【正文】
Bot。 ? DRDoS(Distributed Refletor Denial of Service):attacker uses a fake source IP (Target ‘s) and send connection to several legilimate servers,when these servers respond they send the ACK packets to the attacker’s target. 四類(lèi)攻擊之四:拒絕服務(wù) DDoS圖 攻擊過(guò)程 Step 1: Reconnaissance 偵探 The most mon method is social engineering, or tricking an employee into revealing sensitive information, Other methods include dumpster diving(搜索廢物箱) Step 2: Scanning 掃描(通過(guò)各種軟件工具) by scanning an anization’s puter software and work configuration to find possible entry points. 攻擊過(guò)程:信息收集 挖掘漏洞 Step 3: Gaining access 竊取訪問(wèn)權(quán) take over a system and work by using a stolen password to create a phony account, or by exploiting a vulnerability that allows them to install a malicious Trojan horse, or automatic “bot” that will await further mands sent through the Inter. 攻擊過(guò)程:實(shí)施攻擊 Step 4: Maintaining access 維護(hù)訪問(wèn)(安裝惡意軟件,修改配置,獲取Root權(quán)完全控制該主機(jī)或網(wǎng)絡(luò)設(shè)備,并為了防范其它黑客而答補(bǔ)?。? Once an attacker has gained unauthorized access, he or she may secretly install extra malicious programs that allow them to return as often as they wish. These programs, known as root kits or back door” run unnoticed and can allow an attacker to secretly access a work at will. If the attacker can gain all the special privileges of a system administrator, then the puter or work has been pletely taken over, and is owned by the attacker. Sometimes the attacker will reconfigure a puter system, or install software patches to close the previous security vulnerabilities just to keep other hackers out. 攻擊過(guò)程:安裝后門(mén) Step 5: Covering tracks 掩蓋痕跡(通過(guò)清除日志) Sophisticated attackers desire quiet, unimpeded access to the puter systems and data they take over. They must stay hidden to maintain control。 The root kit or Trojan horse programs often allow the attacker to modify the log files of the puter system, or to create hidden files to help avoid detection by the legitimate system administrator. Security systems may not detect the unauthorized activities of a careful intruder for a long period of time. 攻擊過(guò)程:清除日志 掩蓋痕跡