2014年4月8日星期二

hackers to install software in accordance with certain procedures

yesterday afternoon, the Hongqiao market in the Starbucks shop, the reporter using a mobile phone hacking software, on a peer computer account on session hijacking.

■ "WIFI can break 5 minutes to control user micro-blog" tracking

recently, net friend "Evi1m0" by Micro message public, drying out of a hijack routers case. A security researcher at the Beijing information technology company "Evi1m0" Cheap Derrick Rose NCAA Jerseys for reporters at the scene to demonstrate how to crack WIFI, process and control the terminal computer micro-blog account. (the Beijing News reported in March 31st)

yesterday, the reporter in accordance with the "demonstration step experiment Evi1m0" after the discovery, hackers to install software in accordance with certain procedures, not only can hijack other users micro-blog account the same network within the family WIFI LAN, also can realize to others micro-blog account control in public under the WIFI, the whole process took less than 5 minutes.

Evi1m0 says, this is "the hacker drill network protocol", Cheap UCLA Bruins Jerseys encountered such a situation, should be the first time out of account, then exit WIFI network.

at the same time, experts, well-known IT legal researcher of China University of Political Science and Law intellectual property center that Zhao Zhanling, the use of software hackers hijack another network account, regardless of whether the actual loss caused by infringement of the user, are suspected of violating the privacy of Cheap Indiana Hoosiers Jerseys users, the user can according to the extent of rights. He said, if the users will steal the user information reselling or open, will constitute a tort, the user can be asked to stop infringement, apologize and compensate for the losses; if the case is serious, the user or to bear criminal responsibility.

In Experiment 1,

WIFI home in five minutes "hijacked" network account

purpose: test the home in WIFI, use hacker software can be "hijacked" user data network.

Background:

experiment in the same WIFI network, "Evi1m0" using a hacker software on another computer logged micro-blog account "hijacked" implementation, successful control of the micro-blog account demo. Cheap Kentucky Wildcats Jerseys

experiment process: according to "demonstrate the steps Evi1m0" intelligent mobile phone, a reporter first to find a jailbroken, two must-have hacker software installed into the mobile phone.

then, reporters will mobile phone access to the home of the Cheap Creighton Bluejays Jerseys WIFI, and access to a IP tail number 119 of the computer, and log Webpage version micro-blog account on the computer, then open the hacker software.

this software directly into the router WEB management interface, all connected to the WIFI electronic equipment, including the computer are displayed, click the computer press IP, the emergence of a "session hijacking" button, click on show on the computer's weibo.com page.

reporter click the page after page into the same moment, software and computer micro-blog account page, at this time, Zhang >

0 条评论:

发表评论

订阅 博文评论 [Atom]

<< 主页