Network security category division-network information collection (port scanning, vulnerability scanning, network eavesdropping), denial of service attacks, vulnerability attacks

Attack technology is the main threat faced by information security and one of the main problems that information security workers have to deal with. Understanding the technical route of the attack, the main principles, means, methods and methods of the attack have important guiding significance for discovering information security vulnerabilities, taking security countermeasures and formulating security protection strategies.

1. Network information collection

(1) Commonly used information collection commands Commonly used information collection commands are ping, host, traceroute, nbtstat, net, finger, nslookup, etc. These commands are used by network security workers and attackers to obtain basic information about the target network.

(2) Vulnerability scanning Vulnerability scanning refers to the detection and analysis of vulnerabilities that can be exploited by attackers by detecting security problems in target network devices and host systems. Stack fingerprint technology is the main means to view the host operating system in the network by using the slight differences between different operating systems when dealing with TCP / IP.

(3) Port scanning The attacker scans well-known ports and commonly used ports to discover the open ports of the target network and the services provided on the corresponding ports. Common port scanning technologies include TCP port scanning, TCPSYN scanning, TCPFIN scanning, NULL scanning, Xmastree scanning, UDP scanning, etc.

(4) The working mechanism of network eavesdropping Ethernet makes it possible to snoop and record all the data packets on the same network segment by setting the network card to promiscuous mode. Network eavesdropping has better concealment and greater harm. There are more loopholes in wireless network communication.

(5) Typical information collection tools This chapter lists typical information collection tools: nmap scanner, AxcetNetRecon scanner, pingPro scanner, ISSInternetScanner scanner, introduces

 

2. Denial of service attack

(1) Basic denial of service attacks Denial of service attacks prevent authorized entities from gaining normal access to network resources or access operations are severely delayed. There are two basic forms of DoS attacks: target resource scarcity and network bandwidth consumption.

(2) Distributed denial-of-service attack Distributed denial-of-service attack is a distributed, cooperative and large-scale attack method. A distributed denial-of-service attack must establish a unique architecture before the attack, and use various methods to hide the attack program and clear the attack traces. Distributed denial-of-service attacks implement the attack by collecting target conditions, occupying puppet machines, and carrying out attacks.

(3) The prevention technology of denial of service attacks has certain difficulty in completely preventing denial of service attacks, but proper prevention work can reduce the chance of being attacked and reduce the damage of the system from denial of service attacks.

 

3. Vulnerability attack

(1) Configuration vulnerability attacks Common configuration vulnerability attacks include default configuration vulnerabilities, shared file configuration vulnerabilities, anonymous FTP, and wuftpd configuration vulnerabilities.

(2) Protocol vulnerability attacks Common protocol vulnerability attacks include TCP serial number prediction, SYNFlooD attack, loop attack (UDPFlooD attack), LanD attack, Smurf attack, WinNuke attack, Fraggle attack, PingtoDeath attack, etc. These attacks do not follow the normal protocol Rules, when the operating system and network equipment can not be properly processed to achieve the purpose of the attack.

(3) Program Vulnerability Attack The implementation of buffer overflow attacks on programs and services is the main method for attackers to gain control of the target. This section introduces the attack principles of buffer overflow attacks, enumerating BIND vulnerability attacks, Finger vulnerability attacks, and Sendmail vulnerabilities. The basic principles of attacks and other attacks.


Peng Xinguang, Wang Zheng. Information Security Technology and Application (21st Century Higher Education Computer Planning Textbook) (Chinese Edition) (Kindle location 3589-3602). People's Posts and Telecommunications Press.

Guess you like

Origin www.cnblogs.com/bonelee/p/12686621.html