![]() |
COMMON HACKING TECHNIQUES |
TOP 8 COMMON HACKING TECHNIQUES YOU SHOULD KNOW ABOUT:
1. BAIT AND SWITCH:
- It involves running of a content/program which contains malicious things, which the user believes that he is running something standard which will not affect.
- Hackers make use of their mind and create totally free content or program that can be downloaded and used by anyone.
- But then hackers replace the link that the user or victim looked at originally with a malicious link.
- And after doing all this, the hacker gets fully access to your computer.
2. KEYLOGGING:
- This is a software that records,what it records, it records what we type in the keyboard along with each and every key sequence and strokes.
- Keylogger programs are often called as spyware because they are mostly run on our device without user knowledge.
- It means that the user does not know at all whether a keylogger program is running in background or not.
- They are often installed incorrectly by hackers, so that they can spy a user computer, as well as know what a user is typing at the end.
- And by examining keylong data, it is possible to find out users private information such as username, password, bank details etc.
- List of few free keylogger software:
Kidlogger
All in one keylogger
Elite keylogger
Best free keylogger
3. PHISHING:
- So, basically it is an attack of gathering sensitive information of person or target such as username, password, email id etc.
- Gathering sensitive info may also include bank details, credit card, debit card information and many more.
- In this attack a hacker disguises himself as a trustworthy entity then he meets you or he tricks you into your sensitive information into that fake web application. So, this is phishing.
- In another scenario,
You probably seen it you receive an email from your bank
or trusted company and it’s asking you for information and shocking is that
it’s looks real.But it’s designed to fool you into handling over
important information.
4. MITM:
- This attack is also known as man in the middle attack.
- It is known by the name itself, There is one man who will sit in the middle and he will perform cyberattack.
- In this attack hacker will sit in between two endpoints, a client and a server and without any additional actions, all files that are transferred between client and server, all of them will go through the hacker, who is sitting in middle for a long time.
- It is divided into following categories:
IP spoofing
DNS spoofing
HTTPS spoofing
SSL hijacking
WIFI eavesdropping
Email hijacking
5. COOKIE THEFT:
- This famous attack is also known as SESSION HIJACKING.
Now, what are cookies?
- Cookies are a small file that our browser saves inside itself.in this file all our usernames and passwords are saved which we have used in the browser.
Now, what is cookies theft?
- Along with the benefits of cookies, it would have been very dangerous for us.
- If someone gets the cookies of our browser, then they can login to our account and do anything.
Now, what should a hacker do in
cookies stealing?
- They will send you an image, a video, a link, a file or anything or whatever scripts are being sent to you, such scripts have been added to it which you did not see, but when you click on it, your will be in control of hacker with which they will simply access your account.
6. MALWARE:
- This is the most dangerous attack in the field of cyber security.
- All those programs which are harmful to the user and computer system, all those are called malware or malicious program.
- All these programs are developed to provide harm to the computer or user.
- Malware can make entry onto your computer via questionable file downloads, visiting infected websites or through emails.
- Only purpose of this is to disrupt the computer system or is to get control over computer system.
- The most common types of malware are:
Spyware
Keyloggers
Rootkits
Adware
Ransomware
Trojan horse
Viruses
Worm
The hybrid
attacks
Malvertising
File-less
malware
7. DOS/DDOS:
- You must have heard the word that the “website of this company has crashed due to sudden traffic".
- Attackers can flood a system or website with excessive traffic and crashes down the website.
- In such a situation, all the real users of that website are also unable to access the data available on the website.
- The world’s largest and popular websites like Amazon, Netflix, PayPal etc. have also hit it.
8. WATERHOLES ATTACKS:
- Water hole attack strategy, used by a particular group of hackers (organisation, industry or region), in which the hacker is the first target the particular group and conducts a full research on that particular group to know which services, tools that group is using and also Analyse the design of the website.
- It tries to inject the malicious virus into the JavaScript or html code after removing the flaws with this they try to access the website.
- And, in such situation, the website webmaster does not think of it at all and the hacker easily hack and destroy.
Thanks for reading :)
Amazing son keep posting
ReplyDeleteHey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you Best linux cheat sheet commands service provider
ReplyDeleteI must point out my admiration for your generosity supporting women who should have guidance on this one study. Your personal dedication to passing the message all-around turned out to be especially effective and has frequently encouraged ladies like me to achieve their endeavors. Your own useful report denotes a great deal a person like me and even further to my colleagues. Thanks a ton; from each one of us. White House Market Link
ReplyDelete