【正文】
? DRDoS(Distributed Refletor Denial of Service):attacker uses a fake source IP (Target ‘s) and send connection to several legilimate servers,when these servers respond they send the ACK packets to the attacker’s target. 四類攻擊之四:拒絕服務(wù) DDoS圖 攻擊過程 Step 1: Reconnaissance 偵探 The most mon method is social engineering, or tricking an employee into revealing sensitive information, Other methods include dumpster diving(搜索廢物箱) Step 2: Scanning 掃描(通過各種軟件工具) by scanning an anization’s puter software and work configuration to find possible entry points. 攻擊過程:信息收集 挖掘漏洞 Step 3: Gaining access 竊取訪問權(quán) take over a system and work by using a stolen password to create a phony account, or by exploiting a vulnerability that allows them to install a malicious Trojan horse, or automatic “bot” that will await further mands sent through the Inter. 攻擊過程:實施攻擊 Step 4: Maintaining access 維護(hù)訪問(安裝惡意軟件,修改配置,獲取Root權(quán)完全控制該主機或網(wǎng)絡(luò)設(shè)備,并為了防范其它黑客而答補丁) Once an attacker has gained unauthorized access, he or she may secretly install extra malicious programs that allow them to return as often as they wish. These programs, known as root kits or back door” run unnoticed and can allow an attacker to secretly access a work at will. If the attacker can gain all the special privileges of a system administrator, then the puter or work has been pletely taken over, and is owned by the attacker. Sometimes the attacker will reconfigure a puter system, or install software patches to close the previous security vulnerabilities just to keep other hackers out. 攻擊過程:安裝后門 Step 5: Covering tracks 掩蓋痕跡(通過清除日志) Sophisticated attackers desire quiet, unimpeded access to the puter systems and data they take over. They must stay hidden to maintain control。 ? DDoS攻擊分布式拒絕服務(wù)攻擊:攻擊者通過分發(fā)和傳播攻擊腳本到多個中間主機 ,然后組織這些主機一起向某個目標(biāo)發(fā)起高強度攻擊。 社會工程攻擊難以檢測,因為是利用了人容易欺騙的原因,防止這種攻擊的最佳的辦法是持續(xù)的用戶安全培訓(xùn),增強安全意識。 心理類方法包括通過電話或者在線通訊,如致電 Helpdesk假冒成內(nèi)部員工尋求管理員 Reset口令。 社會工程攻擊又分為兩類:物理的和心理的。強加密協(xié)議和端點驗證機制能夠阻止這類攻擊,如用 SSH代替 tel,同時采用文件加密機制或者 Session checksums會話校驗碼等技術(shù)。同時作為系統(tǒng)管理員及時的系統(tǒng)補丁也是防范這種攻擊的有效方法。 競爭條件攻擊還常發(fā)生在對共享文