Showing posts with label Cyber NEWS. Show all posts
Showing posts with label Cyber NEWS. Show all posts

All Types Of Hacking Techniques ~ Defence Hacker



Common Methods for Hacking Computer Terminals(Servers):

This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..

1. Denial of Service - 
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).

2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.

3. Sniffing - 
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

4. Spoofing - 
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping

5. SQL injection -
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated privellages..

6. Viruses and Worms - 
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

7. Back Doors - 
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.

So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:

8. Trojan Horses -
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.. great..!!! They are also reffered as RATs(Remote Administration tools)

9. Keyloggers -
Consider the situation, everything you type in the system is mailed to the hacker..!! Wouldn't it be easy to track your password from that.. Keyloggers perform similar functionallities.. So next time you type anything.. Beware..!! Have already posted about keyloggers and ways to protect yourself from them..

10. BruteForcing - 
The longest and most tiring job.. don't even consider this if you don't know the SET of password for your victim..

11. Secret Question - 
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if you know the victim well try this..

12. Social Engineering - 
Ya this was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintainence.. This won't work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!!!

13. Phishing - 
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engginering..

14. Fake Messengers - 
So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your maill..!!!

15. Cookie Stealer - 
Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the password..!!!

Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i know and will teach you in coming posts...

16. DNS Poisoning or PHARMING - 
So, phisihing is a tough job.. isn't it..?? convincing someone to enter their password at your page..?? what if you don't have to convince..?? what if they are directed automatically to your site without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..

17. Whaling - 
This method gets you the password of the accounts which are used by the hackers to recive the passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any other account, will tell you how in coming posts..) and you will have loads of passwords and so loads of accounts at your mercy..!!!


Dont Forgot to leave a comment if you like the post  


Live Chat is Available on DefenceHacker.in


We have launched a chat on our website for Readers. The Live Chat is available For 365 days online. To start a conversation with our Readers support, 

Simply go to   and click on button Online on the right side of the page. We will do  best to help you as soon as possible.
Thank You.

Yours Hacker Friend,
Parth Patel
(Defence Hacker)

Indian Navy investigates cyber attack on military PCs


Computer security, artwork
It is often hard to know where hackers are based,
even if IP addresses are traced to a certain country
 


The Indian Navy is investigating a suspected hack attack.
A spokesman confirmed to the BBC that computers at its Eastern Naval Command had been infected with malware.
The announcement follows a report in The Indian Express saying that a virus had collected data from computers not linked to the internet and had sent it to IP addresses in China.
But security firm Sophos said it did not necessarily mean the hackers were based in China.
The Chinese Embassy in the UK did not provide comment.
The Eastern Naval Command has a security role on India's eastern borders, including protection of strategic and commercial assets.

Start Quote

Finding the 'smoking gun' evidence of who was behind a particular internet attack is often very hard to find”
Graham CluleySophos
'Covering tracks'
It is reported that the information might have been collected via infected USB drives.
The malware is then thought to have created a secret folder on the drives where it stored documents, and as soon as the drive was plugged into a computer connected to the web, it sent the files to specific IP addresses.
Although those IP addresses were reportedly traced to China, an analyst from security firm Sophos warned against reading too much into the detail.
"Even if a hack is traced back to a Chinese IP address, it doesn't necessarily mean that Chinese hackers are behind the hack," Graham Cluley, senior technology consultant, told the BBC.
"It's very hard to prove who is behind an attack because hackers can hijack computers on the other side of the world and get them to do their dirty work for them. In fact, they often do this to cover their tracks.
"Finding the 'smoking gun' evidence of who was behind a particular internet attack is, for this reason, often very hard to find."

Free Premium Accounts For All The Popular Sites




     If you are looking for premium accounts like hotfile, rapidshare, megaupload, mediafire, filesonic, fileserve and more, and still can't find a working one than this is a right place for you.


    If you like having premium features like instant download no time limit but you cannot find a premium account and you are using a link generator than you will not have a hassle to download copy and paste links but direct downloads. 



    I would be happy to provide username and password here, don’t worry about passwords not working because all the password and usernames are updated daily. All the usernames we provide are the latest. So, what are you waiting for, you are just a one click away from premium accounts you choose. We update the premium account everybody crawling over the internet so you don't have to. So, just get it for free.


   You can use the premium accounts to download everything you want from all over the internet, like the mp3 music, the latest movies, games, e-book, whatever and get all you want as a premium download, so you can save your time and money.


(Click on Image to visit site)





A Short History On : Hacking


XBox Live Hacked or Suffering Connection Issues

Today Xbox Live users are suffering some Connection Issues and this is excepted as yesterday only the Xbox live account of Xbox’s Live Programming director’s was Hacked. So this points to the Xbox Live is been hacked aka compromised.
xboxlive
It is more likely that the Xbox live is hacked as the account of one of the makers of the Xbox live account was hacked yesterday only. While this can be a Connection issues too as the Expansion pack of Modern Warfare : “Stimulus Package” is out today which may have caused problems for the Xbox live servers as of large incensement in the connections ...

Xbox Support’s Twitter account is loaded with communications with customers about the problem, and the official support website at www.xbox.com/support is being bombarded by users.

“We’re aware of the issue and it is being worked on. Stay tuned for updates.”

An error code of 80150019 have been shown to the users of the Xbox live users. As the users are like not happy with this situation and would be likely as the Microsoft is in problems again.

… Talking about the Hacked account of Major Nelson’s of Xbox Live, Shortly after the hack happened, the Web site Lightzz took credit for the hack, posting a video of it, along with the hacker's Skype name. He is offering to hack other accounts as well.


Well whatever is going we will update this post as soon as Microsoft figures it out is it hacked or connection issues.