Summary: | 碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information
society, hackers are prevalent threats that may cause massive damage/loss.
Although not all hackers are malicious, some of them have done offensive attacks.
For example, ATM was stolen more than NT $ 80 million by hackers, resulting in
the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging
pattern difficult to prepare, but also allow more victims leakage of
personal information, we need to think of a solution to the so-called "Know thyself,
know yourself", first clearly know each other means, in order to come up with
corresponding manner. Hacking attacks are divided into five steps: Reconnaissance,
Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research
mainly uses Kali Linux system to implement five major steps of the hacker program.
This study would help IT managers, engineers understand hacking procedures, and
thus help them propose corresponding methods of protection. In Kali Linux system
itself has more than six hundred kinds of penetration tools, hackers program in
accordance with the classification of the five steps to achieve tool, users will not
have to reduce from six hundred kinds of penetration tool to screen to be used.
|