You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
How in does the net seep - - opens the breach
  Add date: 07/12/2008   Publishing date: 07/12/2008   Hits: 74
Total 2 pages, Current page:1, Jump to page:
 

In the net seeps the thought stems from Trojan horse's thought---The fortress is easiest from the interior to break through, a large-scale website, a large-scale company, a large-scale goal, in the ectosarc, the manager would by any means possible to strengthen the guard and the patching crack, the conventional method goes in is impossible nearly.
In the net seeps how is the breach we obtains in net's man-machine perhaps in net's server, my experience has three kinds; first, seeps from the outside net substation to in net; second, in sends the wooden horse letter to obtain the net machine; third, in the use obtains the trust to obtain the net machine.
First, seeps from the outside net substation to in net
  Usually a big stand has many substations, has are many our unknown substation perhaps the unknown stand table of contents, the bigger stand development the opportunity are more in front of us, may obtain a substation server jurisdiction using the traditional technique, for instance pours into, guesses the solution, the overflow and so on. Obtains in the substation server's situation to have two thought: First, infiltrates through the substation to the master station perhaps other substations, needs them to assign has in net not to divide vlan the situation, by now might through obtain the password perhaps in the net smells searches and so on ways to obtain more substations. Second, through the substation server's analysis, lures in the manager the horse, for instance obtains manager's password in the substation server, collects in the substation the mailbox information, examined that the substation server's ftp information, collects the manager commonly used tool, perhaps the manager has the document which the possibility downloads (usually is manager transmits in tool's tools document) perhaps the manager preserves in the stand table of contents tool.
Second, in sends the wooden horse letter to obtain the net machine
  This should be one kind of social engineering and crack's union, for instance 0day, is also word perhaps pdf perhaps the ie0day display function place. Many people attain ie0day are use in hanging the horse directly, actually the ie0day sending a letter value is higher, how deceives in the mail url link which the manager clicks on you to send is also one kind of art. May also think that involves to his website question, his product's question, such thing manager would the click, must consider after the manager clicks, meets 100% this is a technical question. In the conventional wooden horse letter sending process, the chm wooden horse uses many, because is not killed, the hit probability may reach 100%, then must consider the manager will open? Even if is the guest takes in the machine the horse same to be also useful. For instance I in a wooden horse letter's transmission, the use appendix am chm which packs, the letter content am: after “uses your xx, I think quite well, but discovers some bug in the use process, did not know that is my machine question your this aspect had not considered, concrete information I by chart article form preservation in appendix.”Certainly must find the goal the mail address, this was very easy in the website perhaps google to find.

 

Other pages: : 1 * 2 * Next>>
Prev:Smells searches works as machine little enlightenment Next:Microsoft SQL Server SA jurisdiction newest invasion method

Comment:

Category: Home > hacker course