Hacking is
the obsessive use of computer on the unauthorized access and use of networked
computer.
Example-Website
Hacking, Email Hacking,
Network Hacking, Password Hacking
Common hacking tactics:
Denial of Service (DOS) Attack
Here the
legitimate users are prevented from accessing information or service. Ex-Crashing
the system or network, Ping of Death, SSPing , Smurf
Trojan
Horse
Software
program containing a concealed malicious capability but appears to be benign,
useful, or
attractive to
users
Back Door
Software
that allows an attacker to access a machine using an alternative way. It can be
installed by attackers after a machine has been compromised. It allows attacker
entering in the victim’s computer without account name and password. It can be
set up using NET CAT.
Sniffers
Allows
attacker to see everything sent across the network, including user IDs and
passwords. Ex-Snort, Win dump, Sniff it, D sniff
Spoofing
An attacker
alters his identity so that someone thinks he/she is someone else. Attacker
exploits trust relation between user and networked machines to gain access to
machines. Ex-IP, Email, Web spoofing.