Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

Thursday, February 2, 2012

Hacker attack techniques and tactics: Understanding hacking strategies


Introduction of hacking

Although this famous Chinese general determines nothing about hacking techniques as he had heard 2,500 years ago, "The Art of War," wrote so you have to agree with his recommendation to know that it is very good, the enemy and his techniques only. If they had a network administrator, then one of its main tasks the defense of their own systems. Knowing what attacks are possible and how to combat them is a huge help and allows them to keep their systems from damage. Although there are thousands of possible attacks, which are read in countless books and websites to the smallest detail, to give them the following five categories an excellent overview of the lion's share of attacks that may threaten their systems.

Standard Attacks

Nowadays you get any hardware or network application on the market in the rule with the following settings: User name and password that allow an administrator to access the system. One of the most common ways to get unauthorized access to a system is that the administrators do not change these default settings. Whether this is a database application, a router or a printer - the protection against these attacks is very simple. The first thing that should make everyone, if she/he is a new system connects to a network or install an application on a server, the immediate need to change the default access settings.

Phishing

Phishing is probably the technique of virtual identity theft more popular than exists on the network because of its effectiveness, but much of this honor comes on the basis of its establishment and procedure, which may be of the most easy and economical to carry out. What usually happens is that the perpetrators make a false application, message, mail or any means with the aim of bringing the user to log into your account, for example, its commercial banks to continue with whatever was interested in the message? The trick is that when the user enters their email address and your password on the wrong page of your bank, the information sent to a text file on the server hosting the fake page or by mail to which it attacks.

Stealers

Leaves many users store passwords you use every day in browsers, but beyond that anyone can enter and go to these passwords manually, as there are applications that automatically stealers steal sensitive data through commands stored very easy to perform or even GUIs accessible to any attacker. Its use with auto run pen drives can be a powerful combination.

Parallel Session Hijacking (Side jacking)

Similar in function and objectives that the hijacking, but the difference this time take advantage of victims who are connected to the same network or public wi-fi open the perpetrator. The side jacking is a normal session hijacking, but over wi-fi networks, so that the process is similar. Applications that performs sniffing, using both Chrome and Firefox that to have Fire sheep, that shows the active sessions and unprotected in a wireless network.

DNS Spoofing

It is very similar to phishing. That is, if you share with someone local network connection and this person wants to know your password, say, Facebook, you can create a site using redirection reply and that opens when you enter the actual address of Facebook. In this case, you are giving data directly to this person and probably not because you find out could then send the information, we redirect back to the beginning of simulating a bad original Facebook password input or redirected to your profile through the creation of a parallel process that takes center stage once the part of data theft.
About the author: Alia Haley is a blogger by profession. She loves writing on technology and luxury. Beside this she is fond of cell phones. These days she is busy in writing an article on Wooden headsets and 3g Tablet.

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.

7 comments:

Please keep on posting such quality articles as this is a rare thing to find these days. I am always searching online for articles that can help me. Looking forward to another great blog. Good luck to the author! all the best! http://scarprin.ws/

Hello webmaster good day. Superb post. You have gained a new fan. Please keep up the good work and I look forward to more of your great posts.
http://www.fadeplex.com

QUANTUM BINARY SIGNALS

Get professional trading signals delivered to your cell phone every day.

Start following our signals right now and profit up to 270% per day.

Do you need free Google+ Circles?
Did you know that you can get them ON AUTO-PILOT AND ABSOLUTELY FREE by using Like 4 Like?

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers