easily cracked in the local password and the password in the shadow file locally. User password, especially for those who are mentally hi-users (referring to a user account, such as a user account is ZYS, whose password is zys666, 666666, or simply zys, etc.) is more in just two minutes, even It can be done up in dozens of seconds. 2, put the Trojan horse program Trojm horse program can directly invade the user's computer and destroy. It is often disguised into tool programs or games such as entry of the user to open the mail attachment with Trojan programs or download directly from the Internet. Once the user opens After these mail attachments or after these programs, they will stay like Trojans who have hidden soldiers left in the enemy city, and hide one in their computer system. The program whisned when Windows started. When you connect to the Internet, this program will notify hackers to report your IP address and a pre-set port. After receiving this information, the hacker uses this latent in which the program can be arbitrarily modify the parameter settings, copy the file, peek the content of your entire hard disk, so that the purpose of controlling your computer. . 3, WWW spoofing technology can use the IE to use the IE access to access, such as reading newsgroups, consulting product prices, subscribing to newspapers, e-commerce, etc. However, a general user may not think of these problems: the web page is being visited by hackers, the information on the web is false! For example, hackers rewrite the URL of the user to browse to the hacker's own server, when the user browses the target web page, actually issues a request to the hacker server, then hackers can reach the purpose of deception.

转载请注明原文地址:https://www.9cbs.com/read-14229.html

New Post(0)