invade
For the general common intrusion methods, the main ones are:
1. Password invading
Password compromise refers to the use of software to unravel password files that have been obtained but have been encrypted, but many hackers have resorted to a program that can bypass or block password protection to do this. Programs that can unwrap or block password protection are often referred to as "cracks". Due to the widespread use of these software, it is sometimes quite easy to hack into a computer network system, and it is generally not necessary to have a deep understanding of the internal structure of the system, which is a good method for beginners.
2. Trojan equestrian
When it comes to Trojan horses, it is not difficult for anyone who knows the story to understand that the most typical approach may be to attach a program that can help hackers to perform a specific action to the normal program of a legitimate user, at which point the code of the legitimate user has been changed. Once the user triggers the program, the hacking code is activated at the same time, and these codes often complete the task assigned by the hacker. Because this intrusion method requires hackers to have good programming experience, and to change the code and require certain permissions, it is difficult to master. But because of its complexity, it's hard for the average system administrator to spot.
3. Interception method
This is a very practical but also very risky hacking method, but there are still many hackers who invade the system using this method, as the so-called Yigao people are bold.
Communication between network nodes or workstations is achieved through the transfer of information flows, and when in a network without a hub, the transmission of data does not indicate a specific direction, and each network node or workstation is an interface. It's like a point where you say, "Hey! Which of you is the workstation where I want to send a message. ”
At this point, all system interfaces receive this message, as soon as a workstation says, "Hey! That's me, please pass the data over. "The connection was done in no time.
At present, there are a lot of sniffing software circulating on the Internet, using these software can easily monitor the data, even including password files, and some services directly use plaintext transmission in the transmission file, which is also very dangerous.
4. E-mail technology
The use of email plus Trojan horse program is a method often used by hackers, and it is very effective, the average user, and even the network administrator, is too weak in the awareness of network security, which gives many hackers an opportunity.
5. Virus technology
As a hacker, it should be a shameful thing to use it like this, but you can learn from it, after all, it is also a method of attack, and it can be used at special times and in special places.
6. Hidden technology