Hacker attacks

Attacks

 

Hacker attacks can be divided into non -destructive attacks and devastating attack categories. Non-destructive attacks generally intended to disrupt the operation of the system, not theft system data, usually a denial of service or information bombs; the attack is devastating invasion of another's computer system

hacker attack hacker attack

System, theft of confidential information system, a data system for the destruction of the target object. Here we will introduce four kinds of common hacker attacks. [1] 

1, backdoors

Due to the programmer to design some complex functions of the program, the general modular programming ideas, the entire project will be divided into a plurality of functional modules each design, commissioning, secret entrance then the back door is a module. In the program development stage, the back door easy to test, change and enhancement module functions. Under normal circumstances, after the completion of the design need to remove the back door of each module, but sometimes due to the negligence or other reasons (such as leaving it in the program, to facilitate future access, testing or maintenance) no back door to remove some people with ulterior motives will make use of an exhaustive search methods to find and use these backdoor into the system and then attack. [1] 

2, the information bomb

Information bomb is the use of special tools , in a short time to the target server to send a lot of information beyond the system load, causing the target server overload, network congestion, system crashes means of attack. For example, to send a specific combination of unpatched Windows 95 system UDP packet can cause the target system to crash or reboot; to a certain type of router sends a specific packet causes the router to crash; send large amounts of e-mail to someone of spam will this mailbox "explode" and so on. There are now common information bomb mail bombs , logic bombs and so on. [1] 

3, Denial of Service

Also known as distributed denial of service attack DOS, it uses a large number of attack targets beyond the processing capabilities of data packets consume system available system bandwidth resources, resulting in paralysis of network services and finally an attack means. As an attacker, you first need to invade and control a Web site by conventional hacking, then the server installed and started a special instruction issued by the attacker to control the process, the attacker the IP address of the object of the attack as the command is given to the process when the process began on the target host attack. This way you can focus on a large number of network server bandwidth attack against a specific target, so powerful, it can be instant target bandwidth resources depleted, resulting in paralysis of the server. For example, in 1999 the University of Minnesota have been hacking is one such way. [1] 

4, network monitoring

Network monitoring is a monitoring network status, data stream and to transmit information on the network management tools , network interface that can be set up in a listening mode, and can intercept information transmitted over the Internet, that is, when the hacker to log network hosts and made super user after the permissions, log on to other hosts, using network monitoring can effectively intercept data online, which is the method most used by hackers, however, can only be used to connect to the network monitoring physically the same network segment of the host, usually used do get the user's password. [1] 

5、DDOS

Hacking into the calculation conditions, a disk operating system (Denial of Service) or DDoS attack (Distributed Denial of Service) attacks including efforts to interrupt service to a network resource, making it temporarily unavailable.

In order to stop these attacks are usually host an Internet connection, but some may try to target certain machines and services.

2014 DDoS attacks have up to 28 / hour frequency. The main objective of these high-volume business or website attacks.

DDOS no fixed place, these attacks can happen at any time; their target industries worldwide. Distributed denial of service attacks mostly in servers are a large number of requests from an attacker or a zombie network communications.

The server can not control the Hypertext Transfer Protocol requires any further, eventually shut down, so praise legitimate users of the service. These attacks usually do not cause any damage to the server or website, but please temporarily closed.

Application of this method has been expanded a lot, now used for more malicious purposes; likes to cover up fraud and deterrent security panel. [2] 

6, password cracking and certainly one of common hacker attacks.

Published 152 original articles · won praise 124 · views 20000 +

Guess you like

Origin blog.csdn.net/qq_44762986/article/details/104761797