Sunday, February 21, 2016

10 Hacking Tactics You Should Know Of


10. Keylogging
Keylogging is a type of surveillance spyware that record messages, emails and keystrokes to a log file.
That may contain passwords, Social security numbers, credit card data and easily can be sent to the hacker.




9. Denial of Service (DoS\DDoS)
a distributed denial of service (DDOS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
Those attacks often employ botnets, also called zombie computers which are system that are taken over, sometimes unknowingly, by a hacker.
                                                    
8. Waterhole attacks
Hackers will take advantage of the face that their targeted victims often meet or work at particular physical or virtual location.
So they "poison" that location to achieve malicious objective.
If companies have a local coffee shop that is popular with company employees. hackers will create fake WAPs (WIFI Access Point)
Or maliciously modify a frequently visited website to do the same.

7. Fake wireless access points
Using software and wireless network card hackers can set up a fake WAP (Wireless Access Point) which connects to the official public place WAP.
Hackers can sniff unprotected data that transferred between the victims and their remote host, password too.
Some will ask you to make a new account to use their WAP, and then they'll use the same log on on popular websites.

6. Eavesdropping (Passive Attacks)
With a passive attack, computer systems and networks are monitored in order for a hacker to gain some information.
The point isn't to cause damage to the computers but to harvest information as its transmitted, its also known as sniffing or snooping.

5. Phishing
Hacker sends an electronic message to an unsuspecting user under the impression that the message is from a trusted institution.
and the user is fooled into giving his information that might also include a username, passwords, social security number and bank account information.

4. Viruses (Active Attacks)
Active attacks, such as viruses and Trojans are techniques where a hacker manipulates or deletes data to create a desired result.
And a Trojan is simply a computer program that fools the user into thinking it's another kind of program and once installed, releases the malicious code.

3.ClickJacking Attacks
ClickJacking also called a UI Redress attack is when a hacker uses several solid layers to fool a user into clicking the top layer without them realizing. 
So this attacker "Hijacking" clicks that aren't meant for the exact page, but for a page where the hacker want you to be.

2. Cookie theft
When a hacker steals out cookies they become authenticated to our website as if they were us and had supplied a valid log-on name and password.
Firefox browser add-on "firesheep" allows people to steal unprotected cookies from others. when used with a fake WAP. Even encrypted cookies can be stolen.

1. Bait and switch.
Bait and switch hacking involves running malicious content though the user believes he is running something standard.
Hackers create "free" content that can be downloaded and used by anyone. But then replaces the link that the victim looked at originally with a malicious link.

0 comments: