1、Network intrusion and attack techniques,Invasion and attack,intrusion : refers to any threat and damage behavior of the system resources (such as non-authorized or unauthorized access to system resources, wiretapping information), the implementation of intrusion “person“ referred to as an intruder.A
2、ttack: attack the intruder invasion techniques and methods. The invasion of the whole process (including the invasion preparation, attack, invade) are accompanied by an attacker, it is sometimes also known as the intruder attacker.,Port scanning,http ftp telnet smtp,The general means of hacking,Pass
3、wordviolent attacks,Name:john PassWord:john1234,The general means of hacking,Login with john Server,Get exploited Superuser privileges,Leave the back door Hide user,Changing the Home Information,The general means of hacking,DoS Attack,A through run out of system resources such as CPU, memory, bandwi
4、dth and disk space, to block or weaken the behavior of network, system or applications authorization. The attack principle is: the target host has been in a busy payable or has been in a state of waiting for a response to provide services for other hosts using a variety of means constantly sent to t
5、he target host false request or junk information.,SYN FLOOD,Land Attacks,Land attack is an attack technique often used in DoS attacks, the principle is: SYN packet with a specially built, and its source and destination addresses are set as a server address.,9,Assailant 172.18.1.1,Target 204.241.161.
6、12,Spoofed IP packet Source address: 204.241.161.12 Port 139 Destination address: 204.241.161.12 Port 139 TCP Open,G. Mark Hardy,LAND Attack: program sends a TCP SYN packet, the same source address and destination address, source and destination ports are the same, resulting in a DoS attack 。,10,Assailant 172.18.1.1,Target 204.241.161.12,Spoofed IP packet Source address: 204.241.161.12 Port 139 Destination address: 204.241.161.12 Port 139 Package was sent back to its own,G. Mark Hardy,“Denial of service“ example: LAND attack,