1. Password intrusion
"Password intrusion" means to use some software to unlock encrypted documents, but many hackers loyal to this technique do not use this method but use a program that can circumvent or protect the password. Programs that can unlock or mask password protection are often referred to as crack.
2. Trojan Horse
When it comes to Trojan horses, it's easy to understand the story. Its most extensive approach is to attach a particular program to a legitimate user program, at which point the code of the legitimate user is changed, and once the user triggers the program, the hacker instruction code that is attached is activated at the same time. These codes often accomplish tasks that hackers have already specified. Because this kind of intrusion method needs the hacker to have the very good programming experience, and wants to change the code, must have the certain authority, therefore is more difficult to grasp. But because of its complexity, it's hard for a typical administrator to find that a bit of patience is necessary for hackers.
3. Listening method
At present, in the local area network is basically used to broadcast as the technology based Ethernet, any two nodes between the communication packets, not only for the two nodes of the network card received, but also in the same Ethernet network of any one node intercepted. Therefore, as long as the hacker is connected to any node on the Ethernet to listen, it can capture all the packets that occur on the Ethernet card, unpack and analyze it, and steal the key information, which is the inherent security of Ethernet.
Hint: There is a software sniffer network sniffer is this way to listen to the data flow in the network, it can intercept the password, can intercept the secret information, can be used to attack neighboring networks.