![[エデュウィルホワイトハッカー]ネットワーク分析강의 썸네일](https://cdn.inflearn.com/public/courses/329693/cover/4a4b65e9-9621-4884-815b-efbdd604c685/329693-eng-original.png?w=420)
[エデュウィルホワイトハッカー]ネットワーク分析
eduwill
ネットワーク分析を通じて脆弱性分析、ハッキングを防御するスキルを学びましょう!
중급이상
Wireshark
One of the major fields of hacking is hacking networks.
Network Hacking
Linux
Eduwill's white hat hacker training course!
Introducing the subjects of the 'White Hacker' course :)
The simplest network hacking techniques include DDoS attacks and backdoor installation. Because skilled hackers are rare, most network hacking techniques accessible to the general public are DDoS attacks, backdoors, and phishing.
Disabling a target computer's internet access through a distributed denial-of-service (DDoS) attack is the most widely known and easily understood technique. A DDoS attack involves multiple computers flooding a single computer with a massive amount of unnecessary traffic, overwhelming the target's internet connection. This technique paralyzes or even terminates internet access due to the amount of traffic exceeding the line's capacity.
If a victim is made to install a file with inserted malicious code, a backdoor can be installed, which can be used to carry out attacks such as forced remote control and keyloggers. Social engineering techniques are often applied in the process of installing a backdoor. Victims are tricked into running a program containing a backdoor through various means such as chat programs, pornography, hacks, important attachments containing personal information or data included in a mistakenly sent email, or job application forms. Alternatively, a phishing website is created and text messages are sent to an unspecified number of people, making them believe it is the website of a financial institution or telecommunications company, and after accessing it, they are requested to install ActiveX, thereby installing a backdoor.
📢 Please check the precautions!
Q. Can non-majors follow along?
Yes, of course you can. However, there are some prerequisite knowledge required for learning, so be sure to check the [Prerequisite Knowledge] section below!
Who is this course right for?
For those who are curious about Internet structure and network hacking
Information protection and information security related occupations
Need to know before starting?
Linux, C language, Python
All
9 lectures ∙ (6hr 47min)
All
2 reviews
$68.20
Check out other courses by the instructor!
Explore other courses in the same field!