First, the vulnerability scanner
Vulnerability scanner can quickly find problems in the system. Hackers usually use port scanners. These ports can check which ports are open on the specified computer, or they can access the computer or wait for programs and services on that port. Sometimes, you can also detect the program or service on the port and its version number.
Second, reverse engineering.
Reverse engineering is terrible, and hackers can find loopholes manually. Lijiang computer training believes that the common method is to search for possible loopholes in computer system code, and then test it, and sometimes reverse engineer the software without providing code.
Third, password cracking.
Password cracking is a process of storing passwords in a computer system or recovering passwords from data transmitted by the computer system. The common method is to try to guess passwords repeatedly and try common passwords manually. Then Lijiang IT Training suggested repeatedly trying to use the passwords in the dictionary or many password text files.
Fourth, deceptive attacks.
A spoofing attack involves a program, system or website that successfully masquerades as another system by falsifying data, so it is regarded as a trusted system by users or other programs-usually by deceiving programs, systems or users to disclose confidential information, such as user names and passwords.
Five, brute force attack
This method is very fast when checking all short passwords, but Lijiang IT training believes that if it takes time to search for longer passwords violently, other methods can be used.