黑客技术

黑客技术
黑客技术

题目:黑客技术

学院:信息学院

专业:软件技术

姓名:刘小冬

学号: 1101100114 班级:信息B1121班

Abstract

Summary in today's information age, growing problem of network security, hacker attack and defense technology into today's network technologies and development focus of attention, with the development of networks, network security has become a strong concern is its hot spots. Hacker attacks as a result of security is one of the important aspects of the problem. This article describes the main threats to network security, focusing on the General steps for hacking, using means, as well as ways to address the latest measures.

Key words: network security ,threaten ,hacker ,the attack steps ,theory ,countermove

contents

First hackers and hacker technology (1)

(a)sources of hackers (1)

(b)The hacker technology (1)

Second Hackers attack (3)

(a)Attack technology (3)

(b)Defence hacker technology (4)

Third most common network security measures (5)

(a) Detection and prevention of network security (5)

(b) Timely data backup (5)

(c) The use of encryption mechanism in data transmission (6)

Fourth Peroration (6)

References (7)

First hackers and hacker technology

(a) sources of hackers

"Hacker" is a term coined by the English translation of the Hacker, is a specialized research, computer and network vulnerability of computer enthusiasts. They are accompanied by the development of computer and network have grown, hackers basically is a hobby, usually for their own interests, rather than to make money or work. The word "hacker" outside the circle or the media is usually defined as: dedicated to invade others system illegal computer master. But this kind of person in the eyes of hacker belongs to the lower level cracker (hackers).

The hacker began in the nineteen fifties, the earliest computer at the University of Pennsylvania in 1946, and the earliest hackers appeared in the Massachusetts academy, Baer laboratory have. The original hackers are generally some senior technical staff, they are keen to share in the challenge, advocating freedom and claim information.

(b)The hacker technology

Hacker technology, is on the computer system and network of flaws and vulnerabilities discovered, and the technical implementation of attacks against these defects. Here said the defects, including defects in software, hardware, network protocol flaws, defects management defects and human error. Obviously, hackers technical ability to network with destruction.

Engaged in illegal destruction activities for personal gain by hacker technology, behoove is spurned by the people's behavior. This kind of person not to focus on research and repair found on the system defects, but for some purpose to intrusion system, steal information, misappropriation of authority and implementation of sabotage. Can be said that the hacker technology exists to produce network security industry. Internet is based on the TCP/IP protocol, network equipment and operating system with networking capability. The TCP/IP protocol has some inherent design flaws, many even

to the latest version still exists. More loopholes, is related to the open characteristic of Internet, can be said to be no fill fill.

Network devices such as routers, charged with Internet most complex heavy throughput and traffic, powerful and complex, with the technology of the current, not be possible to completely avoid loopholes

If civilization from the current view of the whole society, the hacker technology is not sophisticated science and technology, at best, can only say that is the basic issues in the field of internet. Found that the hacker technology does not require too much underlying knowledge, it is not mysterious, from a long-term perspective, the hacker will promote the safety of products for testing and repair of recommended products, is beneficial to both customers and suppliers.

The networked trend is inevitable, any industry is required to network communication. In in the application stage of network technology and hardware, development of the walk in the front is still internet. So TCP/IP network interconnection technology is widely used in all walks of life.

Hacking is an objective existence on Internet. The hacker technology is aggressive, also has the role of protection. Hacker technology continuously to computer and network product supplier continuously improve their products, to the development of Internet has played a role in promoting. Not because the hacker technology has damage to the network and to reject the outside the door of science and technology. To discover and realize hacker technology usually requires the person very proficient on the computer and the network, to discover and validate a computer system vulnerabilities may need to do a lot of testing, analysis of a large amount of code and long time program, this and a scientist in the laboratory work with quiet hard application did not have too big difference. Discovery is different from those seeking to use others have written in online hacker software people.

The hacker technology is a double-sided, hacker technology is good or bad depends on the use of it. We found the security flaw to product developers repair products computer systems and network vulnerability, but also make them more safety first at design time. Study of hacker technology managers keep his system and network configuration more

security. Without those announced major vulnerabilities discovered and proposes the advice of repair hackers, Internet may not like today let people benefit, also won't have today so strong.

Second Hackers attack

(a)Attack technology

One,disguise

The hacker's every act and every move will be recorded by the server, so they must pretend to make each other can not distinguish the true identity, this requires skill, used to camouflage their own IP address, use a clean record tracking, avoid disturb each other clues, artful dodge.

Camouflage is the basic skills required to achieve very high, this for beginners called "into the realm", that is to say the beginner is not possible for the shortest time to learn to camouflage, so I don't encourage beginners to attack the network by their knowledge of learning, otherwise once own swath, eventually harm themselves.

Two, find bugs

Vulnerability is the most important information on hackers, hackers often learn from others found vulnerability, and strive for unknown vulnerabilities, and from the huge holes in the search for valuable, can be exploited vulnerability test, of course, their ultimate goal is through holes in failure or repair the holes.

The hacker is unimaginable to find loopholes, dedication, their slogan says "breaking authority", again from the practice of the hackers, hackers also with their own practical action to the world to prove this point -- the world without "does not exist loophole" program. The eyes of the hacker, the so-called "a seamless heavenly Robe" but "not found".

Three, the use of loopholes

For decent hackers, vulnerability to be repaired; the cracker, vulnerability to sabotage.

But their basic premise is "loophole", hackers use loopholes can do the following things:

1, get system information: some loopholes can leak information, exposing sensitive information, thus further intrusion system;

2, the intrusion system: enter the system through the holes, or obtain the server internal information, or in full control of the server;

3, find the next target: a victory means the next target, the hacker should fully as a tool to use their already in charge of the server, and look for the next invasion system;

4, do something good: decent hackers in the completion of the above work, will fix bugs or notify the system administrator, make the maintenance network security;

5, do some bad things: cracker in the completion of the above work, will determine whether the server and use value. If you have use value, they will be on the server or the back door Trojan horse, for the next visit; but to no use value of the server they no mercy, the collapse of the system will let them feel the infinite pleasure.

(b)Defence hacker technology

1, using software

Because no matter how viruses or hacking program first of all to cheat you run it on your own machine, so the unknown source or origin of the software do not try, and regularly with a different version of the antivirus software antivirus.

2, the browser security settings

Set the security level, turn off the Cookies. Cookie is some data to the hard disk write some sites during browsing, they recorded the specific information of user, so when the user to return to this page, these information (called the state information) can be reused. But Cookie was not due to the use of these information, but these concerns are the sources of information -- your hard disk. So you must be careful, simply, turn off this feature!

3, hide IP address

Third most common network security measures (a) Detection and prevention of network security

Network security measures at present more popular is to use a professional firewall Through the preparation of firewall rules, you can let the system know what kind of information can be entered, what should give up, so, when hackers sending aggressive packet, after the firewall, data can be discarded, thus preventing the hacker attack. Such as Skynet firewall, after installation into a custom IP rules, set:

(1) prohibit Internet machine using shared resources I.

(2) prohibit connecting all the people.

(3) to ban all people connected to the low port.

(4) allows authorized program to open ports, and all it needs to open the port program needs

Examination and approval. But don't check "system settings" in the "allow all applications to access the network, and

Record the program "in the rule, this setting is the secret weapon against the Trojans and the keyboard record.

(b) Timely data backup

To remedy the situation, if the data backup in time, even if the system encounters the hacker attack, can also repair in a short period of time, save unnecessary economic losses. Like many foreign business website, will backup the system data in every night, in the very next day early in the morning, whether a system is attacked, would restore data, ensure that every system in the database will not be damaged. Data backup is best placed in the other computer or drive, such hacking into the server, is just a part of failure data, because they can not find the data backup, nor for the server loss is very serious. However, once the hacker attacks, administrators do not only managed to

restore the corrupted data, and timely analysis of sources and attack methods of hackers, as soon as possible to repair hackers exploit the loophole, then check the system whether the hackers installed Trojans, worms or hackers to open some administrator account, to be hackers left various traces and back analysis clear, clean, prevent the hacker's next attack.

(c) The use of encryption mechanism in data transmission

For personal credit cards, passwords and other important data, transmission between the client and the server, should first encrypted in transmission, the aim is to prevent hackers from eavesdropping, interception. For a variety of popular on the Internet now encryption mechanism, has already appeared crack in different ways, so the encryption selection should look for solving difficult, such as DES encryption method, this is a no reverse break the encryption algorithm, so the hackers to the encrypting file, can only take the brute force method. Individual users as long as the choice of a good passwords, hackers work will stop trying to endless after.

Fourth Peroration

The openness of the Internet, randomness, virtual, convenient to provide favorable conditions for the sharing of resources and new means of communication to the human, has brought a new virtual world to people, it also brings negative effects. Operating system and Internet, people often use the TCP / IP protocol has many security vulnerabilities, the hacker attack Internet possible refused to hackers, ensure the security of Internet, need to formulate and improve the safety management mechanism and management system; need ethics; legal constraints, crack down on the need to use more legal deterrence and of the hacker crime the.

References

[1] Lu Kai-cheng:”Crytography computer-a computer network in the pre-data security”(University Press 2004.1)

[2] Yu jianbin:”hacker attacks and the means of the user response”(Beijing people’s Posts and Telecommunications Publishing House 2004.6)

[3] Jun Cai:”Computer Network Security Technologhy”(China Water Conservancy and Hydropwer Press 2005.9)

[4] Deng Wenyuan, Chen Huizhen,Chun-Jung Chen:”ASP network and database techonlogy”(China Railway Press 2007.4)

[5] Liu Yuansheng:”Computer network security”(Tsinghua University Press 2006.8)

[6] Yuan Deming:”Computer network security”(Publishing House of Electronics Industry 2007.6 )

相关主题
相关文档
最新文档