Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Historical Hacking Techniques
MIỄN PHÍ
Số trang
4
Kích thước
71.2 KB
Định dạng
PDF
Lượt xem
1594

Historical Hacking Techniques

Nội dung xem thử

Mô tả chi tiết

SUMMARY

Historical Hacking Techniques:

• The original (đầu tiên) intent (mục tiêu) of the Internet was to

share resources openly between research institutions.

• Some of the first hackers used the Network File System (NFS) to gain

(giành quyền) access to information.

• rlogin was commonly used by administrator and users to enter remote

systems without a password.

• Cracking weak passwords or short passwords using brute-force

methods is one of the most common ways hackers gain access to systems.

• Some weak passwords fall into the bad configuration category

because a developer will use a simple password that matches the ID for example, a

user ID and password that are both jdoe.

• Alternatives to bad password are the use of smart cards or

biometrics (sinh trắc học) .

• Programming flaws are another method hackers use to exploit (khai

thác) computer systems.

• Hackers use buffer overflows to inundate (tràn ngập) the target system,

causing it to crash or run commands to elevate privileges to the system.

• Denial of service (DoS) is used by hackers to render the target

unusable.

• Distributed denial of service (DDoS) can be targeted toward a large

number of systems.

• DDoS attacks have three-tiered architecture using the master, slave,

and client processes that have been installed on compromised (thoả hịêp/tổn

thương) systems.

Advanced Techniques:

• Sniffers are used by hackers to collect information about a target

network or system.

• Sniffing a switched network is harder than a network that uses hubs.

• The hacker must do one of two things to sniff a switched network:

convince (thuyết phục) the switch to send the traffic to it or cause the switch to send

traffic to all ports.

• The switch can be fooled (bị đánh lừa) to send traffic to the sniffer by

duplicating the MAC or spoofing the ARP or DNS.

• In order for ARP spoofing (giả mạo) to be effective, the sniffer must

Tải ngay đi em, còn do dự, trời tối mất!