Common Hacking Tactics - Tech Guy Nepal

Post Top Ad

Responsive Ads Here

Common Hacking Tactics

Share This

An illegal activity to get unauthorized information by modifying a system’s features and exploiting its loopholes can be called Unethical hacking. In this world where most of the things happen online, hacking provides wider opportunities for the hackers to gain unauthorized access to the unclassified information like credit card details, email account details and other personal information. So, it is also important to know some common hacking tactics that are commonly used to get your personal information in an unauthorized way.

1.    Denial of Service (DoS)
-   Hammering a website's equipment with too many requests for information, effectively clogging the system, slowing the performance of even crashing site.
-   User who attempts to visit the site will be denied access.

2.    Scams
-   Widespread probes of the internet to determine types of computers services and connections.

3.    Sniffer
-      Packets, capturing passwords or entire contents.

4.    Spoofing
-   Faking email address or webpage to trick users into passing along critical information like password, credit card numbers.

5.    Trojan Horse
Trojan Horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. The term "Trojan Horse" is derived from a story of the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war. The Greeks constructed a huge wooden horse, and hide a select force of men inside including Odysseus.

6.    War Dialing
-   Program automatically dials thousands of telephones numbers in search of a way through a modem connection.

7.    Password Cracker
-   Software that can guess passwords.

8.    Cracker
A Computer Criminal who penetrates a computer to steal information or damage programs in some way.
-   A malicious hacker
-   Also called black hats
-   hackers becomes obsessed with gaining entry to high secure computer system.

9.    Bacn (Bacon)
-   Email message the recipient has accepted to receive it.
-   Newsletter, alerts and automated reminders.

10.  Cyber Gangs
-   Bring crackers together by means of internet and physical meetings.
-   Reinforce their immature and often destructive aims.

11.  Computer Virus Authors/Virus
A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cyber security issues, artificial life and evolutionary algorithms.

12.  Identity Theft
-   A criminal poses as someone else.

13.  Cyber War
-   A country's information system could be paralyzed from a massive attack by destructive software.

14.  Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.

15.  Zombie
-   A computer that has been hijacked by a cracker without owner's knowledge and used to perform malicious task on the internet.

16.  Multi Slacking
-   Playing games at computer instead of working.

17.  Spam
-   Unsolicited commercial email, the electronic equivalent of:
-    Junk Mail
-   To send an email message to great numbers of recipient without regard for their need to know.

No comments:

Post a Comment

Post Bottom Ad

Responsive Ads Here