Computer
hacking is most common among teenagers and young adults, although there are
many older hackers as well. Many hackers are true technology buffs who enjoy learning
more about how computers work and consider computer hacking an “art” form. They
often enjoy programming and have expert level skills in one particular program.
For these individuals, computer hacking is a real life application of their
problem-solving skills. It’s a chance to demonstrate their abilities, not an
opportunity to harm others.
Since a
large number of hackers are self-taught prodigies, some corporations actually
employ computer hackers as part of their technical support staff. These individuals
use their skills to find flaws in the company’s security system so that they
can be repaired quickly. In many cases, this type of computer hacking helps
prevent identity theft and other serious computer-related crimes. Common
Methods for Hacking
Computer Servers: This comprises of either taking control
over terminal(or Server) or render it useless or to crash it.. following
methods are used from a long time and are still used..
Phishing:-This is another type of keylogging, here
you have to bring the user to a webpage created by you resembling the
legitimate one and get him to enter his password, to get the same in your mail
box..!! Use social engineering..
Distributed DoSs:-Distributed DoSs (DDoSs) are coordinated
DoS attacks from multiple sources. A DDoS is more difficult to block because it
uses multiple, changing, source IP addresses.
Denial of Service:-DoS attacks give hackers a way to bring
down a network without gaining internal access. DoS attacks work by flooding
the access routers with bogus traffic(which can be e- mail or Transmission
Control Protocol, TCP, packets).
Sniffing:- Sniffing refers to the act of intercepting
TCP packets. This interception can happen through simple eavesdropping or
something more sinister.
Spoofing:-Spoofing is the act of sending an illegitimate
packet with an expected acknowledgment (ACK), which a hacker can guess,
predict, or obtain by snooping
SQL injection:-SQL injection is a code injection technique
that exploits a security vulnerability occurring in the database layer of an
application. It uses normal SQL commands to get into database with elevated privellages..
Viruses and Worms:-Viruses and worms are self- replicating
programs or code fragments that attach themselves to other programs (viruses)
or machines (worms). Both viruses and worms attempt to shut down networks by
flooding them with massive amounts of bogus traffic, usually through e-mail.
Back Doors:- Hackers can gain access to a network
by exploiting back doors administrative shortcuts,configuration errors, easily deciphered
passwords, and unsecured dial-ups. With the aid of computerized searchers
(bots), hackers can probably find any weakness in the network.
So, not
interested in these stuffs.. huh??? wait there is more for you.. So, how about
the one related to hacking the passwords of email and doing some more exciting
stuffs..The various methods employed for this are:
Trojan Horses:- Trojan horses, which are attached to
other programs, are the leading cause of all break-ins. When a user downloads
and activates a Trojan horse, the software can take the full control over the
system and you can remotely control the whole system.. great..!!! They are also
reffered as RATs(Remote Administration tools)
Key loggers:-Consider the situation, everything you
type in the system is mailed to the hacker..!! Wouldn't it be easy to track
your password from that.. Keyloggers perform similar functionallities.. So next
time you type anything.. Beware..!! Have already posted about keyloggers and ways
to protect yourself from them..
Brute Forcing:-The longest and most tiring job.. don't
even consider this if you don't know the SET of password for your victim..Secret
Question According to a survey done by security companies, it is found that rather
than helping the legitimate users the security questions are more useful to the
hackers.. So if you know the victim well try this..
Social Engineering:-Ya this was one of the oldest trick
to hack.. Try to convince your user that you are a legitimate person from the
system and needs your password for the continuation of the service or some
maintainence.. This won't work now since most of the users are now aware about
the Scam.. But this Social Engginering concept is must for you to have to convince
victim for many reasons..!
Fake Messengers:-So its a form of phishing in the application
format.. getting user, to enter the login info in the software and check your
mail..!!!
Cookie Stealer:-Here the cookie saved by the sites are
taken and decoded and if you get lucky.. You have the password..!!! Hmmm.. not
satisfied with single account at a time..?? so there are ways to hack lots of
accounts together.. I know few but there exists many..!! listed are the ones I know
and will teach you in coming posts...
DNS Poisoning or PHARMING:-
So, phishing is a tough job..
isn't it..?? convincing someone to enter their password at your page..?? what
if you don't have to convince..?? what if they are directed automatically to
your site without having a clue..?? Nice huh..?? Pharming does the same for you..
More about it in my next post..
Whaling:-
This
method gets you the password of the accounts which are used by the hackers to
recive the passwords.. So you just have to hack one ID, which is simplest
method( Easy then hacking any other account, will tell you how in coming
posts..) and you will have loads of passwords and so loads of accounts at your
mercy..!!!
0 comments:
Post a Comment