Tuesday, February 22, 2011

Volume I Chapter 01 honeypot system (5)

Item Bin reason is because they opened the monitor speakers in the spread of the intrusion alarm, indicating a peer is on his wife (the computer) an interest, is to molest her, as a man (hacker), he can not allow No matter!

    He entered a few commands, and soon invaded his brothers who know the way the machine: his use of a remote buffer overflow vulnerability that could allow an intruder in the database service through the implementation of overflow to execute code remotely on the target system execute arbitrary commands with root privileges. This vulnerability has long been spread in the circle, and nothing profound, but will use a remote buffer overflow to infiltrate the network, at least show the other side has a little weight.

    Way of hacking the ever-changing, hard to detect, Xiang Bin, enter a few commands that you know how? Is he really God? Of course the answer is no. Under normal circumstances no one can be easily able to know each other a few ways the invasion, even if the head of the hacker Kevin •; Nick will not work. As previously mentioned, the diversity of invasive way to determine the items Bin not know each other so quickly to the invasion of way, a ghost that he is to use software vulnerabilities or vulnerabilities come in! Movies leave out the supernatural Guangda hacker, all pretend to understand a number of non-technical director, is completely Bluff, and have no desire to mislead and fool the Guanzhong! So, how is Bin items you know? This is the key bin around the clock efforts of the past two days - in his own arrangement of a high-quality machine honeypot system. Yes, yes, that is, the honeypot.

    What is a honey pot, honey pot is it installed? Sense point of view, can indeed be seen as a jar filled with honey. Honeypot, it is first a jar. Jar do? Of course, hold things, but this time something is not installed anything else, but the hackers, ah, is that the uninvited guest. Inside the honey pot refers to the system vulnerabilities, these vulnerabilities are not unknown vulnerabilities, but deliberately left bin items, or a virtual out his application, but in each other's view, this and the real vulnerability is not What is different, the average hacker can not quickly be found. And these vulnerabilities are within the control of bin items, they are well aware of his, because they are deliberately left behind items Bin - Honey!

No comments:

Post a Comment