Answer the question
In order to leave comments, you need to log in
How does a hacker intercept data packets?
Imagine the situation, conditionally Vasya sends a data packet from the computer to the google server. It is known that no one replaced Vasya's DNS server, and Vasya has no viruses on his computer. Can a hacker somehow read and modify this data packet?
Answer the question
In order to leave comments, you need to log in
A hacker can force Vasya to lower the TLS version and thus read the encrypted traffic. This is the first thing that came to mind.
TLS is the tenth thing, and, indeed, by combining social engineering methods with technical methods, you can get around it. But first you need to find a way to intercept traffic, albeit encrypted. It depends a lot on the circumstances. Where is Vasya's computer - at home, in the office, in a public place (laptop)? Connected to the network with a cable or via Wi-Fi? Using an old router with vulnerable firmware? Vasya, like a sucker, opens attachments in mail from someone who doesn't understand? Etc. etc. The hacker must learn more about Vasya (where he lives, what he does, what his habits are, ..) and thus find a convenient gap. A hacker may be interested in doing this if Vasya is a VIP (well, or at least a decision maker), and not some Elusive Joe.
The elusive Joes are being attacked with "god sends" methods.
1. Is Vasya's computer connected by cable directly to the Google server?
I suspect not.
Therefore, the coolhacker does not have to hack into Vasya's computer. He can sit on one of the hops on the way to the Google server.
2. Kulhacker doesn't need this package, he can crack Vasya's password using social methods and simply poison his package.
3. In addition to viruses, there are many other software through which you can get into Vasya's computer.
You can’t just take and tell the options for how you can break Vasya, because even a simple explanation of simple methods is not a fact that, in principle, will work. Everything needs to be checked and checked. The work of a coolhacker is not the same as in the movies.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question