破解绑定(Crack binding).docVIP

  • 2
  • 0
  • 约1.36万字
  • 约 9页
  • 2017-10-06 发布于河南
  • 举报
破解绑定(Crack binding)

破解绑定(Crack binding) Computer network [network world]MAC address and IP address binding strategy crack (Reprint) Click: 497 reply: 4 Author: yzjtt published date: 2006-7-26 13:44:00 reply 1, most of the solutions to IP Address Theft are using MAC and IP address binding strategy, which is very dangerous. This article will discuss this problem. What needs to be declared here is that this article is concerned with security concerns for MAC and IP address binding policies, without any hacker nature. 1.1 why bind MAC and IP addresses? There are many factors that affect network security. IP address theft or address spoofing is one of the most common and harmful factors. In reality, many network applications are based on IP, such as traffic statistics, account control, etc., IP addresses as a sign of the user an important parameter. If someone embezzled legitimate addresses and disguised them as legitimate users, the data transmitted on the network could be damaged, bugged, or even stolen, resulting in irreparable damage. From the external network IP address is more difficult, because routers and other network interconnection equipment usually set by each port IP address range, the message does not belong to the range of IP addresses will be through these interconnecting devices. But if the embezzlement is the IP address of the legal user within the Ethernet, the internetworking device is clearly powerless. The man, for the Ethernet internal IP address theft, certainly also has the corresponding solutions. Binding MAC addresses and IP addresses is a common, simple, and effective measure to prevent internal IP theft. 1.2 MAC and IP address binding principle The modification of the IP address is very easy, and the MAC address is stored in the EEPROM of the network card, and the MAC address of the network card is uniquely determined. Therefore, in order to prevent insider illegal IP theft (such as theft higher authority personnel to obtain IP address, authority information), t

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档