cool hit counter Hacking Techniques of Game Servers_Intefrankly

Hacking Techniques of Game Servers


A good game will have a lot of good firewalls and multiple servers, this is because this will stop hackers from attacking the servers, or breaking through the firewalls, how exactly do hackers break through the firewalls and breach the game, here are some ways I understand how to do this and how to prevent hacking, I hope this is useful to you.

The friends who have played the game self-service know that self-service is extremely vulnerable to attack, once attacked, the light game becomes card, heavy or completely unable to log in. So what kind of attacks do hackers launch against self-service, and what are the ways to make the server completely crash? In this article, let's uncover the means by which hackers attack self-service. Number of broilers determines attack energy

Hackers attack self-service by means of nothing more than server hacking and DDOS attacks. The former has a low success rate, and even if the hack is successful, at best you'll get the GM account and mess around with the game to change it. But the latter is completely different. DDOS attacks are incredibly powerful and can make players in the game instantly drop offline en masse or even unable to log in, and if the hacker has a deep hatred for a particular self-service, it can even make the self-service permanently unavailable online, causing a devastating blow. The so-called DDOS, known as "Distributed Denial of Service Attack", means that hackers control a large number of broiler flocks to flood a website with packets, causing network bandwidth blockage, so as to achieve the effect of the attack. So how powerful is the DDOS attack?

It can be said that 100 broilers can kill personal websites, 1000 broilers can kill self-service and medium-sized websites, and 10000 broilers can kill local portals. As you can see, it only takes a few hundred broilers to attack a self-service, so let's take a look at how the hackers collect broilers and carry out the attack.

step01: Prepare the software needed for the attack. Here we need a software called "Destroy Stress Test Final" (paid version, available on Taobao). The main purpose of the software is to generate Trojan files through the generator and then acquire a large number of broilers, after which it can then devastate the website through the software's built-in attack system.

Apply for a dynamic domain name step03: Run the "Destroy Stress Test Summary Edition" Trojan generator, fill in the "online address" address you have just applied for the "HINET" domain name, the process name can be set to "svch0st.exe", "service name", "display name" and "service description" as the average user is not likely to pay attention to, so do not deliberately set, of course, if it imitates a system service, then it is the best. Click the "Generate" button when you are done, and you will be able to generate a Trojan. The next main problem is how to get someone to run this Trojan, there are many ways to do this, you can use web Trojans, file bundling, or the 1433 chicken catching method which is very popular these days. It is worth mentioning that the Trojan file currently evades most antivirus software and is therefore relatively easy to spread.

The core problem of anti-attack techniques (intrusion detection techniques) is how to load all the network information. At present, there are two main ways to obtain information, one is through the network listening route (such as Sniffer Vpacket and other programs) to obtain all the network information (packet information, network traffic information, network status information, network management information, etc.), which is the inevitable way for hackers to carry out attacks, but also the other is through the analysis of the system logs of the operating system and applications to find out the intrusion and potential security vulnerabilities of the system.

The most basic means of hacker intrusion detection is the use of pattern matching methods to detect intrusion attacks, to effectively carry out anti-attack must first understand the principle of intrusion and working mechanism, only the central can do to know the enemy, so as to effectively prevent the occurrence of intrusion attacks. In the following, we analyze several typical intrusion attacks and propose corresponding countermeasures.

How do we protect against hackers? This is some protection advice. 1. When each gateway or router connected to a LAN examines an IP packet from outside before deciding whether to allow it to enter the LAN, if the IP source address of the IP packet is the IP address within the LAN it is intended to enter, the IP packet is rejected by the gateway or router and is not allowed to enter the LAN. Although this approach solves the problem well, it is not of good practical value considering that some Ethernet cards receive their own outgoing packets and also in practice LANs often need to have a mutual trust relationship with each other to share resources.

2. Another ideal way to defend against this attack is to verify the IP source address of IP packets as they exit the LAN. That is, each gateway or router connected to the LAN examines the IP source address from which the IP packet originated before deciding whether to allow IP packets within this LAN to be sent out of the LAN. If the IP source address of the IP packet is not the IP address inside the LAN where it is located, the IP packet is rejected by the gateway or router and is not allowed to leave the LAN, so it is recommended that every ISP or LAN gateway router verify and filter the IP source address of the outgoing IP packets. If every gateway router did this.

We are happy to make friends in all directions, if you have good suggestions, please contact Shenzhen Great Silver Ape Software Technology.


Recommended>>
1、Operations and Maintenance Week Shanghai Information Division
2、SageMath an open source alternative to Matlab Mathematica
3、How does Extreme Data Recovery work The most detailed tutorial is here
4、Why digital currency mining mining is equal to moving bricks the future of mining is worried
5、Blockchain bridges trust between real and virtual worlds

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送

    已发送

    朋友将在看一看看到

    确定
    分享你的想法...
    取消

    分享想法到看一看

    确定
    最多200字,当前共

    发送中

    网络异常,请稍后重试

    微信扫一扫
    关注该公众号