当前位置:网站首页>Six common ways for hackers to attack servers
Six common ways for hackers to attack servers
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
There is a certain chance that the server is invaded , There is also a certain inevitability , There are two kinds of hackers on the network , One is a hacker who casts a net aimlessly , One is targeted hackers who only invade designated targets , We call the former hacker rookie hacker , The latter kind of hacker is called advanced hacker . To put it simply , Novice hackers generally scan the network on a large scale , According to the scanning results, it is accidentally found that there are various vulnerabilities in the server system , So he launched an attack ; Advanced hackers are only interested in the target system or specify IP Expand scan , Use a variety of means to attack in an all-round way .
1. Server service information 、 Service software type and version .
Get the services provided by the target server and the software types of various services 、 edition . We should not only focus on ports , We should also pay attention to software , The software that provides the same service can also be different . for example , It also provides MAil service , have access to WebMail、IMail And other different software , and WebMail and IMail The loopholes are different , The method of exploiting vulnerabilities is also different from that of software .
2. Server Vulnerability Information
After collecting some information about preparing to attack the server , Hackers will detect every host on the server network , To find security vulnerabilities inside the system , This information is called vulnerability information , It mainly includes sharing information 、 Weak password information 、 Background information 、 Website version information 、 Website vulnerability information 、 Server Vulnerability Information .
Vulnerability exploitation and intrusion attempts
When enough information is collected , Hackers are about to attack . There are many kinds of vulnerabilities , There are different utilization methods and tools according to different vulnerabilities . Whether the attack was successful , Depends on whether the vulnerability exists and is properly exploited .
3. Target server permission acquisition and promotion
Successful invasion , You can obtain certain permissions of the target system , This is also the basic goal of the invasion . Get the permission of website administrator , You can add 、 Delete 、 Modify the news and all operation permissions in the background of the website . Get website Webshell. You can replace and modify the home page 、 Hang Black Pages 、 Hang a Trojan horse 、 Delete any program files of the website . Get the highest permission of the computer , It can achieve the effect of complete control .
The expansion of authority is what hackers often call power raising . Generally, hackers use certain vulnerabilities to attack the target system and obtain certain permissions on other machines remotely . Generally, the highest permission is not necessarily obtained by using remote vulnerabilities , And it is often only sufficient for the authority of an ordinary user , Such permission cannot realize the original intention of hackers . At this time, we need to cooperate with some vulnerabilities to expand the access , It is often extended to the administrator authority of the system .
Only after obtaining the highest administrator privileges , Hackers can do things like long-term control 、 Network monitoring 、 Clean up traces 、 Things like intranet penetration . After completing the permission promotion , These personal computers or servers will become hackers' chickens , For hackers to make full use of , Even part of it is used as a springboard 、 Puppet zombies attack and harm others
4. Long term control and removal of traces
After a successful invasion , Based on the different purposes of intrusion , Hackers usually choose two processing methods , First, long-term control , Convenient login to the target system anytime, anywhere : Second, clean up the traces , Avoid being found and tracked .
5. Long term control
Hackers usually plant Trojans or leave backdoors to achieve their long-term control .
Here is just a brief introduction Web Script Trojan , That's what we often say Webshell. After the script Trojan horse is transformed by various means such as deformation or encryption , Put it in a deep directory , Detection is very difficult , While the administrator is doing backup , It will also be backed up as a normal website program file . So since , Through this script, the Trojan horse , You can permanently control the website . A good script Trojan can be combined with system vulnerabilities to raise rights , And then control a computer .
6. Clean up traces
Whether it's invading websites , Or invade the computer 、 The server , When performing various intrusion operations on the target system , Always leave traces in website logs and system logs . According to these logs , Security personnel can analyze the behavior of hackers , And then fix the loopholes 、 Clean the Trojan horse and the back door . And according to these logs , Internet police can investigate and collect evidence, and then track and arrest criminal hackers .
边栏推荐
猜你喜欢

基于TCP的在线词典

虹科分享 | FPGA 实现的直通与存储转发切换延迟

Circular linked list and bidirectional linked list

Vivado IP核之定点数转为浮点数Floating-point

MerkleTree 构建QT实现UI

day09_ Static & Final & code block & abstract class & Interface & internal class

Ue5 light shadow basic shadow full resolution sawtooth shadow solution lumen

day10_ Exception handling & enumeration

基于FPGA的IIR型滤波器设计

使用STP生成树协议解决网络中的二层环路问题
随机推荐
Access、Hybrid和Trunk三种模式的理解
Design and simulation code of 4-bit subtracter based on FPGA
虹科白皮书 | 在工业4.0阶段,如何利用TSN时间敏感网络技术打造数字化工厂?
浅谈缺陷描写样式
Official tutorial redshift 08 light
unsigned right shift
Solve the error that the simulation output is STX under the frequency division module Modelsim
NoClassDefFoundError processing
Vivado IP核之复数浮点数除法 Floating-point
c语言面试准备一(谈谈理解系类)
Summary of winter vacation training (1.23~1.28) [first tier]
网站服务器80,443端口一直被恶意攻击怎么办?
[interview questions] the latest software test interview questions in 2022 (400) [with answers] continue to update
day15_泛型
不安全的第三方组件的漏洞如何做前置规避?
Vivado IP核之复数浮点数乘法 Floating-point
Circular linked list and bidirectional linked list
Thinking about MySQL taking shell through OS shell
Day16 set
day14_单元测试&日期常用类&字符串常用类