【Network Security】Take you to know about 【Hacker】

  5a2585dded9b416fb4ea58637b42ed39.png

  Yan-yingjie's homepage

Awareness of the past, not remonstrance, knowing the future, can be pursued  

C++ programmer, 2024 electronic information graduate student


Table of contents

introduction

1. Definition

2. Classification

        a. White Hat Hacker

        b. Black Hat Hacker

        c. Gray Hat Hacker

3. Hacker Culture

4. Ethical issues

5. Attack methods commonly used by hackers

        Common strategies used by hackers to attack users include the following:

        Common methods of defending against hacker attacks are as follows:

6. The role of hackers

7. Conclusion


 

 

introduction

        With the rapid development of technology and the popularization of the Internet, the word hacker has gradually entered our daily life. However, hacker is not just a derogatory term, it has complex and diverse connotations. This article will discuss hacking from multiple perspectives to help readers better understand the nature of hacker culture.

 

c8d5011251234eacb6fc9dff56962433.jpeg

 

1. Definition

        Hackers refer to those who have professional knowledge of computer technology and can break through system security in creative ways, explore and discover loopholes and weaknesses in computer systems. Hackers have a wide range of skills, and they can be computer security experts, network programmers, or information technology enthusiasts.

2. Classification

        Depending on how they behave and their motives, hackers can be divided into the following categories:

        a. White Hat Hacker

        White hat hackers are a group of hackers with a high moral concept. They improve network security by discovering system vulnerabilities and reporting them to relevant parties. Their goal is to protect network systems from attacks and help fix vulnerabilities to ensure that users' data is not lost.

        b. Black Hat Hacker

        Black hat hackers are those who engage in illegal activities, they use their technical ability to cause damage, steal other people's information or seek improper benefits. They are threats to network security and should be punished by law.

        c. Gray Hat Hacker

        Gray hat hackers fall in between white hat hackers and black hat hackers, they may find system vulnerabilities and report, or exploit these vulnerabilities for personal gain, but usually do not cause serious damage.

3. Hacker Culture

        Hacker culture is a special and scattered cultural group, some hackers advocate the spirit of openness, sharing and exploration. They usually pursue technological innovation and breakthroughs, advocate free access and use of information, and also pay high attention to privacy protection.

4. Ethical issues

        The ethical issues involved in hacking are highly debated. In their behavior, a contradiction exists between legality and morality. It's worth noting that hacker culture is not necessarily associated with crime, although hacking is sometimes viewed as a crime.

5. Attack methods commonly used by hackers

        Common strategies used by hackers to attack users include the following:

    a. Data-driven attack : When a seemingly harmless special program is sent or copied to a network host and executed to launch an attack, a data-driven attack will occur.

    b. Illegal use of system files : This is obviously to destroy your system files such as Boot.ini, so that you will not be able to start the computer without interruption. Or they will "help" you format the system drive.

   c. Attacks against information protocol weaknesses : The source path option of the IP address allows the IP data packet to choose a path leading to the system destination. Imagine an attacker trying to connect to an unreachable host A behind a firewall. He only needs to set the IP source path option in the sent request message, so that the message has a destination address pointing to the firewall, and the final address is host A. The IP layer processing of the firewall changes the source path of the message and sends it to the internal network, so the message reaches the unreachable host A.

    d. Remote manipulation : The default login interface (shellscr-ipts), configuration and client files are another problem area, they provide an easy way to configure a program's execution environment. This sometimes leads to a remote manipulation attack, launching an executable program on the attacked host that displays a fake login screen. When the user enters the login information on the camouflaged interface, the program transmits the information entered by the user to the attacker's host, then closes the interface and gives a prompt message saying "system failure", requiring the user to log in again. After that, the actual login screen will appear.

   e. Resend attack : Collect specific IP data packets, modify their data, and then resend them one by one to deceive the receiving host.

   f. Attacks on ICMP packets : Although it is more difficult, hackers sometimes use ICMP packets to attack. The redirection information can change the routing list, and the router can use this information to suggest another better path for the host. Attackers can effectively use the redirection message to divert the connection to an unreliable host or path, or make multiple packets forwarded through an unreliable host. The way to deal with this threat is to filter multiple ICMP redirection packets, which can be configured in some routing software. It is not advisable to simply discard all redirect packets: hosts and routers often use them, such as when a router fails.

Common methods of defending against hacker attacks are as follows:

   a. Use genuine anti-virus software and update it regularly to prevent "hacker" programs from invading your computer system.

    b . Install firewall software to monitor data flow. To try to use the most advanced firewall software.

   c. Do not set network passwords according to conventional thinking, but use a mixture of numbers, letters and Chinese characters to make it difficult for "hackers" to decipher. In addition, change your password frequently.

    e. For different websites and programs, use different passwords and passwords, and do not use a unified password for convenience, so as to prevent the "domino" effect after being deciphered by "hackers".

    f. Be wary of emails from unknown sources or attachments of emails from relatives and friends or mailing lists, and don't open them as soon as you receive them. Use anti-virus software to check and kill it first, and then open it after confirming that there are no viruses and "hacker" programs.

    g. Try to use the latest version of Internet browser software, email software and other related software.

    h. To download software, go to a professional website with a good reputation, which is safe and fast, and do not go to a website with unclear qualifications.

   i. Don't easily leave your electronic identity information on other people's websites, and don't allow e-commerce companies to store your credit card information at will.

    j. Only send personal credit card information to secure websites, and look for the padlock icon or key icon displayed at the bottom of the browser .

   k. Pay attention to confirm the website address you are going to , and pay attention to the absolute correctness of the letters and punctuation marks entered, so as to prevent going astray on the Internet and falling into network traps.
 

6. The role of hackers

        Hackers play an important role in the field of information security. By discovering and disclosing system vulnerabilities, they advance the development of software and network security, helping to protect personal privacy and corporate secrets from unauthorized access. In addition, some hackers have made outstanding contributions to technical communities, open source software, and Internet services.

7. Conclusion

        Hackers are not only a symbol of technical ability, but also a complex cultural group. Their presence is critical to Internet and information security. When evaluating hackers, we should distinguish between different types of hackers and emphasize the importance of legal behavior, moral concepts, and ethical norms.

 

Guess you like

Origin blog.csdn.net/m0_73367097/article/details/131573788