当前位置:网站首页>[principle and technology of network attack and Defense] Chapter 7: password attack technology Chapter 8: network monitoring technology
[principle and technology of network attack and Defense] Chapter 7: password attack technology Chapter 8: network monitoring technology
2022-07-07 18:02:00 【Godams】
7.1 summary
(1) static password
According to whether it is necessary to contact ⽹, It is divided into
- Online cracking -
Offline cracking
According to whether it is beneficial ⽤ individual ⼈ Information , It is divided into
- Ramble attack : It's not off ⼼ Information of the attack object ,⽽ Only focus on the number of guesses allowed , Guess more ⼝ Make . be based on PCFG Algorithm and Markov The algorithm is ⽬ Pre mainstream 2 A wandering attack algorithm
- Directed against : Guess the given as quickly as possible ⽬ mark ( Such as ⽹ standing 、 individual ⼈ The computer ) Of ⼝ Make . therefore , The attacker will benefit ⽤ Related to the attack object ⼈ Information (⼈⼝ Learn relevant information ), Enhance the pertinence of speculation ;⽤ Household in other ⽹ Leaked in the station or system ⼝ It can also be benefited by attackers ⽤ Come on in ⾏ Directed against .
Major security threats :
- Password monitoring : The main reason is that it may leak during transmission
- Intercept / replay
- Strike out at ( Brute force )
- Simple password guessing
- Dictionary attack
- Forge server attack
- Password disclosure : Attackers through society ⼯ Engineering, etc ⼿ Segment theft ⽤ Household ⼝ Make
- Directly crack the system password file
(2) One-time password
⼜ be called ⼀ Secondary ⼝ Make . stay ⽤ During user login , be based on ⽤ Household ⼝ Lingjia ⼊ Cause of uncertainty ⼦, Yes ⽤ Household ⼝ Cause of order and uncertainty ⼦ Into the ⾏hash Transformation , Submit the result as authentication data to the authentication server . The authentication server is receiving ⽤ After the authentication data of the user , take ⽤ Authentication data and ⾃⼰⽤ alike hash The value calculated by the algorithm advances ⾏⽐ Yes , from ⽽ Realize to ⽤ Authentication of household identity . bring ⽤ Every time a user logs in, they make ⽤ The authentication data of are all different , carry ⾼ The security of login process . dynamic ⼝ Ling Cai ⽤⼀ Time ⼀ Secret mechanism , It is indestructible in principle .
According to the generation principle, it can be divided into asynchronous and synchronous authentication technologies : Asynchronous response based on challenge ( Take the number of challenges as the variable ) Realization , Synchronization authentication technology includes time-dependent clock synchronization authentication technology ( Take time as the uncertainty factor , The clock is required to be strictly synchronized ) And time independent event synchronization authentication technology ( Take the password of the last authentication as the parameter of the default challenge )
Security Analysis
- ⽹ Network eavesdropping : Because in ⽹ Transmitted on the network ⼝ The order is passed hash Transformed data . Even if it is overheard ,⿊ Keye ⽆ Method obtains by hashing values ⽤ Household ⼝ Make .
- ⼝ Let out : Can only effectively resist . Because if ⽤ Improper storage , Or will it be passed by the attacker ⾮ technology ⼿ Segment theft .
- Dictionaries / Strike out at : Because of make ⽤ Double cause ⼦ Into the ⾏ Hash transformation ⽣ become . Dictionaries / Exhaustion becomes difficult . But if ⼝ Make ⻓ Too short , It is still easy to be broken .
- Intercept / replay : Because of plus ⼊ The cause of uncertainty ⼦,⽤ Users submit different data every time . The data intercepted before is meaningless in the next authentication .
- Forge server attack :⼤ In most modes, only server pair ⽤ Certification of customers , No access to the server ⾏ authentication . Within the validity period , The attack still worked .
8.1 summary
Refers to the computer ⽹ Collaterals ⼝ Intercepted ⽹ Data communicated between computers on , Also known as ⽹ Network sniffing
The original intention of network monitoring technology is to facilitate network management to monitor data communication , convenient 、 Effectively discover all kinds of anomalies and unsafe factors in the network .
Network monitoring mainly solves two problems : Network traffic hijacking 、 Collect and analyze data at the monitoring point
8.2 Network traffic hijacking
The network can be divided into shared network environment 、 Switched network environment
Network eavesdropping is mainly in the non shared network environment
Switched network traffic hijacking
End ⼝ Mirror image : Put the switch ⼀ One or more ends ⼝ Data is mirrored to a certain end ⼝ Of ⽅ Law
MAC flooding : In the local area ⽹ Sending in is deceptive MAC Address source data .CAM The table will be filled with forged MAC Address record . As records increase , And CAM The switch memory associated with the table will be exhausted , At this time, the switch is in a mode similar to the hub ⼯ do , To all other physical terminals ⼝ Forward data .
ARP cheating
- benefit ⽤ARP request
host A With “ host B Of IP And host A Of MAC Address ” send out ARP Requesting this fraudulent request will refresh the local ⽹ Of all hosts in ARP cache . Make all sent to B All packets are sent to A.
But it's time to ⽅ Law affects ⾯⼤, Easy to find , host B Will pop up IP Address conflict prompt . - benefit ⽤ARP Respond to
host A With “ host B Of IP And host A Of MAC Address ” send out ARP Respond to the host C, Even if the host C It has not been sent to the host B Of ARP request .ARP Agreement is ⽆ Status agreement , The host does not check ⾃⼰ Have you sent ARP request , Will receive ARP Respond to . So at this time, the host C issue B All requests will be sent to A host . targeted , Except for the cheated host C, Other hosts are not affected ⼲ Disturb , Forged host B There will be no warning messages on
- benefit ⽤ARP request
End ⼝ Pirate ⽤: Use switches MAC Address table self-learning mechanism , Make the victim MAC Point to the port address of the attacker switch
DHCP cheating :( Dynamic Host Configuration Protocol ) The hacker is simulated as DHCP The server
DNS hijacked
CDN⼊ Invade
WIFI Traffic hijacking
边栏推荐
- Simple loading animation
- Pro2: modify the color of div block
- 开发一个小程序商城需要多少钱?
- Machine vision (1) - Overview
- Functions and usage of serachview
- Dateticket and timeticket, functions and usage of date and time selectors
- Use onedns to perfectly solve the optimization problem of office network
- zdog.js火箭转向动画js特效
- Tips of the week 136: unordered containers
- <代码随想录二刷>链表
猜你喜欢

【深度学习】3分钟入门

Introduction to OTA technology of Internet of things
![[OKR target management] value analysis](/img/d9/1f0022d3aa34cc10f1151e181dd695.png)
[OKR target management] value analysis

Vscode three configuration files about C language

【解惑】App处于前台,Activity就不会被回收了?

Pytorch中自制数据集进行Dataset重写

TaffyDB开源的JS数据库

Sanxian Guidong JS game source code

Chapter 3 business function development (user access project)

toast会在程序界面上显示一个简单的提示信息
随机推荐
[trusted computing] Lesson 12: TPM authorization and conversation
【OKR目标管理】案例分析
漫画 | 宇宙第一 IDE 到底是谁?
Slider plug-in for swiper left and right switching
Mui side navigation anchor positioning JS special effect
深入浅出【机器学习之线性回归】
Functions and usage of serachview
Robot engineering lifelong learning and work plan-2022-
[deep learning] 3 minutes introduction
Audio Device Strategy 音频设备输出、输入 选择 基于7.0 代码
Tips of this week 141: pay attention to implicit conversion to bool
Threshold segmentation based on RGB image and threshold adjustment by sliding
运行yolo v5-5.0版本报错找不到SPPF错误,进行解决
[OKR target management] value analysis
Hutool - 轻量级 DB 操作解决方案
三仙归洞js小游戏源码
回归测试的分类
线上比赛相关规则补充说明
数学分析_笔记_第11章:Fourier级数
[answer] if the app is in the foreground, the activity will not be recycled?