Analysis of the common means of hacker intrusion

Source: Internet
Author: User
Tags password protection

1. Password intrusion

"Password intrusion" means to use some software to unlock encrypted documents, but many hackers loyal to this technique do not use this method but use a program that can circumvent or protect the password. Programs that can unlock or mask password protection are often referred to as crack.

2. Trojan Horse

When it comes to Trojan horses, it's easy to understand the story. Its most extensive approach is to attach a particular program to a legitimate user program, at which point the code of the legitimate user is changed, and once the user triggers the program, the hacker instruction code that is attached is activated at the same time. These codes often accomplish tasks that hackers have already specified. Because this kind of intrusion method needs the hacker to have the very good programming experience, and wants to change the code, must have the certain authority, therefore is more difficult to grasp. But because of its complexity, it's hard for a typical administrator to find that a bit of patience is necessary for hackers.

3. Listening method

At present, in the local area network is basically used to broadcast as the technology based Ethernet, any two nodes between the communication packets, not only for the two nodes of the network card received, but also in the same Ethernet network of any one node intercepted. Therefore, as long as the hacker is connected to any node on the Ethernet to listen, it can capture all the packets that occur on the Ethernet card, unpack and analyze it, and steal the key information, which is the inherent security of Ethernet.

Hint: There is a software sniffer network sniffer is this way to listen to the data flow in the network, it can intercept the password, can intercept the secret information, can be used to attack neighboring networks.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.