tailieunhanh - Bảo mật hệ thống mạng part 40

Đưa tất cả các kịch bản cùng nhau đưa ra một hình ảnh tốt về những gì các hacker đang làm. Một khi một hệ thống đích đã bị xâm nhập, ông từ xa có thể lấy sniffer các bản ghi và do đó thỏa hiệp nhiều hệ thống khác mà không được thâm nhập trong các cuộc tấn công đầu tiên. Việc tự động hóa quá trình thỏa hiệp này và thu hồi sẽ cho phép các hacker để được truy cập vào một số lượng rất lớn của các hệ thống rất nhanh chóng và sau đó mở. | 256 Network Security A Beginner s Guide Putting all of these scripts together gives a good picture of what the hacker was doing. Once a target system was compromised he could remotely retrieve the sniffer logs and thus compromise many other systems that were not penetrated during the first attack. The automation of this compromise and retrieval process would allow the hacker to gain access to an extremely large number of systems very quickly and then to broaden the scope of his success by retrieving and storing additional passwords. METHODS OF THE TARGETED HACKER A targeted hacker is attempting to successfully penetrate or damage a particular organization. Hackers who target a specific organization are motivated by a desire for something that organization has usually information of some type . In some cases the hacker is choosing to do damage to a particular organization for some perceived wrong. Many of the targeted DoS attacks occur in this way. The skill level of targeted hackers tends to be higher than that for untargeted hackers. Targets The target of the attack is chosen for a reason. Perhaps the target has information that is of interest to the hacker. Perhaps the target is of interest to a third party who has hired the hacker to get some information. Whatever the reason the target is the organization not necessarily just one system within the organization. Reconnaissance Reconnaissance for a targeted attack takes several forms address reconnaissance phone number reconnaissance system reconnaissance business reconnaissance and physical reconnaissance. Address Reconnaissance Address reconnaissance is simply the identification of the address space in use by the target organization. This information can be found from a number of locations. First DNS can be used to identify the address of the organization s Web server. DNS will also provide the address of the primary DNS server for the domain and the mail server addresses for the organization. Taking the .

TỪ KHÓA LIÊN QUAN