Common Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or
render it useless or to crash it.. following methods are used from a long time
and are still used..
1. Denial of Service -
DoS attacks give hackers a way to bring down a network without gaining
internal access. DoS attacks work by flooding the access routers with bogus
traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).
2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple
sources. A DDoS is more difficult to block because it uses multiple, changing,
source IP addresses.
3. Sniffing -
Sniffing refers to the act of intercepting TCP packets. This
interception can happen through simple eavesdropping or something more
sinister.
4. Spoofing -
Spoofing is the act of sending an illegitimate packet with an expected
acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping
5. SQL injection -
SQL injection is a code injection technique that exploits a security
vulnerability occurring in the database layer of an application. It uses normal
SQL commands to get into database with elivated privellages..
6. Viruses and Worms -
Viruses and worms are self-replicating programs or code fragments that
attach themselves to other programs (viruses) or machines (worms). Both
viruses and worms attempt to shut down networks by flooding them with massive
amounts of bogus traffic, usually through e-mail.
7. Back Doors -
Hackers can gain access to a network by exploiting back doors
administrative shortcuts, configuration errors, easily deciphered
passwords, and unsecured dial-ups. With the aid of computerized searchers
(bots), hackers can probably find any weakness in the network.
So, not interested in these stuffs.. huh??? wait there is more for you..
So, how about the one related to hacking the passwords of email and doing some
more exciting stuffs.. The various methods employed for this are:
8. Trojan Horses -
Trojan horses, which are attached to other programs, are the leading
cause of all break-ins. When a user downloads and activates a
Trojan horse, the software can take the full control over the system and
you can remotely control the whole system.. great..!!! They are also reffered
as RATs(Remote Administration tools)
9. Keyloggers -
Consider the situation, everything you type in the system is mailed to
the hacker..!! Wouldn't it be easy to track your password from
that.. Keyloggers perform similar functionallities.. So next time you type
anything.. Beware..!! Have already posted about keyloggers and ways to protect
yourself from them..
10. BruteForcing -
The longest and most tiring job.. don't even consider this if you don't
know the SET of password for your victim..
11. Secret Question -
According to a survey done by security companies, it is found that
rather than helping the legitimate users the security questions are more
useful to the hackers.. So if you know the victim well try this..
12. Social Engineering -
Ya this was one of the oldest trick to hack.. Try to convince your user
that you are a legitimate person from the system and needs your password
for the continuation of the service or some maintainence.. This won't work now
since most of the users are now aware about the Scam.. But this Social
Engginering concept is must for you to have to convince victim for many
reasons..!!!
13. Phishing -
This is another type of keylogging, here you have to bring the user to a
webpage created by you resembling the legitimate one and get him to enter
his password, to get the same in your mail box..!! Use social engginering..
14. Fake Messengers -
So its a form of phishing in the application format.. getting user, to
enter the login info in the software and check your maill..!!!
15. Cookie Stealer -
Here the cookie saved by the sites are taken and decoded and if you get
lucky.. You have the password..!!!
Hmmm.. not satisfied with single account at a time..?? so there are ways
to hack lots of accounts together.. I know few but there exists many..!! listed
are the ones i know and will teach you in coming posts...
16. DNS Poisoning or PHARMING -
So, phisihing is a tough job.. isn't it..?? convincing someone to enter
their password at your page..?? what if you don't have to convince..??
what if they are directed automatically to your site without having a clue..??
Nice huh..?? Pharming does the same for you.. More about it in my next
post..
17. Whaling -
This method gets you the password of the accounts which are used by the
hackers to recive the passwords.. So you just have to hack one ID, which
is simplest method( Easy then hacking any other account, will tell you how in
coming posts..) and you will have loads of passwords and so loads
of accounts at your mercy..!!!
Dont Forgot to leave a comment if you like the post
Categories:
BEST HACKING
,
Cyber NEWS
,
FACTS