; All Types Of Hacking Techniques 17 ways to bring accounts to your Mercy
Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

All Types Of Hacking Techniques 17 ways to bring accounts to your Mercy

VIEWS: 4 PAGES: 2

  • pg 1
									                                        So, Its time now that we should
know what are various categories hacking fall into. I will try to focus
on the ones based on password hacking. There is no distinct
classification of hacking.. but i will list all i could remember..So, as
you all would have guessed this will not be a practical application.. I
will give tutorials on all of them in coming posts.. but its the most
important thing to have basic knowledge about all the techniques
available.. So, consider going through the post once..Common Methods for
Hacking Computer Terminals(Servers):This comprises of either taking
control over terminal(or Server) or render it useless or to crash it..
following methods are used from a long time and are still used..1. Denial
of Service - DoS attacks give hackers a way to bring down a network
without gaining internal access. DoS attacks work by flooding the access
routers with bogus traffic(which can be e-mail or Transmission Control
Protocol, TCP, packets).2. Distributed DoSs -Distributed DoSs (DDoSs) are
coordinated DoS attacks from multiple sources. A DDoS is more difficult
to block because it uses multiple, changing, source IP addresses.3.
Sniffing - Sniffing refers to the act of intercepting TCP packets. This
interception can happen through simple eavesdropping or something more
sinister.4. Spoofing - Spoofing is the act of sending an illegitimate
packet with an expected acknowledgment (ACK), which a hacker can guess,
predict, or obtain by snooping5. SQL injection -SQL injection is a code
injection technique that exploits a security vulnerability occurring in
the database layer of an application. It uses normal SQL commands to get
into database with elivated privellages..6. Viruses and Worms - Viruses
and worms are self-replicating programs or code fragments that attach
themselves to other programs (viruses) or machines (worms). Both viruses
and worms attempt to shut down networks by flooding them with massive
amounts of bogus traffic, usually through e-mail.7. Back Doors - Hackers
can gain access to a network by exploiting back doors administrative
shortcuts, configuration errors, easily deciphered passwords, and
unsecured dial-ups. With the aid of computerized searchers (bots),
hackers can probably find any weakness in the network.So, not interested
in these stuffs.. huh??? wait there is more for you.. So, how about the
one related to hacking the passwords of email and doing some more
exciting stuffs.. The various methods employed for this are:8. Trojan
Horses -Trojan horses, which are attached to other programs, are the
leading cause of all break-ins. When a user downloads and activates a
Trojan horse, the software can take the full control over the system and
you can remotely control the whole system.. great..!!! They are also
reffered as RATs(Remote Administration tools)9. Keyloggers -Consider the
situation, everything you type in the system is mailed to the hacker..!!
Wouldn't it be easy to track your password from that.. Keyloggers perform
similar functionallities.. So next time you type anything.. Beware..!!
Have already posted about keyloggers and ways to protect yourself from
them..10. BruteForcing - The longest and most tiring job.. don't even
consider this if you don't know the SET of password for your victim..11.
Secret Question - According to a survey done by security companies, it is
found that rather than helping the legitimate users the security
questions are more useful to the hackers.. So if you know the victim well
try this..12. Social Engineering - Ya this was one of the oldest trick to
hack.. Try to convince your user that you are a legitimate person from
the system and needs your password for the continuation of the service or
some maintainence.. This won't work now since most of the users are now
aware about the Scam.. But this Social Engginering concept is must for
you to have to convince victim for many reasons..!!!13. Phishing - This
is another type of keylogging, here you have to bring the user to a
webpage created by you resembling the legitimate one and get him to enter
his password, to get the same in your mail box..!! Use social
engginering..14. Fake Messengers - So its a form of phishing in the
application format.. getting user, to enter the login info in the
software and check your maill..!!!15. Cookie Stealer - Here the cookie
saved by the sites are taken and decoded and if you get lucky.. You have
the password..!!!Hmmm.. not satisfied with single account at a time..??
so there are ways to hack lots of accounts together.. I know few but
there exists many..!! listed are the ones i know and will teach you in
coming posts...16. DNS Poisoning or PHARMING - So, phisihing is a tough
job.. isn't it..?? convincing someone to enter their password at your
page..?? what if you don't have to convince..?? what if they are directed
automatically to your site without having a clue..?? Nice huh..??
Pharming does the same for you.. More about it in my next post..17.
Whaling - This method gets you the password of the accounts which are
used by the hackers to recive the passwords.. So you just have to hack
one ID, which is simplest method( Easy then hacking any other account,
will tell you how in coming posts..) and you will have loads of passwords
and so loads of accounts at your mercy..!!!I would like to add one thing
the methods metioned under exiting ways are easy but are for newbiees and
script kiddies so if you really want to learn hacking then do some real
work, then relaying on the softwares or tools.. will give info of that in
my later posts.. or comment if you want any more info.. So thats all for
now.. Comment if like the post.. I will highly Appriciate your interest..
Visit: Hackerz Hub njoy..

								
To top
;