Today's Sichuan Computer Training/Let's take a look at the common information security attacks on the market.
Vulnerability Scanner Vulnerability Scanner is a tool to quickly check the known vulnerabilities of computers on the network.
Hackers usually use port scanners.
They check which ports on a given computer are "open" or available for accessing the computer, and sometimes they detect the program or service listening to the port and its version number.
Firewalls prevent intruders from invading computers by restricting access to ports and machines, but they can still be bypassed.
Reverse engineering is also terrible, and hackers may try to find loopholes manually.
A common method is to search for possible vulnerabilities in computer system code, then test it, and sometimes reverse engineer the software without providing code.
Violent attack password guessing.
When used to check all short passwords, this method is very fast, but for longer passwords, other methods (such as dictionary attack) are used, because violent search takes time.
Password cracking Password cracking is the process of recovering passwords from data stored or transmitted by a computer system.
Common methods include repeatedly trying to guess passwords, manually trying common passwords, repeatedly trying to use passwords in the dictionary or text files with many passwords.
Packet sniffer A packet sniffer is a captured packet that can be used to capture passwords and other application data during network transmission.
Deception attack (phishing) Deception attack involves a program, system or website, which successfully masquerades as another program, system or website by forging data, so it is regarded as a trusted system by users or other programs-usually deceiving programs, systems or users to reveal confidential information, such as user names and passwords.