Internet is black produce a group commit the crime behavior always is enigmatic, they serve as bright opposite side, in people carelessly the purpose that the leave no stone unturned in the shadow destroys the safety of Internet to achieve them finally through all sorts of network technology measures. In last few years by police crack a criminal case black produce event increasing also, also remind secondhand, it is us no matter individual still be an enterprise, want what always enhance pair of network security to be on guard consciousness.
Understanding a few black produce a group in " cant argot " , safe to the business of individual, enterprise in advance prepares.
Pull up abbThe white cloud aunt of personate of red of red of the Song Dynasty of CCTV spring integrity in one's old age knitted a sweater to give Zhao Benshan the old partner of personate 1999 and slub of abb of pull up production team, this one behavior is surely " pull up socialistic abb " accusation. Colloquialism is told even if have bit of meaning that gain extra advantage unfairly. Black the sale privilege activity that in producing, they can observe all sorts of network platform in real time, find out among them BUG, alternative participation activity, with low cost even the favourable welfare that 0 cost earn a businessman, this one behavior is called " pull up abb " .
For instance: The line on some APP, roll out the welfare activity of new user, full 30 can receive 10 yuan of coupons, so, want us to register APP with date of different mobile phone only, the operation that finish, can receive a coupon, in black in producing a group, they can carry lot of a few software register, final meeting " pull up " arrive thousands of on 10 thousand even more money.
Abb partyCarry out " pull up abb " a kind of person of behavior.
Black cardBlack card is a few not real name of attestation and the month hires those who be 0/1, the mobile telephone that can receive short message test and verify to pile up only gets stuck. "Abb party " in " pull up abb " when meet from card buy low over there business many black card. Black in producing, black Kadaduohui chooses to atttack Internet finance (be sure or credit company) , electric business (some treasure, some cat) , gregarious (QQ, tremble sound) , 020 platform (public praise, beautiful group) . Register of drop drop phonily, go all out great " pull up abb " wait for backside as black as this card is relevant couplet.
Feline poolAugment telephone communication and the another namer that target object equips, it is a kind of equipment, imitate becomes mobile phone terminal, can put card of many pieces of SIM at the same time, make show these card are on operation business system switch on the mobile phone condition. Black the meeting when in producing, they commit the crime of the batch need " black card " insert " feline pool " on equipment, receive a short message at the same time for them, implementation group is released. Feline pool equipment uses the black card that raises lot (black produce number) .
Receive a platform
The cloud that can send and receive short message, test and verify to pile up serves platform. The relation catenary of a platform that accept a code basically is: The person that block operation of pool of business, cat, platform, developer, user.
The need in be just like the life that is like us registers the mailbox of a certain platform, we can have test and verify to pile up information when this platform is registered, fill in code of test and verify is finished register. But black in producing, they need many mobile phone card to receive a short message commonly or code of test and verify, this moment sends the platform that accept a code on use. Read the short message test and verify that takes black card to pile up a function through feline pool equipment, build a platform that accept a code then, get mobile phone bugle call, get the service such as code of test and verify. The person that these platform are used, what need to call the API interface of platform correspondence to be able to finish test and verify to pile up only is automatic get.
EnvelopeBy the gather of the Zhang number information of pilfer. Black the their meeting purloin is very much Zhang date in producing a group and password, code of name of a group of Zhang " install " together, call " letter " . There is QQ envelope number on the network now, point to the password that be mixed by the date of all QQ Zhang of purloin namely. From these " envelope " in choose valuable to them Zhang name and password, this process is called " wash a letter " , the person that completes this process is called " the person that wash a letter " . Same, the course that takes news of these Zhang name code is called " take a letter " . The channel that takes a letter is dealer of data of a few blackmarket or company project library.
TrojanOriginate Gu Xila. Namely the trojan virus that we often say, differ with general virus, the its won't sedulous file that goes changing computer to go up, it attracts an user to download through oneself camouflage and finish installation to command, after move, the hacker can use the controls you computer with trojan easy process.
Incident: Pay treasure great robber. December 2012, the name is " pay great robber " new-style net buys a trojan to be discovered. Trojan website uses Baidu to rank mechanism camouflage to be " net of official of A Liwang flourishing " , coax netizen downloads moving trojan, kidnap a victim in the dark again fund pays on the net, pay account of hacker of object seize instead. The cash that the user pays is cheated by the hacker so. toot ~
Fryer
Tool machine. Get the computer that hacker remote programmed control makes. Want a hacker not to change computer only, the user discovers very hard unusual, be being raised by them, when they have need, can control at will.
Save oneself: Stop a network instantly -- check kill virus -- restore an operating system
DDoS attack
Distributed decline a service (Distributed Denial Of Service) . Many computers rise jointly regard attack as platform, use many dummy computer to launch DDoS attack to one or more target centrally, twice land enhances the power that rejects to serve attack. The meaning is a person works alone force is weak, finish hard, call a flock of people to be done together.
Bogus radical stands
It is holiday radical station. Can risk arbitrarily send bilk to user mobile phone with number of other mobile phone, promote wait for rubbish information. Meet like us now and then receive forge the official number such as business of bank, airline, operation to send " warmth reminds " , " safe clew " of and so on.
Defence: Receive new short message not to want curious aspect to leave, can use software of mobile phone safety to distinguish the bilk short message that hair of bogus radical station comes to.
Postern
Network virus. Just as its name implies, bypass front door is entered from the back door that concealments quite. Here is to point to the means that bypass safety is controlled and gets pair of programs or systematic visit right. Introduce undoubted meeting posternly to form great and safe venture. Know postern person, can have covert visit and control to the system in the future, and the person that back door is inbreaked easily also regards as flaw has charge.
Defence: Installation authorised edition kills poisonous software and upgrade in time the virus library, doubtful document that does not receive computer to be transmitted at will, do not use illegal software to wait.
Black hat SEO
To Internet it is cogged meaning. Main characteristic is short, smooth, fast, for short-term the interest inside and adoption cogged method. Conceal a webpage for example, keyword load one's writing with fancy phrases, rubbish link, bridge page.
Black hat trick often sees effect is very fast, executive cost is low, the probability that the problem depends on be discovered and be being punished is very high, and the meeting is taller and taller. Once be punished, whole website must abandon, everything wants from 0 begin.
Hang a horse
It is the hacker obtains website administrator through all sorts of methods Zhang date, land tiring-room, obtain a Webshell through database backup restores or uploading flaw. The content of modification website page, join ill will to turn to code, undertake modification to website page. When you visit the page of code of ill will be affiliationed, the address that is turned to with respect to can automatic visit perhaps downloads trojan virus.
Website of on market a lot of game is hanged horse, hacker purpose is the game Zhang date of purloin player, the website is hanged the website that the horse can let him not only loses credit, lose a large number of clients, also can let us these average users are immersed in a hacker to set the trap below, reduce the hacker's fryer. If did not take care to enter,already was hanged equestrian website, can contract trojan virus, as a result loses much precious file material and Zhang name code, its harm is great.
Defence: The user name of Asp program manager and password should have certain complexity, cannot too simple, notice to change regularly even. Want to safeguard daily, not lazy, also can install a few websites to install all inspection to measure platform.
Thunder wood data is buy is core integratedly false instead before, provide the big data company that product and solution consult related con foundation information instead. Help Internet industry undertakes the user is registered effectively login wait for whole technological process to defend con risk, reduce company promotion, operation, wind to control each link cost.
Company product: Black card detects, Spacing detects, The identity 2, 3 element test and verify
Data source is authoritative: Come from solid duration of business of 3 big operation to occupy, essence of life is accurate comprehensive
Use respect: Interface is moved namely use namely, extremely fast butt joint, support is online detect