Popular Science: Detailed explanation of the formation of traffic hijacking (1)

Source: Internet
Author: User
Keywords Traffic hijacking
Tags change configuration default environment formation internet internet + javascript
Traffic hijacking, this ancient attack has been quiet for some time, and recently began to uproar. Many well-known brands of routers have burst into existence security loopholes, leading to domestic media have reported. As long as the user did not change the default password, open a Web page or even posts, router configuration will be secretly modified. The internet became precarious overnight. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' width:498px; height:155px "border=" 0 "alt=" detailed explanation of the causes of traffic hijacking "width=" 690 "height=" 221 "src=" http://s1.51cto.com/wyfs02/M00/24/4D/ Wkiom1nonrmynjstaacwmkggzdg340.jpg "/> Attack or those kinds of attacks, the report is still the same brick home to remind, so that everyone is numb." Has long seen the operators of various hijacked, frequent advertising window, we can do nothing. So many years also did not appear any loss, also eye a closed eye. In fact, just being hijacked by operators is more fortunate. Compared to hidden secret hackers, operators as a public enterprise still have to obey the law, advertising hijacked although there is no moral integrity but there is a bottom line. It's not going to make you see the ad. Also is to remind you that the current network exists the risk of being hijacked, you have to leave some God; on the contrary, everything seems to be calm and no exception, perhaps there is a big spy lurking in the network, at any time you take the bait-this is not a bomb ad so simple, but to seek the wealth of am I going to get hijacked? Many people have the wrong idea: only those with weak security awareness will be invaded. As long as the installation of a variety of professional firewalls, system patches in time to update, all the passwords are very complex, hijacking is certainly not my turn. Indeed, a strong sense of security is not easy to invade, but that only on the traditional virus Trojan. In the face of traffic hijacking, almost everyone is equal. The network security is different from the traditional system security, the network is the whole of various hardware equipment combination, the cask effect is especially obvious. Even with a system like God, your safety level is pulled down instantly when you encounter a pig-like device. Now more and more popular cheap path by, they are carrying a variety of online traffic flow, you can be assured to use it? Even if you believe that the system and equipment are absolutely reliable, can you relax? In fact, there are not many problems in the equipment, but there are a lot of things, is there any defects? Yes, Also misses the most important point: the network environment. If there are hackers lurking in the network environment, even if there is enough professional technology, is in the difficult to escape, the enemy dark I Ming, a little inattentive will fall into the trap. Of course, flies don't sting seamless eggs. What are some of the pitfalls that have caused your network environment to crack? Too many of the attacks that have been prevalent in the past are countless. You can even create one by yourself according to the actual environment. Now recall the attempted hijacking case. Ancient times: Hub sniffing Mac spoofing mac Flushing ARP attack DHCP phishing DNS hijacking CDN intrusion Medieval: Router weak password Router Csrfpppoe fishing honeypot Agent Industrial Age: WiFi weak password wifi pseudo hotspot WiFi forced disconnection WLAN base station Fishing 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next Page >> view full text navigation page 1th: Will I be hijacked? 2nd page: Hub sniffer page 3rd: Mac spoofing 4th page: Mac scour 5th page: DHCP Phishing 6th page: DNS hijacking 7th page: CDN intrusion 8th page: Router weak password 9th page: Router CSRF 10th page: Honey pot Agent 12th page: Wi-Fi weak password 13th: WiFi Hot Fishing 14th page: WiFi Forced disconnection 15th page: WLAN Base Station fishing Original: Popular Science: The reasons for the formation of traffic hijacking (1) Return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.