March 29, 2024

Top 10 Hacking Techniques Using By Hackers

Top 10 Hacking Techniques

Top 10 Hacking Techniques

Hacking is an endeavor to misuse a PC framework or a private system inside a PC. Basically, it is the unapproved access to or control over PC organize security frameworks for some illegal reason.




Top 10 Hacking Techniques

BRUTE FORCING

BRUTE FORCING is the oldest technique Using by Hacker. This technique works like permutations and combinations (mathematics).

Top 10 Hacking Techniques || BRUTE FORCING
Top 10 Hacking Techniques || BRUTE FORCING

For instance, if a hacker must crack the password of a file. He will try all combinations for a given length and then move to the next length.

How Brute Force Attacks Work

A hacker will try all characters like A-Z, a-z, 0-9 and special characters for length 1. If the password doesn’t match the hacker will move to length 1 and again try all combinations. This technique is no longer viable for online attacks but is still effective for offline attacks.

Once the correct username and password combination is found, the attacker is able to access the secure data or file.

 

SQL INJECTION

SQL injection is the process by which a hacker may hack the database of a server by typing SQL queries in the input forms of websites.

Top 10 Hacking Techniques SQL INJECTION
Top 10 Hacking Techniques SQL INJECTION

 

These queries are specially created to access data that may not be accessible to the hacker otherwise. However, with the introduction of PDO and MySQLi connectors, SQL injection rates have significantly dropped.

But for people using old MySQL connector, SQL injection is a real threat.

COOKIE STEALING

Cookies are used on almost every website around the internet. They are used to identify, remember and authenticate a particular user from the billions of other users on the website.

In Cookie stealing a hacker gains access to Cookies on your computer and imports them to his Browser.

So the next time he opens that particular site, the website will identify him as you and he has successfully stolen your identity. He will now do whatever illegal activities he wants and you will be blamed for the same.

KEYLOGGING

This is where it all began. The eldest and widely used method for hacking people. Keylogging is the process of creating a log(record) of all typed keystrokes on a system. All this data is then sent to the hacker’s server periodically.

Top 10 Hacking Techniques KEYLOGGING
Top 10 Hacking Techniques KEYLOGGING

Modern Keyloggers provide features like snapshotting the victim’s screen and even hide within other processes to not get detected.

PHISHING

Phishing is another widely used technique primarily to hack people’s internet accounts.

Top 10 Hacking Techniques Phishing
Top 10 Hacking Techniques Phishing

Phishing involves tricking the user into believing that a fake website(Created by the phisher) is the original one and making them enter their credentials.

This is usually done with help from MITM where a user is redirected from the original website to a fake website.

After the user enters their credentials they are then stored in the hacker’s server and the user is again redirected to the original site.

 

TROJANS

Trojans or Malware are programs that get installed on our system along with some other software that we install and these Trojans can send all our data outside.

Some of these Trojans and ma

Top 10 Hacking Techniques TROJANS
Top 10 Hacking Techniques TROJANS

where are created by antivirus companies themselves and are known to purposely hold system resources to slow down system performances?

CROSS SITE SCRIPTING – XSS

Somewhat like SQL Injection, Cross Site Scripting inserts malicious client-side code in the input fields so when those fields are requested by some other user, They get exposed to those malicious scripts.




Things like security keys are used to prevent XSS attacks.

 

DNS POISONING

DNS Poisoning refers to introducing incorrect DNS address information into the DNS resolving server to make the user go to the same site located on the attacker’s computer.

The Difference Between this and phishing is that in phishing attacks the URL is redirected to the hacker’s website.

But in DNS poisoning,  the same URL is used but a different server is used. Which by all means belongs to the hacker.

 

DDOS ATTACK

Have you ever been to a restaurant where all the tables are occupied by people who are not ordering food, they are just sitting there to stop you from eating and causing trouble for the restaurant owner.

Here you are the normal user, the restaurant owner is the Web Server and the people occupying the tables are the Hackers.

In DDOS(Distributed Denial Of  Service) attack, a web server is crowded with multiple requests to the same resource which makes the server go Down.

DDOS attacks are mostly used when a hacker or a group of hackers wish to take down a website.

 

MITM

Top 10 Hacking Techniques MITM - Man in the Middle
Top 10 Hacking Techniques MITM – Man in the Middle

Man in the Middle better known as MITM attack is a type of attack in which an intermediate device handles all requests that are made from it to a server.

In MITM attacks the hacker can :

  • Replace your Downloaded file with any other file.
  • Redirect you to other websites.
  • View all your browsing and typing history.
  • Connect to your phone if any ports are open.

MITM attacks usually take place in public places that offer Wi-Fi services like Coffee shops, Railway Stations, Restaurants, Libraries etc.




You may not want to use sensitive websites in public Wi-Fi zones as a measure of protection against MITM.

 

 

 

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *