ALL ABOUT INTERNET AND HACKING
Would you like to react to this message? Create an account in a few clicks or log in to continue.
ALL ABOUT INTERNET AND HACKING

Welcome to Hackers Arena Africa Hackers Lodge
 
HomeGalleryLatest imagesSearchRegisterLog in
Latest topics
» Any Video Converter Professional 3.0.7 Registration Name And License Code
Ways To Hack A Computer – A CompleteReference EmptySun Jun 08, 2014 12:37 pm by rhyvanor

» [??????] ????? ???????????.zip
Ways To Hack A Computer – A CompleteReference EmptySat Jun 07, 2014 9:55 pm by rhyvanor

» Www Doraemon Hentai Com
Ways To Hack A Computer – A CompleteReference EmptySat Jun 07, 2014 8:38 am by rhyvanor

» 5 Best Windows 7 Visual Pack For Your XP
Ways To Hack A Computer – A CompleteReference EmptyFri Jun 06, 2014 5:30 am by rhyvanor

» 5 Best Windows 7 Visual Pack For Your XP
Ways To Hack A Computer – A CompleteReference EmptyThu Jun 05, 2014 7:10 pm by rhyvanor

» Apb Reloaded All Points Bulletin Pc Eng 2011
Ways To Hack A Computer – A CompleteReference EmptyFri May 30, 2014 8:04 am by rhyvanor

» TuneUp Utilities 2011 V10 0 3000 101 WORKING [CRACKED]-
Ways To Hack A Computer – A CompleteReference EmptyFri May 30, 2014 1:07 am by rhyvanor

» WebPoint 1.3.1.13
Ways To Hack A Computer – A CompleteReference EmptyThu May 29, 2014 4:17 pm by rhyvanor

» Adobe-pdf-converter-5.0
Ways To Hack A Computer – A CompleteReference EmptyTue May 27, 2014 7:33 pm by rhyvanor


 

 Ways To Hack A Computer – A CompleteReference

Go down 
AuthorMessage
Admin
Admin
Admin


Posts : 119
Join date : 2011-10-15
Age : 33
Location : NG

Ways To Hack A Computer – A CompleteReference Empty
PostSubject: Ways To Hack A Computer – A CompleteReference   Ways To Hack A Computer – A CompleteReference EmptySat Sep 08, 2012 9:49 pm

[You must be registered and logged in to see this image.]
In the present world of high-speed internet,
people have grown curiosity towards HACKING.
Everybody is searching for a secret passage or
method to bypass, extract, get and modify the
information by any means. Among teenagers, the
general tendency of hacking is concentrated to
social media accounts.
Here I will describe all the methods which are
popular in the world of hacking in order to hack
into a computer terminal and online account.
1. Phishing
This is a method where you have to bring the
user to a webpage created by you which appears
to be the same as the interface of the legitimate
one and get him/her to enter the credentials.
Then the redirect page will land somewhere else
and you will get the password in your mail box as
defined inside the php script.
2. Keylogger
Consider a situation; everything you type in the
system is mailed to the hacker! Wouldn’t it be
easy to track your password from that?
Keyloggers perform similar functionalities. So you
have to be cautious while typing anything. Now a
day, remote keyloggers are also used. So before
downloading any executable file keep an eye on
the downloadable element. Also lookout for your
open ports… someone might be looking into it.
Periodically check “netstat” from command
prompt.
3. BruteForcing
This is quite a long and most tiring task. This
method is very useful if you know that the victim
is using his password among a few known
possibilities that you are aware of. If you don’t
know much and the possibilities are more, then
you shouldn’t go for it.
4. Secret Question
According to a survey done by security
companies, it is found that people generally
complain for hacking as per their secret question
answers. This is indeed a much easier method. In
some cases, there are only fixed secret questions,
so it becomes much easier for the hackers. So,
don’t use simple answers, don’t reveal it to
anyone and I would suggest you to use own
secret questions with answers.
5. Social Engineering
This is one of the oldest tricks to hack. Try to
convince the user that you are a legitimate
person from the system or central server and
needs your password for the continuation of the
service or some maintenance or you need to reset
your password to some combination like
‘abc12345’. This won’t work now since most of
the users are now aware about the Scam. But this
Social Engineering concept is must for you to
convince the victim for many reasons. It may
work in some case.
6. Fake Messengers
This is a form of phishing in the application
format. Sometimes, there are some fake
applications which tend the user to enter the
login info in the software and check your mail.
But unknowingly, your login credentials are being
sent to the ftp server destination of the hacker.
7. Viruses And Worms
Viruses and worms are self-replicating programs
or code fragments that attach themselves to
other programs (viruses) or machines (worms).
Both viruses and worms attempt to shut down
networks by flooding them with massive amounts
of bogus traffic, usually through e-mail. So install
a good working antivirus and antispam program
which is capable of handling the potential threats.
8. Back Doors
Hackers can gain access to a network by
exploiting back doors administrative shortcuts,
configuration errors, easily deciphered passwords,
and unsecured dial-ups. With the aid of
computerized searchers (bots), hackers can
probably find any weakness in the network. So
you have to strengthen your security to avoid
unauthorized access.
9. Trojan Horses
Trojan horses, which are attached to other
programs, are the leading cause of all break-ins.
When a user downloads and activates a Trojan
horse, the software can take the full control over
the system and you can remotely control the
whole system. Isn’t it great! They are also
referred as RATs (Remote Administration tools).
Always periodically watch out your open terminals
by checking ‘netstat’.
10. Denial Of Service
DoS attacks give hackers a way to bring down a
network without gaining internal access. DoS
attacks work by flooding the access routers with
bogus traffic (which can be e-mail or Transmission
Control Protocol, TCP, packets).
11. Distributed DoSs
Distributed DoSs (DDoSs) are coordinated DoS
attacks from multiple sources. A DDoS is more
difficult to block because it uses multiple,
changing, source IP addresses. So better to use
upgraded and advanced servers like grid server
etc.
12. Sniffing
Sniffing refers to the act of intercepting TCP
packets. This interception can happen through
simple monitoring or something more wicked. So
it’s better to secure the working network. Also
make sure that, none of your users is giving your
TCP packets to outer network knowingly or
unknowingly. Knowing IP address only also can do
a lot as there is a powerful penetration tool to do
the damage (BACKTRACK OS + METASPLOIT).
13. Spoofing
Spoofing is the act of sending an illegitimate
packet with an expected acknowledgment (ACK),
which a hacker can guess, predict, or obtain by
snooping.
14. SQL Injection
SQL injection is a code injection technique that
exploits a security vulnerability occurring in the
database layer of an application. It uses normal
SQL commands to get into database with
elevated privileges. Some security precautions
need to be taken to handle this attack.
15. Cookie Stealer
Each time you access into an online account, the
sites identify your system and you by your
cookies. If somebody gets the cookie saved by the
sites, then he can easily decode it and can get
the password! This is generally possible in open
networks. So while using open networks always
use https as it makes you enter into secure mode
without leaving the cookie to the network.
Back to top Go down
https://hack.forumpolish.com
 
Ways To Hack A Computer – A CompleteReference
Back to top 
Page 1 of 1
 Similar topics
-
» 100% WAYS TO PROTECT YOUR BLACKBERRY AGAINST THEFT, VIRUS & DATA LOST USING LOOKOUT MOBILE APP

Permissions in this forum:You cannot reply to topics in this forum
ALL ABOUT INTERNET AND HACKING :: Computer Outlet-
Jump to: