The hacker has a multi-black-hacking group, and the technical origin is overview.

zhaozj2021-02-08  318

Author: Cao Zheng

Foreword: There are too many topics about hackers. Some people say they are heroes. Some people say they are criminals. Some people have a five-body trend that they admire, some people hate the teeth of teeth. So, what is the special group you should look at this special group, and what kind of people they are? The author did not dare to come from the next conclusion, so I had to let the bricks to introduce jade, and I hope that there is a fair hacker and give a hacker.

How cool hacker is

The hacker in the movie is often a cool style. Whether it is a famous "hacking empire", or our domestic is a "rose hacker", the windbreaker sunglasses can not lack the head, the skill, the handsome, handsome. The entertainment film is naturally entertainment, the understanding of the entertainment industry is actually a rebel, whether it is a positive image, and the negative image is also a rebel, and the big arrival is the people interested in the instrument. If there is a hacker on the historical movie, it is estimated that it is a hacker, it is going to be black.

The real hacker is not cool, the manner is not cool, but how high-level hackers are good at thinking, they often reflect the jump of thinking, let some of the city can't keep up, It is inevitable. Of course, if you don't want to communicate too much, it is best not to talk about technical issues, for those top hackers, when you ask some technical questions, if you can't meet the intermediate hackers, you may be difficult to understand that he is talking about him. what.

2. How good hacker is in the end (bad)

Public opinion is always divided into two factions, and a group thinks that this is a group of brave resistance, they subvert the power, maintain fair, and use their magical technology to overwritten the color of the network. The other party is a nose to them. It is a group of criminals who are completely tonic and high, more shameful than their criminals. They actually have a frequent history of their criminal history.

In fact, the two factions of public opinion make sense, but there is a narrow, although hackers are specific people, like ordinary people, there are three or six-year-old, different motives, different levels, different The behavior habits, I don't carefully analyze it, and you can divide hackers into "bad" hackers and "good" hackers. From the motivation, research, exploration, can be called "good" hacker, they are more invasive rather than destroyers, they enjoy the fun of entrunction and discover the fun, not the fun of destruction The behavior of their habits is to send a Mail to the other party network after invading, and the other party is looking for new goals, or more professional giving a Mail, in the most famous Hack Forum in the International International. Announcement (Please note that it is issued, the problem does not involve the invasion and intrusion experience, only the method, the consequences for the platform and possible), "good" hacker sometimes does bad things, because sometimes they can't be correct Assess a security problem, there is unexpected destruction, which is not their intention, they will feel sad. "Bad" hackers are destroyed and marked with destruction, even those who are "patriotic" sheepskin, they are still a crime, and they often have no actual situation. Patriotic contribution.

Of course, regardless of "good" hacker or "bad" hacker, follow the law is the obligation to every citizen. At present, the large number of hackers have become a safe founder from the invaders from the behind-the-scenes, which is worthy of the title. of. In fact, as long as there is software, there will be a vulnerability, as long as there is a vulnerability, there will be a discovery of vulnerabilities, using a vulnerability, which is inevitable, and it is also a fundamental environment of hackers to survive, how to find vulnerabilities, assessment The vulnerability is something in the technical category, how to use vulnerabilities is something in the category of ideology, put hackers and criminals, etc., for those who concentrate on systematic research, it is unfair.

3. Hackers have more black

I recently saw Donews and the author introduced what the so-called genius teenage hacker, but unfortunately, I didn't see where they geniuses. How to evaluate a hacker's ability and quality, it is really difficult to find a suitable standard, the author is hard, I hope to provide a hacking model here to row the so-called "master" of the shape.

Top hackers - basic research

These people are real geniuses, and they are in charge of the operating system, all levels of network service agreements. They can use assembly, C language, they don't care for objects and those with flowers with flowers, GCC is usually their best tools. They are the creation of hacking technology. Their interest is to find problems from operating systems, application software, and usually research by disassembly without source code. If you don't understand above, please see the following The difference between two sentences:

A ordinary hacker said that I found a stop in Win2000 Server, I have notified the webmaster, he has already done patch.

A top hacker said that I found Micro OSFT, they have made Patch packs for people.

Here, ordinary hackers are just through various information channels (such as network security training, a security website, etc.) know what Win2000 Server has a vulnerability, and knows how to use vulnerabilities, and basic researchers are truly found this vulnerability from the root People, high differences. Unfortunately, in China's "black stars", very few experts, basic research type experts, usually exist in research centers such as Microsoft, Sun, IBM, they In addition to the outlook for their own system, there are more important research research on competitors. In addition, internationally renowned network security companies have such an expert. At present, the large number of domestic network security companies, only to track foreign security dynamics and latest news, can form basic research capabilities, according to I know that only the Zoomlion Green League (currently submit multiple security vulnerabilities reports to Microsoft, All are verified, the notorious NIMDA virus is to use the Microsoft security vulnerability they find).

Senior hacker - tool creation

They are all programs, and they are not in top hackers. They are equivalent to the top hackers. The only lack of thoughts and luck may be some genius. But in fact, the leader in them, the overall quality is absolutely not under top hackers.

We know that the words of the hacker have become such a customary tower, and the flooding of the simplified tool is the culprit, and these people who create tools have created a large number of safety knowledge, the so-called "hackers" .

Sniffer, violent cryptographic, Trojan, and Red Code, Blue Code, Nimda virus, can be seen as a hacker tool, of course, "bo", bo ", bo, Bo, The author, the familiarity of the Microsoft operating system kernel, is to make Microsoft's technical experts have to sweat. At present, many network security companies in my country are writing firewalls. The core people in this can count the tool creation, and they integrate hackers into tools, thereby achieving attacks or anti-attack purposes. However, it is a pity that most of the domestic firewall is plus a Chinese shell with the kernel's kernel, and there is still not much to really write the kernel.

Intermediate hacker - manipulating tool type

They usually have good safety knowledge and technical skills, among which also have the strength of creative tools, but there is a less resistance and the system's cookedness, so it is still uses existing tools to achieve their intrusion / attack attempt.

They are clearly clear, what technology goes to invading / attack, under this clear understanding, they choose and find the right tools to complete, they use their technical idea to operate tools and complete the goals.

Many "black pearles" that are speculated by the media are usually stayed on this horizontal line.

Primary hacker - tool manipulation type

These people have very rough, they blurred some online security things, they have a few tools, and can complete some attack / intrusion tasks according to the tools, and these people often love, those I claim to be a hacker on QQ, and the water is buried every other forum, most of these "high" people. And they are often the most dangerous, doing things, can't assess the harm of their behavior, is their common disease.

Summary: It is simply divided into four levels, which also have unusual statements, such as some people who think of basic research security experts and safety experts who make firewall systems should not be a hacker, but they will understand, The original hacker defined is these findings, patching people, in other words, this is a technical title, but because these technologies are widely used for damage, viruses, invasion, etc., hackers' title has produced morality and Legal issue.

In order to clearly express what I mean, I will make a metaphor.

Basic research type hacker is a professor of ballistic, aerodynamics, and blasting theory. They laid ideas for the birth and development of weapons. Tools to create hackers is a gun designer, they are proficient in the above theory and design weapons according to these theory. firearms. The handling tool is better than the special forces. They are experts using weapons. They know what they do, may be killing, may be rescued, maybe it is sneak; they know how to use the right weapons to complete the task, and can be based on some aerodynamic power Learning, ballistic principles adjust firearms, making it more suitable for climate, combat tasks and personal habits. The tool operated hacker is only the ordinary infantry that will only be loaded with AK47, and they will only take a weapon to shoot, except for it. The quantity, also reflects the same pyramid type, ordinary soldiers thousands, the special soldiers only have a small hand, and the gun designer is more phoenix, as for the professor of the explosion, the real god dragon will not see it.

4. Hackers have more cattle (hacker technology origin analysis)

Some people say hackers are a group of people who are unable to develop. Some people say that they have started a group of technically bored people. In fact, these statements have been separated from a basic premise. The origin of hackers is the technical level, not the ideological level.

As long as there is software, there must be a vulnerability. As long as there is a vulnerability, there must be a person who has found a vulnerability. Now the system is more complicated, the more complex system, the more you have a hidden vulnerability, see See why Windows will keep Patch after the launch, you know how much hacker's career is. Some people must be strange, why can't I make a safe system in one time? Is there any people who design the system? Is it stupid?

Why a system will have a safety hazard, in fact, it is very simple, a system, or a set of protocols, or an application, the beginning of the design, is to meet some normal applications, under normal operation (including the correct data interaction) And the wrong data interaction under normal execution), the system is usually stable and reliable, an excellent system analyst, even with enough network security common sense, he is often in designing and building a system, often in accordance with common sense and habits The birth of the sexual thinking, and the emergence of the security vulnerability is a very reasonable operating environment, and when data is interacted with the system in a very special (usually human carefully ticked), the system is illustrated by the system; Only the genius with unconventional thinking is likely to find problems in the fully correct system of routine thinking, and unconventional thoughts, not to talk about it.

For a simple example, Microsoft WinNT and Win2000 are required to enter password authentication, regular thoughts are, enter the correct account and password, refuse to land by authentication, enter the system, enter the wrong account and password, refuse to log in. The security vulnerability found in 2000 is actually, press Ctrl space when entering an account, then open the Chinese input method, then pass the Chinese input method - Help - Topic Read - Options -Internet Options - Home Settings - Open Home This One The operation of the string and lugs directly and the landing system is jumped. This is a completely unconventional operation, which has a unreasonable effect on a conspidious operation, and people who use traditional thinking analysis and considering problems, let them have such a kind of behavior at the beginning of the system design. Prevention and circumvention, it is indeed difficult. From the help of Chinese input method, thinking jumped into Windows certification, the thinking ability of top hackers, can be seen from it. I was in Tianjin Internet cafes, successfully used the same principle to break through Meiping network management system, but for the follow-ups like me, just like the cat and painting, stare at the latest security vulnerability to see, pick it. For research, there is no need for additional IQ and jumping thinking.

to sum up:

It's tired, just want to explain the following points:

Hackers are a technical level noun, which indicates that there is enough technology to find security issues from the system and know how to assess these security issues, because there is always a safe vulnerability, so there is hacker existence, as for them These technologies are used in network security, basic research, or to make some security testing tools, or simply destroyed, invading, which is the topic of the moral level, not "hacker". The word is covered. For example, the famous Bo, everyone said that Trojan, or even the latest anti-virus disks regard him as a virus treatment, but if you use the remote management of the system, you will find it is really excellent and easy to use. It is also a knife, you can go to kill, you can also save people. Wrong is not a knife, but people.

The idea that expects to prevent hackers is very ridiculous. This group will never disappear, and there will always be controversial. Here, I will tell the hacker attack means, will introduce the basic ideas, principles and protective ideas of the following attack methods, I hope everyone will continue to pay attention.

Refusal service attack method

Troima Max

Sniffing detection (packet interception) method

Violent cracking

Special word compliant

Overflow attack method

转载请注明原文地址:https://www.9cbs.com/read-769.html

New Post(0)