当前位置:网站首页>Six common ways for hackers to attack servers
Six common ways for hackers to attack servers
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
There is a certain chance that the server is invaded , There is also a certain inevitability , There are two kinds of hackers on the network , One is a hacker who casts a net aimlessly , One is targeted hackers who only invade designated targets , We call the former hacker rookie hacker , The latter kind of hacker is called advanced hacker . To put it simply , Novice hackers generally scan the network on a large scale , According to the scanning results, it is accidentally found that there are various vulnerabilities in the server system , So he launched an attack ; Advanced hackers are only interested in the target system or specify IP Expand scan , Use a variety of means to attack in an all-round way .
1. Server service information 、 Service software type and version .
Get the services provided by the target server and the software types of various services 、 edition . We should not only focus on ports , We should also pay attention to software , The software that provides the same service can also be different . for example , It also provides MAil service , have access to WebMail、IMail And other different software , and WebMail and IMail The loopholes are different , The method of exploiting vulnerabilities is also different from that of software .
2. Server Vulnerability Information
After collecting some information about preparing to attack the server , Hackers will detect every host on the server network , To find security vulnerabilities inside the system , This information is called vulnerability information , It mainly includes sharing information 、 Weak password information 、 Background information 、 Website version information 、 Website vulnerability information 、 Server Vulnerability Information .
Vulnerability exploitation and intrusion attempts
When enough information is collected , Hackers are about to attack . There are many kinds of vulnerabilities , There are different utilization methods and tools according to different vulnerabilities . Whether the attack was successful , Depends on whether the vulnerability exists and is properly exploited .
3. Target server permission acquisition and promotion
Successful invasion , You can obtain certain permissions of the target system , This is also the basic goal of the invasion . Get the permission of website administrator , You can add 、 Delete 、 Modify the news and all operation permissions in the background of the website . Get website Webshell. You can replace and modify the home page 、 Hang Black Pages 、 Hang a Trojan horse 、 Delete any program files of the website . Get the highest permission of the computer , It can achieve the effect of complete control .
The expansion of authority is what hackers often call power raising . Generally, hackers use certain vulnerabilities to attack the target system and obtain certain permissions on other machines remotely . Generally, the highest permission is not necessarily obtained by using remote vulnerabilities , And it is often only sufficient for the authority of an ordinary user , Such permission cannot realize the original intention of hackers . At this time, we need to cooperate with some vulnerabilities to expand the access , It is often extended to the administrator authority of the system .
Only after obtaining the highest administrator privileges , Hackers can do things like long-term control 、 Network monitoring 、 Clean up traces 、 Things like intranet penetration . After completing the permission promotion , These personal computers or servers will become hackers' chickens , For hackers to make full use of , Even part of it is used as a springboard 、 Puppet zombies attack and harm others
4. Long term control and removal of traces
After a successful invasion , Based on the different purposes of intrusion , Hackers usually choose two processing methods , First, long-term control , Convenient login to the target system anytime, anywhere : Second, clean up the traces , Avoid being found and tracked .
5. Long term control
Hackers usually plant Trojans or leave backdoors to achieve their long-term control .
Here is just a brief introduction Web Script Trojan , That's what we often say Webshell. After the script Trojan horse is transformed by various means such as deformation or encryption , Put it in a deep directory , Detection is very difficult , While the administrator is doing backup , It will also be backed up as a normal website program file . So since , Through this script, the Trojan horse , You can permanently control the website . A good script Trojan can be combined with system vulnerabilities to raise rights , And then control a computer .
6. Clean up traces
Whether it's invading websites , Or invade the computer 、 The server , When performing various intrusion operations on the target system , Always leave traces in website logs and system logs . According to these logs , Security personnel can analyze the behavior of hackers , And then fix the loopholes 、 Clean the Trojan horse and the back door . And according to these logs , Internet police can investigate and collect evidence, and then track and arrest criminal hackers .
边栏推荐
猜你喜欢

Day16 set

What is the lifecycle of automated testing?

FIR滤波器设计(1)——利用matlab的fdatool工具箱设计FIR滤波器参数

使用STP生成树协议解决网络中的二层环路问题
![[leetcode skimming] array 2 - binary search](/img/50/c006cbe5a91774c99eb782d9203fa0.png)
[leetcode skimming] array 2 - binary search

2022 summer second day information competition learning achievement sharing 1

On defect description style

网络安全学习(二)

Vivado IP核之浮点数乘除法 Floating-point

虹科分享 | 带你全面了解“CAN总线错误”(四)——在实践中生产和记录CAN错误
随机推荐
Thinking about MySQL taking shell through OS shell
day15_泛型
一文看懂网络安全五年之巨变
Official tutorial redshift 08 light
五、 无线通信网
Vivado IP核之定点数转为浮点数Floating-point
虹科案例 | PAC:一种整合了softPLC控制逻辑、HMI和其他服务功能的集成控制解决方案
STP生成树原理及选举规则举例
Joint use skills of joiner.on and stream().Map
Vivado IP核之浮点数乘除法 Floating-point
三、广域通信网
七、 下一代互联网IPV6
虹科分享 | 如何测试与验证复杂的FPGA设计(1)——面向实体或块的仿真
day10_异常处理&枚举
Circular linked list and bidirectional linked list
八、 网络安全
Noi online 2022 popular group problem solving & personal understanding
Rowkey design
[leetcode skimming] array 1 - double pointer
day17_集合下