Active attacks in network attack and defense are: 1. Tampering with messages, some parts of legitimate messages are changed or deleted, messages are delayed or changed in order; 2. Forgery of message data; 3. Denial of service, resulting in Normal use or management of communication equipment is unconditionally interrupted.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Active attacks can lead to the tampering of certain data flows and the generation of false data flows. Such attacks can be divided into tampering, forgery of message data and termination (denial of service).
(1) Tampering with messages
Tampering with messages means that some parts of a legitimate message are changed or deleted, the message is delayed or the order is changed, usually to produce an unauthorized effect. If you modify the data in the transmission message, change "Allow A to perform operations" to "Allow B to perform operations."
(2) Forgery
Forgery refers to an entity (person or system) sending out data information containing the identity information of other entities, pretending to be other entities, and thereby obtaining some legal information through deception. Rights and Privileges of Users.
(3) Denial of Service
Denial of service, often referred to as DoS (Deny of Service), will cause the normal use or management of communication equipment to be unconditionally interrupted. It usually damages the entire network to reduce performance and terminal services. This attack may also have a specific goal, such as all packets to a specific destination (such as a security audit service) being blocked.
For more computer-related knowledge, please visit the FAQ column!
The above is the detailed content of What is an active attack in network attack and defense?. For more information, please follow other related articles on the PHP Chinese website!