Discussion on the mode of traffic injection attack

Source: Internet
Author: User
Tags sql injection

Objective:

The goal of hacking is generally divided into two categories: one is to gain control of the system, remote monitoring or "command" your system, and the second is to steal your secret information, in the absence of completion of the target, hackers need "silent no Trace", the invasion of the secret, can not let the support found. Intrusion is not the same as attack, and intrusion is often the prophase work of attack.

Commonly used password-cracking, buffer overflow is the way of direct intrusion, traffic injection is the opportunity to get intrusion by inserting information into the traffic of your system. This way hidden in your normal network traffic, there is a strong concealment, can be inserted with a beautiful picture of the Trojan, Can be the normal selection button to start after the special code, can also induce your phishing links ...

The most common type of traffic injection attack is SQL injection, which, through your system's legitimate input window, uses programming query language vulnerabilities to inject the attacker's commands and, in addition, the current popular XPath injection.

Here is a direct hijacking of the user computer network traffic injection-type attack.

Step one: Get the flow control (get the middleman position)

Allows the user traffic flow through the hacker's controllable point, the hacker can inject own command information to the traffic. Therefore, the hijacking of user traffic is the first step in the traffic injection attack. Here are some common ways to:

Case one: Hackers and users on a local area network

1. Direct Control switch

If there are conditions, hackers can directly control the user's access switch (first intrusion network equipment or network management system), mirror the user's port traffic, if the control of the convergence switch, the user needs to filter out the entire flow of the Mac, and then restore analysis.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.