This article is a mirror article of machine translation, please click here to jump to the original article.

View: 11287|Reply: 0

[Safety Knowledge] Popular Science: Explain in detail the reasons for the formation of traffic hijacking

[Copy link]
Posted on 1/17/2015 8:32:20 AM | | |
Traffic hijacking, this ancient attack has been silent for a while, and has recently begun to make a lot of noise. Many well-known brands of routers have been exposed to security vulnerabilities, which has attracted domestic media reports. As long as the user does not change the default password, open a web page or even a post, the router configuration will be secretly modified. The internet became precarious overnight.
The attack is still the same kind of attack, and the report is still the same brick reminder, so that everyone is numb. We have long been accustomed to various hijackings by operators and frequent advertising pop-ups, and everyone is helpless. There has been no loss for so many years, so I just turned a blind eye.
In fact, it is relatively lucky to be hijacked by operators. Compared with the mysterious hackers hidden in the dark, operators still have to abide by the law as public enterprises, and although ad hijacking is unscrupulous, there is still a bottom line. No, it can make you see advertisements, and it can be regarded as a reminder that there is a risk of hijacking on the current network, so you have to pay attention; On the contrary, everything seems to be calm and unusual, and there may be a big spy lurking in the network, waiting for you to take the bait at any time - this is not as simple as playing an advertisement, but to steal the account for money!
Will I be hijacked?
Many people have the wrong view that only those with weak security awareness will be invaded. As long as various professional firewalls are installed, system patches are updated in a timely manner, all passwords are very complex, and hijacking will definitely not be my turn.
Indeed, a person with a strong sense of security is naturally not easy to be invaded, but it is only a traditional virus Trojan. In the face of traffic hijacking, almost everyone is equal. Network security is different from traditional system security, and the barrel effect is particularly obvious in the overall combination of various hardware equipment in the network. Even if you have a god-like system, when you encounter a pig-like device, your security level will be lowered in an instant. Nowadays, cheap small routes are becoming more and more popular, but they carry the traffic of various online transactions, can you use them with confidence?
Even if you believe that your system and equipment are absolutely reliable, can you rest easy? In fact, there are not many problematic equipment, but there are many problems, is there any flaw? That's right, the most important point is missing: the network environment.
If there are hackers lurking in the network environment, even if there is enough professional technology, it is inevitable.
Of course, flies don't bite seamless eggs. What are the hidden dangers that cause cracks in your network environment? There are too many, and there are countless attacks that have been popular from ancient times to the present. You can even create one yourself according to the actual environment.






Previous:MS15-002 Telnet Service Buffer Overflow Vulnerability Analysis and POC Construction
Next:12306's technological transformation road
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com