Hacker is a familiar word, and everyone who builds websites should be exposed to it. Hackers attack websites in many ways, the most common of which is "traffic attack". I believe that many people have encountered this. Only through personal experience did I know that the damage was serious. The website server was attacked and the system was paralyzed, making it inaccessible for two days. Before being attacked, I only had a superficial understanding of hackers. A lesson taught me to do in-depth research on website hacking and share it with you.
First, let’s introduce hacking attacks. There are many versions of the definition of the word hacker, and they basically involve difficult programming techniques. The hacker attack is different, quite similar to what is often called a hacker. These individuals focus on deliberately damaging other people's computer and phone systems and causing network intrusions or damage to others. Call this behavior a hacker attack.
One method of hacker attack is called traffic attack, which mainly targets network bandwidth. It uses a large number of false attack packets to flood legitimate network packets, causing network congestion and information being unable to reach the host. The attacker's purpose this time was not to cause damage, but to extort. The attacker contacted directly and asked for money, or continued to attack. It suddenly dawned on me that I was being blackmailed. What I didn’t expect to happen in real life also happened online. High technology has made me deeply involved in online blackmail, making me dumbfounded.
At present, the development of the Internet is advancing by leaps and bounds, but security prevention is at a disadvantage and cannot be perfected for a long time. High technology has become a tool for people with bad intentions to harm the interests of others. There are frequent cases where Alipay passwords are stolen through the Internet, resulting in the loss of money. What's more, under the guise of an online store, they use time differences or other methods to induce others to make purchases and then have no news after payment. It seems that improvements to Internet security are imminent.
As the saying goes, every height is as high as the devil. Hacker attacks cannot be avoided. We can only take effective measures to prevent them as much as possible. For example, when building a website, try to use high-performance network equipment. When selecting equipment such as routers, switches, and hardware firewalls, try to choose products that are well-known and have a good reputation. And try to reach an agreement with the network provider. When a malicious attack occurs, you can ask them to set traffic restrictions at the network points. Website users should avoid using NAT as much as possible, because NAT needs to convert addresses back and forth. During the conversion process, network packets will be checked and calculated, which is a waste of CPU time. Network bandwidth directly determines the ability to withstand attacks, so it must be sufficient. This time I only used 10M bandwidth. Later I learned that it is difficult to resist SYNFlood attacks, so it is recommended to have at least 100M shared bandwidth. The last thing worth noting is that try to make the website a static page. Because making a website into a static page will not only improve the ability to resist attacks, but also mislead hackers into intruding. At the very least, it will make it more difficult for intruders.
This attack showed me the tyranny of hackers. They use their high level of intelligence to write programs to steal accounts and invade. Asking for money can be said to be an online kidnapping and demanding a ransom. It can also be compared to forcibly collecting website protection fees.
It seems that traffic attacks have a vicious trend of developing into network extortion. For general webmasters, they must pay attention to the existence of hackers and take precautions in time to avoid losing important data and causing serious losses.
Original by Zhiqi, please keep the source address http://www.ok.net.cn/blog/?post=852 when reprinting, thank you
Author Zhiqi's personal space