Sunday, October 21, 2012

0 Common Hacking Tactics


Please Leave A Comment~ Thank You...!!!

Denial of Service
-Hammering a website’s equipment with too many requests for information
Clogging the system, slowing performance or even crashing the site.

Scans
-Widespread probes of the Internet to determine types of computers, services, and connections Looking for weaknesses.

Sniffer
-Programs that search individual packets of data as they pass through the Internet
Capturing passwords or entire contents.

Spoofing
-Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers.

Trojan Horse
-A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software

Back Doors
-A hidden point of entry to be used in case the original entry point has been detected or blocked.

Malicious Applets
-Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake e-mail, or steal passwords.

War Dialing
-Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection.

Logic Bombs
-An instruction in a computer program that triggers a malicious act.

Buffer Overflow
-A technique for crashing or gaining control of a computer by sending too much data to the buffer in a computer’s memory.

Password Crackers
-Software that can guess passwords.

Social Engineering
-Gaining access to computer systems.
-By talking unsuspecting company employees out of valuable information such as passwords.

Dumpster Diving
-Sifting through a company’s garbage to find information to help break into their computers.

0 comments:

Post a Comment

Thank You For Comment...