Tuesday, September 20, 2016

Hacking


Hacking is the obsessive use of computer on the unauthorized access and use of networked computer.
Example-Website Hacking, Email Hacking, Network Hacking, Password Hacking


Common hacking tactics:
Denial of Service (DOS) Attack
Here the legitimate users are prevented from accessing information or service. Ex-Crashing the system or network, Ping of Death, SSPing , Smurf
Trojan Horse
Software program containing a concealed malicious capability but appears to be benign, useful, or
attractive to users
Back Door
Software that allows an attacker to access a machine using an alternative way. It can be installed by attackers after a machine has been compromised. It allows attacker entering in the victim’s computer without account name and password. It can be set up using NET CAT.
Sniffers
Allows attacker to see everything sent across the network, including user IDs and passwords. Ex-Snort, Win dump, Sniff it, D sniff
Spoofing
An attacker alters his identity so that someone thinks he/she is someone else. Attacker exploits trust relation between user and networked machines to gain access to machines. Ex-IP, Email, Web spoofing.