Watch out for Cookie leaks to see how internet cafe hackers steal confidential information

Source: Internet
Author: User

InInternet cafeThe habit of clearing personal information after surfing the internet is easily hacked. Do you want to know how to prevent it? Next let's take a look!

In fact, I am still very calm when doing bad things, especially in some cases, when I think justice is on my side, I am more calm. After I used the "control procedures for Internet cafes in Vientiane 2004" and "Fixed-Point cleanup", the anger in my heart had been halved. After he left the Internet cafe, I quickly sat in front of a computer where he didn't restart the system.

Because the whole "knife and scar" movement was so big that the network management system was unable to sit down at this time and began to patrol back and forth in the Internet cafe. I did not dare to use hacking tools any more, to avoid being "cleared" after being discovered by the network administrator. After I got on this computer, I had a hunch that I could find something on this computer that didn't leave the system.

  Use Cookie to black the male

Because Mr. knife just exits through the Internet cafe account and does not restart or shut down the computer system, if I use my Internet cafe account to log on to the system, the system will still remain in the status when Mr. knife just left. First, let's take a look at what websites Mr. knife has visited. I downloaded a browser Cookies analysis software named IECookiesView from the Internet. The software automatically lists the information of the websites I have logged on. When I saw them, I knew all the websites I had visited. Most of them are meaningless game websites and entertainment websites.

I then clicked the "last access date" item on the main interface of IECookiesView, and found a website that Mr. knife finally logged on. After seeing the website name and the Cookie below, I had a sneer in my mind. It turned out to be a web dating site (figure 1 ). Through the content shown in the Cookie, I not only know the username of Mr. "Knife" logging on to the dating site, but also determined that the "Knife" Internet password is also left.

  

  Reminder: After accessing the Internet in public places, professional tools should be used to clean up the residual sensitive information in the computer, especially the residual account and password information in Cookies.

Select a dating site, right-click it, and select "enable platform" in the pop-up menu. The IE browser in the system automatically opens the dating site. In the "Internet Options" content tag of IE browser, I found that the automatic function is enabled by default to save the password username, and another low-level error of network management, many Internet cafes have the problem of setting IEAS the default.

Then, enter the first letter of the user name of Mr. "" in the user name column, and the user name of Mr. "" automatically saved will pop up. After clicking this user name, A string of asterisks quickly appears in the password column, which is undoubtedly the logon password.

I am not in a hurry to go to his dating page. I first cracked the password. Password cracking is very simple. I use the asterisk password viewer. After opening the software, move the mouse over the asterisk to view the password (figure 2 ). After the password is cracked, I log on to the web page without a long wait.

  

  Reminder: it is best to select different passwords for various information registered during Internet access, which will greatly reduce the damage level after you are attacked by hackers.

This Web dating site provides the html "target = _ bank> friend import function for MSN and QQ. With this function, I have obtained all the information imported to this website by Mr. knife. At this time, I came up with a prank idea and started to use the password I just obtained to try his mailbox, QQ and other private network communication tools one by one.

Finally, I almost logged on to all the network communication tools and registered websites through this "universal password. I now recall the scene of the day, and I felt that my mind was indeed occupied by the devil. In the end, I finally changed all his passwords one by one.

  Use a virtual desktop to access the Internet without any balance

Just as I changed the password of Mr. knife, she had quietly come to the internet cafe and sat beside me. In the popular words, I was very excited about my innocence. I began to proudly tell her the whole process of my fight against Mr. scar. Now I recall that, my eloquence was indeed superb, and I didn't even notice that she was staring at me like an alien.

I spoke to her endlessly about hacker technology and showed it on site. Because the balance of the network card is almost exhausted, I taught her how to simply bypass the internet cafe billing system. I downloaded the Desktop management tool "Super X Desktop", which can run up to 100 virtual desktops. You can easily switch between desktops by pressing Ctrl + number.

After running the software, the virtual desktop immediately takes effect. by right-clicking the software icon in the system tray, I can change the current desktop at any time (Figure 3 ). At this time, the Internet cafe billing system will automatically lock the current desktop to calculate my Internet access time, but now I only need to use the shortcut key to call up another desktop, you can continue to access the Internet, even if the balance is 0. Interestingly, at this time, the system tray in the lower right corner of the computer will still display the icon of the Internet cafe management software. Everything is normal except pay-as-you-go.

  

Mr. "knife scar" came in with his face and shouted as soon as he entered the internet cafe: "Who just stole my QQ number ?" In my heart, it's not a good thing to do. It's a best strategy and calm! Don't be in a panic look, with a simple smile on your face. Good. Turn back and start with your feet ......

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.