Turn from： Pilu safe house（ID：piluwill）
There are two ways to steal numbers in the early days：
： It's a very common way for local machines to breed Trojans, And it's simple, As long as you can have a Trojan, This kind of software is everywhere, A lot of quantity. You can find it on any small hacker website, It works in a very simple way!
First of all, it has recording function, The password of can be recorded automatically, When the Trojan horse is planted in your computer, It changes the registry, Run automatically as the system starts, And automatically detects the current computer's progress, Once the Trojan is running, It starts recording keyboard input, Some Trojans will pop up a disguised window and
The login window is the same, Wait for your number, Click OK after entering all passwords, It will prompt that the password is incorrect, Close and then pop up the real login box!
Either way, At this time, your password has been sent to the email address of the person who stole it. This phenomenon will not appear in hackers because the data verification methods of the two are different, We don't talk about that here, Generally, the person who needs to steal the number has access to the computer of the stolen object! For online games, It's generally unrealistic, And it doesn't have much practical value!
Second kinds： The principle of Trojans in remote machines is the same as that in the first way, The only difference is that the person who steals the ID doesn't need to touch the computer of the person who steals it, After understanding the principle of planting Trojans by transferring files, It's easy to steal!
The early tools for stealing numbers were also exhaustive software, It's the tool that has the least practical value at present, from the beginning of constantly combining data to trying out the real password, But it's still dangerous for people with simple passwords.
The first category can be attributed to the theft of keyboard recorder, To put it simply, use a Trojan horse to record the movements you press the keyboard, Record account number and password, Therefore, the most common way to steal numbers, You can use the soft keyboard when you log in, Soft keyboard input mode is generally not recorded by the hacker Trojan, This is a safer way! That's what hackers are worried about, If the user enters the password with the software disk, Trojans can't record keyboard movements.
So you don't want your account stolen, When you type in your password, a soft keyboard will do everything, But for hackers, Is there really no way? be completely wrong! Not even polite, It's just a way to hide your ears, Become the ears of the deaf— Furnished.
Let's talk about how the soft keyboard works：
When the user logs in and asks for the password, You can use the mouse to click the key on the soft keyboard to enter the password, The key values on the soft keyboard change randomly, To ensure that the input password is not stolen by the keyboard recording Trojan, The hackers of the Trojan horse are taking advantage of the habits and inertia of some users： Think to use soft keyboard when logging in account window, By clicking the mouse and entering the password, we can ensure the security of the password, The Trojan has been considered!
The security measures for password protection of soft keyboard have also been broken by hackers, After the Trojan is activated, Attempt to obtain the account information entered by the user through the soft keyboard by intercepting the text message sent by the soft keyboard window, So as to break through the password protection technology of soft keyboard.
In fact, More and more people have abandoned the traditional way of keyboard recording, It's a very effective measure, To prevent the memory recorder mode!
I try to explain the problem in popular language, Memory is a piece of hardware, But in terms of function, it is an important space for computers to store all temporary files, Some people think that when I turn off the computer, no one knows what I've done on my computer, Not really, You click the mouse and press the keyboard once, Open a document, All actions are recorded on the computer or in memory
People who understand can find the records of these machine codes by turning on the computer, Of course, People who don't understand computers are God's books when they put them in front of you!
Memory record can record all memory changes, At this point： No matter what password you enter, Click No Keyboard, There's no difference. As long as you input, Even with the input pen, the memory recording Trojan will catch the action, To steal the password!
Even though, It is recommended to use soft keyboard when logging in, Even if it reduces the possibility of theft. Some people say： So it's impossible to prevent it?
So let's talk about another security measure： Secret insurance card!
According to the hacker's idea, you want to add a security lock to your account, Its randomly generated password feature enables the account thief to master your account and password, You can't log in to this account without a card, It's also a common way for many game companies to keep secrets, But what's the effect?
Didn't anyone steal it with a security card? The answer is yes. Absolutely.! Same as soft keyboard, Again, I'm not flattered! No card, please pay attention to it, With the card, many people are completely unsuspecting and think it's absolutely safe for me, This view is totally wrong!
Speaking of this, Let's talk about another famous hacker software： Grey dove!
In short, grey pigeon is a program that can control your computer remotely, Strictly speaking： It can also be regarded as one of the Trojans! Many people may have used remote assistance, Send out the assistance message and the other party can enter the other party's desktop after receiving it, Control each other's computers!
The principle of grey pigeon is not mentioned here, It's also a remote control function, Of course, this one doesn't need your approval, By the way, Microsoft started system integration” Remote desktop” This function can be downloaded, This function is good and bad, This allows the other party to log in to your computer in a different place, Have full operation permission, Do whatever you want!
If your computer doesn't have a password or a simple password, you can imagine what will happen? Don't say you're at home. How can anyone know where you are? Don't ask this naive question! I'll talk to you slowly when I have time, therefore, Unless there is a real need, Otherwise, please turn off Remote Desktop Services, As for how to close, This is not a computer school, If you are interested, talk to me slowly!
Continue to talk about how the grey pigeon steals the number? This is not a stolen ship, but a stolen equipment, The other party doesn't need your account password, The account code is for you to log in. Say something simple, This is a typical example on the official website, First, add your friends and say they want to buy your good equipment, Let you show him where nobody is. When you get there, you find that your computer is out of your control! You finally found out, All your accounts can't log in!
In fact, it's the top land in the hacker field, Capable people come forth in large numbers. The buggers are just the lowest of them, The most unskilled group. But even the lowest group of people, It's amazing for ordinary gamers
People. No matter which game, From production to operation, It's not even online games8 The top, Of course, its security can't be compared with hacker's technology. Say these, It's not to give you an excuse and a reason to abuse, On the contrary, Don't get me wrong, I'm also disgusted by the various behaviors of hackers, Hate, Like a lot of attacks, They're always trying to figure out how to make money.
A lot of people need to steal it every dayqq News, as follows
I know it's for me to steal the number, so I won't reply, First of all, it's because I don't take orders, Second, I'm too lazy to explain, This post will give you a unified reply.
There are several reasons for me to steal the number
1, Seeqq space
2, Look at the chat records of girlfriend and others, Suspicious of a split
3, Find the family who left home!
4, Trade secrets
5, Personal enemy, He wants to steal his name.
Let's talk about it today Several methods of stealing numbers
1,tx data base
tx Database leaked, Query password through database
2, Intranet packet capture
Occasionally, The internal network sniffer can also intercept the password, Xiaofeng hasn't been testedqq Of
3, Go fishing
Fishing software, Phishing websites, etc, Imitate the official trick user to enter account password and send it to the server.
（ Do you have anyone elseQQ What have you seen on the space message board“ How can your photos be in other people's space” Then a website, You click in. It's a fake space page for you to log in, Once landed, Sorry, your space will automatically send countless ads）
4, social worker
Based on the understanding of users, Get the password combination.
5, Remote control
Remote control on-line, Keylogger.
6, brute force
Generally for weak password, Strong passwords are not easy to crack.
7, Go straight to him
Simple and crude.
8, Account complaint
One of the means of social workers, We need all kinds of strange ideas to get all kinds of information
9, Camouflage security center mail
（ If an email is sent to your security email, please fill in the verification code you just received, Then it must be a fake）
Let's analyze the above situation
If I were to steal someone nowqq Number, Let's check the social work library first, But the database was a few years ago, Very low success rate.
Try fishing, Made a fishing software, Issue to each other, It's a problem if the other side can't take it, Is there any anti-virus software, Don't you want to do a kill free first and then send it to the other side, If the other party doesn't pick you up, you will be confused.
What about fishing websites? Now the safety awareness of Internet users has been improved, Even adults can't click the link, You want to cheat others! If you have a brain, look at the links, And many browsers recognize it intelligently.
Remote control, Then the keyboard records? Appointip Invasion is harder than landing! Different computers will encounter various problems.
brute force? Are you mentally retarded in this way? You're generating hundreds of millions of passwords, Tencent has a verification code, OK, Take your time to enter the verification code, And I lost too much to log in, Even if you lose right.（ Don't trust the Internetqq Cain and Abel , No feasibility）
social worker? Some people leave little personal information on the Internet, High difficulty
Easy to steal, Using fishing method to steal the number of nets.
Difficulty in stealing money, Stealing the designated number.
For those who want to find hackers to steal their numbers, Forget it. You found it. 99% are liars, Say it can be stolen, One billion is a liar.（ Tencent is not covered）
summary： No matter what account, Try not to be private, Especially personal user card binding, Hackers are for profit, No interest, Naturally, I'm not interested in you! Hacker Internet is too deep, Think twice about those who want to step in!