You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
Ten kinds may instantaneous ruin the entire Internet attack method analysis
  Add date: 08/13/2008   Publishing date: 08/13/2008   Hits: 18
Total 2 pages, Current page:1, Jump to page:
 
Internet's security more and more is taken in today by more people. The people use each means to protect the network security. Might always also not be able to avoid like this such attack, the crack. The following example lifted ten kinds to be possible instantaneous to ruin the entire Internet's attack method, let everybody has a look. Also hoped everybody when daily surfer or work can note.

1. DNS (domain name analysis service) is subverted. Internet's normal operation depends entirely on DNS. If some people destroy - - or are worse, has subverted - - the website visit cornerstone, the people no longer believe that any URL website, the network cheat will also become is similar to a child's play, because: Holds DNS, holds the Internet.

2. Corpse network attack! Innumerable “the meat chicken” the computer has been controlled, hides in the hacker who gloomy moist does not ventilate the corner only need issue an order, then initiates the attack. MessageLabs Matt the Sergeant estimate corpse network virus has controlled 5-10 1,000,000 computers (, but some people think this digit such in a big way not). Now, these corpse robot let us receive a box to fill the junk mail, but passed, they were only use for to give vent to dissatisfaction or to extort threaten the website. But finally, the evolution will be an armament race, but a side not any rule restraint.

3. The physical equipment breaks down large-scale. If breaks off several Mediterranean Sea's electric cables, may let tens of thousands of users not have the net to be possible on. If some people do the destruction deliberately, the consequence will be inconceivable!

4. The dismemberment is N isolated network. From ancient Usenet until now, the people have been carrying on “the birds” grouping behavior. Nicholas Carr in a book pointed out in "The Big Switch": A research declares a community, no matter conservative or free, its 90% link have not been able to leave this community. Even, carries on the disposition after certain reference link tool, may cause the visitor to pause in has in the same viewpoint website. Such result can be what kind of? A each one independent information isolated island, the people share are the same viewpoint and the thought that and believed firmly gradually they only have, the correct answer. Internet's ancestors have the foresight early: This will be dream of globalized community being disillusioned.

5. Presents virus a in the true sense, breaks through the router. What Internet's self-repair mechanism depending on is the boundary gateway agreement, namely BGP. But, if some people invade in the router, what matter will have? in 2006, in NANOG demonstration documents, Cisco weakness which collapsed at the first blow to these has carried on the discussion, concluded that “most had the ruinous destruction from to carry on to the trust router intends to harm the disposition.”If BGP collapses, is not only unable to prevent the Internet current capacity to overload, will also lose registers the router and its repair ability.

 
Other pages: : 1 * 2 * Next>>
Prev:mssql SA jurisdiction newest use method Next:Hacker skill: Gains Webshell using the Log backup

Comment:

Category: Home > hacker course