Common network attacks include: 1. Password intrusion, which refers to using the account and password of some legitimate users to log in to the destination host; 2. Trojan horses, which are often disguised as utility programs or games to lure users. Open; 3. WWW spoofing, the web page being visited has been tampered with by hackers; 4. Node attack; 5. Network monitoring, which is a working mode of the host.
Common network attacks include:
1. Password intrusion refers to using the accounts of certain legitimate users Log in to the destination host with the password and then carry out the attack. The premise of this method is that you must first obtain the account of a legitimate user on the host, and then decipher the legitimate user's password.
2. Trojan horses are often disguised as utility programs or games to induce users to open them. Once users open the attachments of these emails or execute these programs, they will remain in the computer and remain in the computer. There is a program hidden in your computer system that can be executed quietly when Windows starts.
3. WWW spoofing. The web page you are visiting has been tampered with by hackers, and the information on the web page is false! For example, a hacker rewrites the URL of the webpage that the user wants to browse to point to the hacker's own server. When the user browses the target webpage, he actually makes a request to the hacker's server.
4. Node attack. After an attacker breaks through a host, he often uses this host as a base to attack other hosts. They can use network monitoring methods to try to break into other hosts on the same network; they can also attack other hosts through IP spoofing and host trust relationships.
5. Network monitoring is a working mode of the host. In this mode, the host can receive all the information transmitted on the same physical channel in this network segment, regardless of the sender of the information. and who the recipient is.
Extended information:
Since the targets of attacks and intrusions are computers on the network, once they succeed, they will Thousands of computers on the network are paralyzed. This causes huge economic losses to computer users. For example, the economic losses caused by computer crimes in the United States amount to tens of billions of dollars every year. On average, the economic losses caused by a computer crime case are dozens to hundreds of times that of ordinary cases.
Threatens social and national security. Some computer network attackers often target computers in key government departments and military departments for various purposes, thereby posing a threat to society and the country.
Related free learning recommendations:Website production video tutorial
The above is the detailed content of What are the common cyber attacks?. For more information, please follow other related articles on the PHP Chinese website!