Various methods of hackers hacking
▶ Sendmail
= Need to send mail across the network was created as a mail transport program
TCP / IP, UUCP, BIT, NET, etc. can also be transferred between different networks, so
Models are used in almost all Unix. In most versions of its Unix
5 with this program to distribute as many bugs have
Is known. 88 years was connected to the Internet, the computer 7500 is stopped
The biggest hacking incident recorded by a bug in Internet worm incident was when the debug.
CERT was formed after this incident.
▶ Packet Sniffering
= Tcpdump, snoop, sniff network using network monitoring tools such as
Circulating within the contents of the packet is the ability to analyze the information. Network
Yeondongdwae as well as a host to connect to the internal network from outside all
That are subject to a host. The effect of this method peek is not a way to jump Nana wheels.
▶ IP Spooning
= Internet protocol TCP / IP, structural defects, ie, TCP seukwonseu number, the source of the router
Using an authentication mechanism using the source address and the authentication method has the capability
That system to attack the system as a host to the stomach. This method is
As host of his own computer to date, hacked by most of the types
Is the best way. Mitnick, the famous to the nations of the soldier.
▶ Trojan Horse
= Let the other party notice is to lift and lay in wait. Normal program
Command to insert a negative routine or normal operation tnod earned a negative result
Immediately after the routine to delete a negative finding would be difficult because: System programmers,
Program manager of an operator, an external program, self-service systems jeojireumyeo
Login tapes and records management program that you have the list after the normal
Running the program results and compare the results happen to doubt, is a precautionary measure.
▶ Scavenging
= While working in the computer lab and tossed it in the trash list of programs, data lists,
Dirty data is a way to get a copy.
▶ Logic Bomb
= Program to put some conditions when the condition is satisfied automatically illegal results
Faces that appear similar to a Trojan horse has.
▶ Data Diddling
= Raw document itself, tampering, forging techniques to insert or as a self-switched
Make a tape or disk in the extra bytes of data to add dueotdaga
Technique. Data while changing the code is the raw material for another trick to swap
Preparer, data carriers, data services and access to the data handler is primarily an internal
Is to use.
▶ Super Zapping
= Failure of the computer as an emergency when the operation is not possible, is a program.
Passwords or other security devices by loss of function contained in the computer's storage devices
Copy all files to trick approaching the material.
▶ Trap Door
= Os or when developing large applications that are found when the entire test run
Maintenance or maintenance error as an excuse to go inside the computer techniques of data is pulled.
▶ Asynchronous Attacks
= Speed of the computer central processing unit and input and output devices with different speeds that the multi-
When programming using checkpoints to get materials to use,
How to hack is easier and effective. Pre-written program haedun system penetration
How to cheat without hacking the operator.
No comments:
Post a Comment