In the real sense of human hacking can be called an illegal activity to get unauthorized information by modifying a system’s features and exploiting its loopholes. In this world where most of the things happen online, hacking provides wider opportunities for the hackers to gain unauthorized access to the unclassified information like credit card details, email account details, and other personal information.
So, it is also important to know some of the hacking techniques that are commonly used to get your personal information in an unauthorized way.
BAIT AND SWITCHUsing bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.
COOKIE THEFTThe cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.
CLICKJACKING ATTACKClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click. In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.
TROJAN,VIRUS ETC.Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.
PHISHINGPhishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link. Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.
EAVESDROPPING(Passive Attacks)Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information. The motive behind eavesdropping is not to harm the system but to get some information without being identified.
FAKE WAPEven just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.
WATERHOLE ATTACKIf you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim. For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc. Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.
DENIAL OF SERVICE (DoS\DDoS)A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down. For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.
KEY LOGGERKeylogger is a simple software th at records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords. Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.
Thanks for reading my news about
Top Ten(10) Hacking Tricks/Techniques at my blog
Tic Droid if you want too share this article, please put the resource, and if you think this article is very usefully dont forget to bookmark this site with CTRL + D on your keyboard to web browser.
More Articles :
Top Ten(10) Hacking Tricks/TechniquesIn the real sense of human hacking can be called an illegal activity to get unauthorized information… Read More...
Get rid of HANGING in Android DeviceThis mobile phone hanging is one of the main problem we're facing today with our mobiles,Many people… Read More...
How you can check your Android device/phone CHIPSETMany people has tried as much as they could to know their device CHIPSET yet don't know how to do it… Read More...
How to download Korea moviesHello everyone, this is a tutorial that will enlighten you on how to download Korea movies, some peo… Read More...
Get PAID APPS Free on your ANDROID DEVICE Using GETAPKHello people, this is a tutorial that can help you to download PAID APPS from Play store FREE of cha… Read More...
How to fix INVALID IMEI NUMBERSometimes our IMEI NUMBER get corrupt due to one reason or the other, some may notice this error aft… Read More...
How to download YouTube videosHello people, this is a video that will help or guide you on how you can download YouTube videos wit… Read More...
How to tweak IMEI number using Mobileuncle toolboxDESCRIPTION:Mobileuncle toolbox is one of the most important, useful and helpful application you can… Read More...
How to fix AUDIO/VOLUME problem in Android devicesHello people, this tutorial is for those who have low volume in their device/phone, most of us have … Read More...
Have a new interface on your android device(from ginger bird, jellybean and KitKat to lollipop and Marshmallow)Do you have a small end Android device that come with GingerBird, Jellybean or KitKat view/version d… Read More...
Like This Article ? share it now :