8 Common Hacking Techniques
2. Bait and Switch Attack.
3. Key Logger
4. Denial of Service (DoS\DDoS) Attacks
6. Fake W.A.P
7. Cookie Theft
8. Viruses and Trojans
Phishing or Fishing!
Looks the same in terms of pronunciation, yes in terms of activity too!
This is the most common hacking technique. Phishing is the term used when an attacker steals data including information such as bank account numbers, internet banking login credentials, and credit card numbers. Surprisingly, nowadays attackers are phishing through phone calls.
The hacker usually aims to steal the private information of a known company or any known contact of the victim.
Now the question is how do they do it?
By opening the user an email or text message that directs the user to a malicious link, ultimately leading to the installation of malware and the gathering of sensitive information.
Bait and Switch Attack.
Both these techniques can be used to steal login credentials and personal details right under the nose of the victim. 'Bat and switch' is a form of fraud that uses relatively reliable means – advertisements – to trick users into visiting malicious sites. These attacks often take the form of advertising space being sold by websites and purchased by shady companies.
A keylogger or keystroke logger is software that tracks or logs the keys you hit on your keyboard, usually in a secret way so that you don't know your actions are being monitored.
This is usually done with malicious intent to collect your account information, credit card numbers, usernames, passwords, and other personal data.
Parents can monitor their children's online activity or law enforcement can use it to analyze and track incidents related to personal computer use, and employers can ensure that their employees are on the Web throughout the day Working out instead of surfing.
Denial of Service (DoS\DDoS) Attacks
A DOS attack is a Denial-of-Service attack. In general terms, the attacker is making a web service down and inaccessible to a legitimate user.
One can perform DOS attacks using bots. Sending a large number of requests to a particular web app/service at the same time so that the service may slow down or even stop responding. This makes the services inaccessible to the legitimate user.
A clickjacking attack is exactly what it sounds like. It means luring a user to click on a link or an ad and then installing malware or a Trojan into the user's machine. This later leads to taking over the user's machines and stealing confidential information.
Fake WAP (Wireless Access Point) is a type of hacking attack in which the attacker sets up a wireless router with a trusted valid name in a public place where people can connect to it. Once this is done, the hacker can monitor and even alter the Internet connection to steal sensitive data or force the user to download malware to their device.
Cookies are small files left on the computer of a person who visits a website. The cookie will typically contain a record of what the person did on the site, which links he clicked on, where he spent time, stuff like that.
Cookie theft is when one application looks at or modifies the cookies from other sites or apps to learn what the person looked at, or to plant false information.
In a benign case, the thief could find out what products the person was shopping for, and then send ads for rival products.
In a malicious case, someone could plant data indicating that the person looked at child pornography or visited radical Islamic sites, and then tip off law enforcement.
Viruses and Trojans
A computer virus is a piece of malware that is specifically designed to do malicious harm to your computer, system, or network. These types of programs and tools are normally designed by hackers or security experts to perform harm and other roles to these systems.
Not just viruses, there are many different types of malware out there. Trojans is one of them. A Trojan is generally referred to as a non-self-replicating type of malware that gains privileged access to the operating system to perform a desirable function, but instead leaves a malicious payload, which often allows unauthorized access to the target's computer through a backdoor
Join GraspHack Family!
We will never spam you.
Be a part of our ever growing community.