Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the attack of obtaining passwords by monitoring network traffic in computer networks?

2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article mainly introduces what kind of attack the attack of obtaining password by monitoring network traffic in the computer network belongs to. It has a certain reference value. Interested friends can refer to it. I hope you will gain a lot after reading this article. Let the editor take you to know it.

Monitoring network traffic to obtain password belongs to replay attack; replay attack, also known as replay attack and playback attack, means that the attacker sends a packet that has been received by the destination host to deceive the system, which is mainly used in the process of identity authentication. destroy the correctness of authentication.

Replay the attack.

Replay attack (Replay Attacks), also known as replay attack and playback attack, means that the attacker sends a packet that has been received by the destination host to deceive the system, which is mainly used in the identity authentication process and destroys the correctness of authentication.

The replay attack can be carried out by the initiator or by the enemy who intercepts and retransmits the data. Attackers use network monitoring or other means to steal authentication credentials, and then re-send it to the authentication server. Replay attack can occur in any process of network communication, and it is one of the common attacks by hackers in the computer world.

Extended data

After attackers use FTP, Telnet and other tools to take advantage of system vulnerabilities to enter the target host system to gain control, they will do two things: clear the records and leave the back door. He will change some system settings and place a Trojan horse or other remote manipulation program in the system so that he can re-enter the system later without being noticed.

Most backdoors are precompiled and can be used only by changing the time and permissions, and even the new file is the same size as the original file. Attackers typically use rep to pass these files so that no FTB record is left. After clearing logs, deleting copied files and other means to cover their tracks, the attacker moves on to the next step.

Thank you for reading this article carefully. I hope the article "what is the attack of getting a password by monitoring network traffic in a computer network" shared by the editor is helpful to everyone. At the same time, I also hope that you will support it and pay attention to the industry information channel. More related knowledge is waiting for you to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report