{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"tavoli-tamadas","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/","title":{"rendered":"T\u00e1voli T\u00e1mad\u00e1s"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>Mi az a t\u00e1voli t\u00e1mad\u00e1s?<\/strong><\/h2>\n\n\n<p>Amikor egy tolvaj anyagi javak\u00e9rt kirabol egy h\u00e1zat, fenn\u00e1ll a vesz\u00e9lye, hogy DNS-nyomokat vagy ujjlenyomatokat hagy maga ut\u00e1n, amelyek letart\u00f3ztat\u00e1s\u00e1hoz vezethetnek. Azonban a hackerek, akik sz\u00e1m\u00edt\u00f3g\u00e9pes b\u0171ncselekm\u00e9nyeket k\u00f6vetnek el, ezt an\u00e9lk\u00fcl tehetik meg, hogy valaha is ugyanabban a k\u00f6rnyezetben lenn\u00e9nek az \u00e1ldozatukkal, ez\u00e9rt sokkal kisebb az es\u00e9ly\u00fck, hogy elkapj\u00e1k \u0151ket. R\u00e1ad\u00e1sul a tapasztalt hackerek \u00e1rtatlan embereket is megv\u00e1dolhatnak azzal, hogy hamis bizony\u00edt\u00e9kokat helyeznek el az interneten, amelyek az \u00e1rtatlanok digit\u00e1lis eszk\u00f6zeire vagy fi\u00f3kjaira mutatnak vissza.<\/p>\n\n\n\n<p>Mivel a tapasztalt hackerek j\u00e1rtasak a jelenlegi rendszerek gyenges\u00e9geinek felder\u00edt\u00e9s\u00e9ben, egyik megel\u0151z\u0151 eszk\u00f6z vagy m\u00f3dszer sem tudja meg\u00e1ll\u00edtani \u0151ket. Sajnos azok, akik felel\u0151sek a jogi int\u00e9zked\u00e9sek kidolgoz\u00e1s\u00e1\u00e9rt, hogy megv\u00e9dj\u00e9k az embereket \u00e9s a v\u00e1llalkoz\u00e1sokat a hackel\u00e9st\u0151l, nem t\u0171nnek igaz\u00e1n t\u00e1j\u00e9kozottnak vagy \u00e9rintettnek a k\u00e9rd\u00e9sben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>T\u00e1voli t\u00e1mad\u00e1sok t\u00edpusai<\/strong><\/h2>\n\n\n<p>A t\u00e1mad\u00f3k k\u00fcl\u00f6nf\u00e9le m\u00f3dokon vehetik \u00e1t az ir\u00e1ny\u00edt\u00e1st a t\u00e1voli rendszerek felett:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">DNS m\u00e9rgez\u00e9s<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"DNS m\u00e9rgez\u00e9si t\u00e1mad\u00e1s infografika \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>Minden eszk\u00f6znek \u00e9s szervernek van egy sz\u00e1mk\u00e9szlete, amelyet internetprotokoll (IP) c\u00edmnek neveznek, \u00e9s amelyet a kommunik\u00e1ci\u00f3ban val\u00f3 azonos\u00edt\u00e1sra haszn\u00e1lnak. Minden weboldalnak van egy domain neve, hogy seg\u00edtsen az embereknek megtal\u00e1lni a k\u00edv\u00e1nt weboldalakat (pl. www.domain.com). A domain n\u00e9vrendszer (<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DNS<\/a>) \u00e1talak\u00edtja a felhaszn\u00e1l\u00f3 \u00e1ltal megadott domain nevet a megfelel\u0151 IP-c\u00edmre, a DNS-szerverek haszn\u00e1lat\u00e1val megfelel\u0151en ir\u00e1ny\u00edtva a forgalmat. Mindezt a DNS-szerverek kezelik.<\/p>\n\n\n\n<p>A DNS m\u00e9rgez\u00e9s az, amikor egy t\u00e1mad\u00f3 \u00e1tir\u00e1ny\u00edtja a forgalmat a k\u00edv\u00e1nt weboldalr\u00f3l egy hamis webhelyre a DNS-rekordok megv\u00e1ltoztat\u00e1s\u00e1val. P\u00e9ld\u00e1ul, ha megpr\u00f3b\u00e1l bejelentkezni az online banki fi\u00f3kj\u00e1ba, de helyette egy oldalra ker\u00fcl, amely pontosan \u00fagy n\u00e9z ki, mint a bank bejelentkez\u00e9si oldala, a t\u00e1mad\u00f3 DNS m\u00e9rgez\u00e9si t\u00e1mad\u00e1st hajtott v\u00e9gre. Ha \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat ad meg ezen a hamis weboldalon, a t\u00e1mad\u00f3 ellophatja az inform\u00e1ci\u00f3it saj\u00e1t haszn\u00e1ra.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">Port szkennel\u00e9s<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"TCP IP elt\u00e9r\u00edt\u00e9s infografika\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>A port szkennel\u00e9s egy m\u00f3dja annak, hogy kider\u00edts\u00fck, mely portok nyitottak egy h\u00e1l\u00f3zaton. Ezt \u00fagy v\u00e9gzik, hogy megpr\u00f3b\u00e1lnak adatokat k\u00fcldeni \u00e9s fogadni minden porton kereszt\u00fcl, mint amikor kopogtatunk az ajt\u00f3kon, hogy megn\u00e9zz\u00fck, van-e otthon valaki. Ha valaki v\u00e1laszol, tudjuk, hogy a port nyitva van. Port szkennel\u00e9st futtatnak egy h\u00e1l\u00f3zaton vagy szerveren, hogy megmutass\u00e1k, mely portok nyitottak \u00e9s figyelnek (inform\u00e1ci\u00f3t fogadnak), \u00e9s hogy l\u00e9teznek-e biztons\u00e1gi eszk\u00f6z\u00f6k, mint p\u00e9ld\u00e1ul t\u0171zfalak a forr\u00e1s \u00e9s a c\u00e9l k\u00f6z\u00f6tt. A port szkennel\u00e9st arra is haszn\u00e1lhatj\u00e1k, hogy egy eszk\u00f6zt azonos\u00edtsanak az egyes portok tev\u00e9kenys\u00e9g\u00e9nek vizsg\u00e1lat\u00e1val.<\/p>\n\n\n\n<p>Ezt a programot nemcsak a biztons\u00e1gi adminisztr\u00e1torok haszn\u00e1lj\u00e1k a h\u00e1l\u00f3zatuk sebezhet\u0151s\u00e9geinek figyel\u00e9s\u00e9re, hanem gyakran a hackerek is haszn\u00e1lj\u00e1k r\u00e9szek\u00e9nt a felder\u00edt\u00e9s\u00fcknek, amikor gyenge pontokat keresnek kihaszn\u00e1l\u00e1sra.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">DoS t\u00e1mad\u00e1sok<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"Dos t\u00e1mad\u00e1s infografika \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>A DoS t\u00e1mad\u00e1s c\u00e9lja, hogy megakad\u00e1lyozza a jogosult felhaszn\u00e1l\u00f3kat egy g\u00e9p vagy h\u00e1l\u00f3zat haszn\u00e1lat\u00e1ban. Ezt \u00fagy \u00e9rik el, hogy el\u00e1rasztj\u00e1k a c\u00e9lt k\u00e9rd\u00e9sekkel \u00e9s adatokkal, amelyek \u00f6sszeoml\u00e1st okoznak a rendszerben. Az alkalmazottak, tagok \u00e9s fogyaszt\u00f3k nem tudj\u00e1k haszn\u00e1lni a rendszert, mert a jogos k\u00e9r\u00e9seiket elnyomj\u00e1k a t\u00e1mad\u00f3 illeg\u00e1lis tev\u00e9kenys\u00e9gei.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/\">DDoS t\u00e1mad\u00e1sok<\/a> nagyon k\u00f6lts\u00e9ges lehet az \u00e9rintettek sz\u00e1m\u00e1ra. A t\u00e1mad\u00e1sok az adatok vagy eszk\u00f6z\u00f6k ellop\u00e1s\u00e1r\u00f3l sz\u00f3lhatnak. V\u00e1llalatok, mint p\u00e9ld\u00e1ul bankok, \u00fczletek, m\u00e9diav\u00e1llalatok \u00e9s korm\u00e1nyzati int\u00e9zm\u00e9nyek gyakran c\u00e9lozz\u00e1k meg web szervereiket ezekben a t\u00e1mad\u00e1sokban.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">TCP\/IP elt\u00e9r\u00edt\u00e9s<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"TCP IP elt\u00e9r\u00edt\u00e9s infografika\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Ez a t\u00e1mad\u00e1s t\u00edpusa, amikor egy hacker \u00e1tveszi az ir\u00e1ny\u00edt\u00e1st k\u00e9t eszk\u00f6z k\u00f6z\u00f6tti kommunik\u00e1ci\u00f3s munkamenet felett, amelyek m\u00e1r kommunik\u00e1lnak egym\u00e1ssal. A t\u00e1mad\u00f3nak ugyanazon a h\u00e1l\u00f3zaton kell lennie, mint az \u00e1ldozat, hogy v\u00e9grehajtsa ezt a t\u00e1mad\u00e1st.<\/p>\n\n\n\n<p>Amikor a t\u00e1mad\u00f3 \u00e1tveszi a munkamenetet, lehallgathatja a besz\u00e9lget\u00e9st \u00e9s m\u00f3dos\u00edthatja a cser\u00e9lt adatokat. Ez a t\u00e1mad\u00e1s gyakran malware-t injekt\u00e1l egy rendszerbe vagy \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat lop el.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">SMB Relay t\u00e1mad\u00e1s<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"SMB Relay t\u00e1mad\u00e1s infografika\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>A Server Message Block (SMB) Relay t\u00e1mad\u00e1sok sajnos gyakoriak azokban a v\u00e1llalatokban, amelyek m\u00e9g mindig az NTLM Version 2 hiteles\u00edt\u00e9st haszn\u00e1lj\u00e1k. A kiberb\u0171n\u00f6z\u0151k titokban tov\u00e1bb\u00edthatnak \u00e9rz\u00e9keny adatokat m\u00e1s szerverekre an\u00e9lk\u00fcl, hogy elkapn\u00e1k \u0151ket, titokban hallgat\u00f3zva a h\u00e1l\u00f3zati forgalomban.<\/p>\n\n\n\n<p>Gondoljon erre a probl\u00e9m\u00e1ra egy p\u00e9ld\u00e1s felhaszn\u00e1l\u00f3 \u00e9s egy gonosz hacker szemsz\u00f6g\u00e9b\u0151l. Az ide\u00e1lis forgat\u00f3k\u00f6nyv az, amikor a val\u00f3s szem\u00e9ly pr\u00f3b\u00e1l bejelentkezni \u00e9s hiteles\u00edteni mag\u00e1t. Amikor egy \u00e9rv\u00e9nyes felhaszn\u00e1l\u00f3 helyett egy hacker pr\u00f3b\u00e1lja meg haszn\u00e1lni a lopott hiteles\u00edt\u0151 adatokat, hogy hozz\u00e1f\u00e9r\u00e9st szerezzen a h\u00e1l\u00f3zati forgalom figyel\u00e9s\u00e9vel \u2013 nincs sz\u00fcks\u00e9g jelsz\u00f3ra.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>A hackel\u00e9si technol\u00f3gia leg\u00fajabb fejlem\u00e9nyei<\/strong><\/h2>\n\n\n<p>A hackerek folyamatosan \u00faj m\u00f3dszereket tal\u00e1lnak a korl\u00e1tozott inform\u00e1ci\u00f3khoz val\u00f3 hozz\u00e1f\u00e9r\u00e9sre, ami nyilv\u00e1nval\u00f3v\u00e1 teszi, hogy a Sz\u00e1m\u00edt\u00f3g\u00e9pes csal\u00e1s \u00e9s vissza\u00e9l\u00e9s t\u00f6rv\u00e9ny\u00e9t friss\u00edteni kell. Ezt a t\u00f6rv\u00e9nyt az 1980-as \u00e9vekben hozt\u00e1k l\u00e9tre, de 2011 \u00f3ta nem v\u00e1ltoztatt\u00e1k meg, ami azt jelenti, hogy nem reag\u00e1l a leg\u00fajabb technol\u00f3giai fejlem\u00e9nyekre. A CFAA-nak l\u00e9p\u00e9st kell tartania a hackerekkel, rendszeres friss\u00edt\u00e9sekkel.<\/p>\n\n\n\n<p>Hazudni egy t\u00e1rskeres\u0151 profilban nem t\u0171nik fontosnak, de ha megs\u00e9rti a weboldal haszn\u00e1lati felt\u00e9teleit, hackel\u00e9s v\u00e1dj\u00e1val illethetik a <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CFAA<\/a>. alapj\u00e1n. Ez a kisebb v\u00e9ts\u00e9g egy \u00e9v b\u00f6rt\u00f6nnel vagy 100,000 doll\u00e1ros b\u00edrs\u00e1ggal j\u00e1r.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">CAPTCHA teszt megker\u00fcl\u00e9se<\/h3>\n\n\n<p>A CAPTCHA teszt meghat\u00e1rozza, hogy a felhaszn\u00e1l\u00f3 ember vagy robot. \u00c1ltal\u00e1ban biztons\u00e1gi c\u00e9lokra haszn\u00e1lj\u00e1k, p\u00e9ld\u00e1ul a bankfi\u00f3kba val\u00f3 bejelentkez\u00e9skor. Ha elkapj\u00e1k, hogy megpr\u00f3b\u00e1lja megker\u00fclni a CAPTCHA-t, hackel\u00e9s v\u00e1dj\u00e1val illethetik, \u00e9s ak\u00e1r 8 \u00e9v b\u00f6rt\u00f6nb\u00fcntet\u00e9ssel is szembes\u00fclhet.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CAPTCHA <\/a>egy weboldal biztons\u00e1gi int\u00e9zked\u00e9se, hogy megakad\u00e1lyozza a botok hozz\u00e1f\u00e9r\u00e9s\u00e9t. Egy k\u00e9pet jelen\u00edt meg, amelyet neh\u00e9z megfejteni, \u00e9s a hozz\u00e1f\u00e9r\u00e9shez be kell \u00edrnia a k\u00e9p alatt megjelen\u00edtett bet\u0171ket \u00e9s sz\u00e1mokat egy dobozba. Azonban a hackerek annyira \u00fcgyesek lettek a hackel\u00e9s\u00e9ben, hogy a CAPTCHA-nak bonyolultabb\u00e1 kellett v\u00e1lnia, ami azt eredm\u00e9nyezte, hogy gyakrabban oldj\u00e1k meg \u0151ket, mint az emberek. Ennek lek\u00fczd\u00e9s\u00e9re, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reCAPTCHA <\/a><\/strong>lett kifejlesztve, amely apr\u00f3 n\u00e9gyzetekre n\u00e9z\u00e9st \u00e9s azok megjel\u00f6l\u00e9s\u00e9t vonja maga ut\u00e1n, amelyek t\u0171zcsapot, buszt vagy gyalog\u00e1tkel\u0151t \u00e1br\u00e1zolnak.<\/p>\n\n\n\n<p>Jelenleg, <strong>reCAPTCHA<\/strong> m\u00e9g mindig akt\u00edv. Azonban nem tart sok\u00e1ig, am\u00edg automatiz\u00e1lt g\u00e9pi tanul\u00e1si technik\u00e1kat fedeznek fel annak megker\u00fcl\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Mind a reCAPTCHA, mind a CAPTCHA abb\u00f3l az \u00f6tletb\u0151l sz\u00e1rmazik, hogy megval\u00f3s\u00edthat\u00f3 az emberek azonos\u00edt\u00e1sa a sz\u00e1m\u00edt\u00f3g\u00e9pekkel szemben az interneten alacsony k\u00f6lts\u00e9ggel, felhaszn\u00e1l\u00f3bar\u00e1t \u00e9s gyors m\u00f3don. Ezek a k\u00e9rd\u00e9sek arra k\u00e9nyszer\u00edtenek benn\u00fcnket, hogy megfontoljuk, mi tesz minket emberr\u00e9, \u00e9s hogy a g\u00e9pek k\u00e9pesek-e ezt az aspektust lem\u00e1solni. A nyilv\u00e1nval\u00f3 v\u00e1lasz az, hogy nem tudjuk, mert most beleugrottunk a filoz\u00f3fiai t\u00f3 m\u00e9ly\u00e9be.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>Hogyan maradhat el\u0151r\u00e9bb a g\u00f6rb\u00e9n, \u00e9s hogyan biztos\u00edthatja, hogy v\u00e1llalkoz\u00e1s\u00e1t vagy weboldal\u00e1t ne hackelj\u00e9k meg?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">Tartsd naprak\u00e9szen a szoftveredet<\/h3>\n\n\n<p>A legfontosabb dolog az, hogy a szoftver\u00e9t naprak\u00e9szen tartsa. Ez mag\u00e1ban foglalja az oper\u00e1ci\u00f3s rendszert, b\u00e1rmely alkalmaz\u00e1st \u00e9s b\u0151v\u00edtm\u00e9nyt. Az elavult szoftver az egyik leggyakoribb m\u00f3dja annak, hogy a hackerek hozz\u00e1f\u00e9rjenek egy rendszerhez.<\/p>\n\n\n\n<p>Egy m\u00e1sik m\u00f3dja annak, hogy megv\u00e9dje mag\u00e1t, hogy megv\u00e1ltoztatja az alap\u00e9rtelmezett felhaszn\u00e1l\u00f3nevet \u00e9s jelsz\u00f3t b\u00e1rmely eszk\u00f6z\u00f6n vagy fi\u00f3kon. Sokan nem veszik \u00e9szre, hogy az alap\u00e9rtelmezett felhaszn\u00e1l\u00f3n\u00e9v \u00e9s jelsz\u00f3 k\u00f6nnyen megtal\u00e1lhat\u00f3 az interneten. A hackerek tudj\u00e1k ezt, \u00e9s ezeket a hiteles\u00edt\u0151 adatokat pr\u00f3b\u00e1lj\u00e1k ki, miel\u0151tt bonyolultabb m\u00f3dszerekhez folyamodn\u00e1nak.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">Haszn\u00e1ljon k\u00e9tfaktoros hiteles\u00edt\u00e9st<\/h3>\n\n\n<p>A k\u00e9tfaktoros hiteles\u00edt\u00e9s (2FA) haszn\u00e1lata az egyik legjobb m\u00f3dja annak, hogy megv\u00e9dje fi\u00f3kjait a hackel\u00e9st\u0151l. A 2FA egy extra biztons\u00e1gi r\u00e9teget ad hozz\u00e1 az\u00e1ltal, hogy megk\u00f6veteli, hogy mind a jelsz\u00f3t, mind a telefonj\u00e1ra k\u00fcld\u00f6tt k\u00f3dot megadja. Ez sokkal nehezebb\u00e9 teszi a hackerek sz\u00e1m\u00e1ra a fi\u00f3khoz val\u00f3 hozz\u00e1f\u00e9r\u00e9st, m\u00e9g akkor is, ha megvan a jelszava.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">Az anonim rendszerhozz\u00e1f\u00e9r\u00e9s letilt\u00e1sa<\/h3>\n\n\n<p>A t\u00e1voli hozz\u00e1f\u00e9r\u00e9si t\u00e1mad\u00e1sok n\u00f6vekv\u0151ben vannak, \u00e9s elengedhetetlen, hogy l\u00e9p\u00e9seket tegyen a v\u00e9delem \u00e9rdek\u00e9ben. A kiberb\u0171n\u00f6z\u0151k egyre kifinomultabbak, ez\u00e9rt elengedhetetlen, hogy el\u0151r\u00e9bb maradjunk a g\u00f6rb\u00e9n. A szoftver naprak\u00e9szen tart\u00e1sa, a k\u00e9tfaktoros hiteles\u00edt\u00e9s haszn\u00e1lata \u00e9s az anonim hozz\u00e1f\u00e9r\u00e9s letilt\u00e1sa mind hat\u00e9kony m\u00f3dja annak, hogy megv\u00e9dje mag\u00e1t. Ahogy a technol\u00f3gia fejl\u0151dik, \u00faj m\u00f3dszereket kell kidolgoznunk, hogy el\u0151r\u00e9bb maradjunk a hackerekkel szemben ebben a macska-eg\u00e9r j\u00e1t\u00e9kban.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/\">Folytat\u00e1s <span class=\"screen-reader-text\">T\u00e1voli T\u00e1mad\u00e1s<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continue reading Remote Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u00e1voli t\u00e1mad\u00e1s | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/","og_locale":"hu_HU","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continue reading Remote Attack","og_url":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/tavoli-tamadas\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"T\u00e1voli t\u00e1mad\u00e1s | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}