(1) attack using Network System Vulnerabilities
Many network systems have such vulnerabilities. These vulnerabilities may belong to all systems, such as WindowsNT and UNIX, it may also be caused by network management negligence. Hackers can exploit these vulnerabilities to detect passwords, system intrusions, and other attacks.
Software patches can be installed for system vulnerabilities. In addition, the network management system also needs to work carefully to prevent others from taking advantage of negligence.
(2) Attacks by email
Email is a widely used communication method on the Internet. Hackers can use some email bomb software or CGI programs to send a large number of duplicate and useless spam emails to the target mailbox, making the target mailbox unusable. When the sending traffic of spam is very large, the mail system may slow or even paralyze normal operations. This is the same as the "Denial of Service (DDoS) attack" mentioned later) similar.
Some spam cleaner software can be used to solve emails suffering from such attacks. Common email receiving software such as SpamEater and Spamkiller can also achieve this purpose.
(3) Decryption attack
Password is the most common and important security protection method on the Internet. Users always need to enter a password for identity verification. Most of the current password protection methods do not recognize the password. As long as there is a password, the system will think that you are an authorized normal user. Therefore, password acquisition is also an important method for hackers to conduct attacks.
There are several other methods to obtain the password, one is to listen to the data on the network. During password verification, the user-Entered password must be transmitted from the user end to the server end, and hackers can perform data monitoring between the two ends.
However, generally, the system encrypts the transmitted password, that is, the hacker's data does not have a plaintext password, which poses another challenge for hackers to crack the password. This method is generally used in the LAN. Once successful, attackers will gain great benefits.
Another decryption method is to use brute-force password decryption for known user names. This decryption software is very time-consuming to try a password consisting of all possible characters. However, if the user's password is relatively simple, such as "12345" and "ABC", it may take only a few minutes to complete.
To prevent such attacks, you must make complex settings when setting passwords. You can also use a multi-layer password or change your mind to use a Chinese password, do not use your birthday, phone number, or even user name as the password, because some password cracking software allows the hacker to enter information related to the cracked user, such as birthday, the password of the data is given priority. In addition, the password should be changed frequently, which makes it more likely to be cracked.
- Research on Computer Network Intrusion security check and Analysis
- How to use the "Network Intrusion Detection System"
- The war of science and technology has become increasingly fierce: cyber attacks have become fatal weapons