HACKING Methods

love to share
Now a days hacking is done by several types.
first what is hacking?
It is gaining unauthorized access to data in a system or computer.
what is HACKER?
A person who secretly gets
access to a computer system in order to get
information, cause damage, etc.

Now a days it is very important to be beware and safe guard our online datas such as passwords, credit card details etc...

how a hacker gain acess to your datas or pc.
its very easy and there are many ways. Some of them are listed below.



PHISHING:
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords
and credit card numbers, online. The phising page will look as sane as original page

KEYLOGGER:
It a computer program that records
every keystroke made by a computer user,
especially in order to gain fraudulent access
to passwords and other confidential
information.

TAB NAPPING:
Tabnabbing is a computer exploit and new type of phishing attack, which persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine. ...

Inside Jobs -
Most security breeches
originate inside the network that is under
attack. Inside jobs include stealing
passwords (which hackers then use or sell),
performing industrial espionage, causing
harm (as disgruntled employees), or
committing simple misuse. Sound policy
enforcement and observant employees who
guard their passwords and PCs can thwart
many of these security breeches.

Rogue Access Points -
Rogue access points
(APs) are unsecured wireless access points
that outsiders can easily breech. (Local
hackers often advertise rogue APs to each
other.) Rogue APs are most often connected
by well-meaning but ignorant employees.

Back Doors -
Hackers can gain access to
a network by exploiting back
doors�'administrative shortcuts,
configuration errors, easily deciphered
passwords, and unsecured dial-ups. With
the aid of computerized searchers (bots),
hackers can probably find any weakness in
your network.

Viruses and Worms -
Viruses and worms
are self-replicating programs or code
fragments that attach themselves to other
programs (viruses) or machines (worms).
Both viruses and worms attempt to shut
down networks by flooding them with
massive amounts of bogus traffic, usually
through e-mail.

Trojan Horses -
Trojan horses, which are
attached to other programs, are the leading
cause of all break-ins. When a user
downloads and activates a Trojan horse, the
hacked software (SW) kicks off a virus,
password gobbler, or remote-control SW
that gives the hacker control of the PC.

Denial of Service
DoS attacks give
hackers a way to bring down a network
without gaining internal access. DoS attacks
work by flooding the access routers with
bogus traffic (which can be e-mail or
Transmission Control Protocol, TCP,
packets).

other methods are
Social engineering
cookie stealing
etc......................

There are more ways for hacking.....
The next post will discuss about how to prevent from these hacks

No comments :

Post a Comment