Windows NT attack on the grand stand

Source: Internet
Author: User
Tags file system

In the current trend of Windows NT has become a server operating system trends, whether in the LAN or in the Internet, we seem to be able to see the figure of Windows NT. However, because of its source code confidentiality and simple graphics interface, which makes Windows NT a hacker's preferred target, looking for NT vulnerabilities has become a basic work of hackers.

Why do hackers think Windows NT security is vulnerable? A prominent problem is its simplicity and ease of operation, as well as its reliance on reverse compatibility, particularly noteworthy in order to expand the market has to continue to follow some of the network's existing communication protocols, which makes Windows NT some of the security measures do not meet the desired solution. In particular, the underlying network support system for Windows NT still follows network protocols such as NETBIOS/CIFS (Common Internet File system, public wide Area network filesystem), and SMB (Server message block, servers messaging module) , which has enabled some veteran intruders to shrug off some of the new Windows NT defenses, and they can use some of the old protocol vulnerabilities and principles to make them work in NT. and NT to some user information confidential Word encryption processing is also not very perfect, it still follows the old LAN Manager algorithm, making the crack work becomes unusually simple.

In this paper, some methods and specific attack steps used by hackers in attacking Windows NT system are introduced in detail, so that the network system administrator can make the best use of them in maintaining the system. There is a very good point: "There is no absolute stupid system in the world, only absolutely stupid administrators." "As long as our network administrators can carefully maintain the system, believe that hackers are not the opportunity."

Typically, an attacker would launch an attack against NT in the following ways:

1, guess the password (hand guessing, automatic guessing, listening to guess solution);

2, remote vulnerability attacks (buffer overflow, denial of service DDoS);

3, Upgrade permissions (siphon information, modify the registry, Getadmin, Sechole, Trojan);



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.