Types of Hacking Computer Terminals (Servers):
The method of taking control of terminals or completely make it is useless or crash it.
These are the common types of hacking used from ancient times of hacking.
- How to Hack : Beginner Level Part -1
- Types of Hackers: Beginner Level Part -2
- Types of Hacking: Beginner Level Part -3
- How to be Anonymous: Beginner Level Part -4
- Hacker Dictionary: Beginner Level Part – 5
- How to Hack Windows: Beginner Level Part -6
- Different phases of ethical hacking: Beginner Level Part – 7
1. Denial of Service
The most common methodology of attack is DoS attack which is also called as Denial-of-Service. This method of hacking may crash your system completely or make your computer or server entirely busy without allowing to access. There is also an important point to be noted in the DoS attack; your computer will become a participant to be DoS attacker from another server or computer if your system is attacked in this method.
2. Distributed DoS
Distributed DoSs are the coordinated DoS which have the multiple sources.A DDoS is extremely difficult to block because it will be multiple, changing and they have the multiple Pubic addresses.
Also Read – Part one of this courses series : Introduction
TCP is the packet which is the protocol always get connected between the hosts and the client. But UDP is not like that this protocol throws the information from one end to end and become inactive when there is no information passed. So, now you may understand the TCP concept. This sniffing method is the intercepting the TCP packets.This can be performed by eavesdropping or something more sinister.
Spoofing is the act of sending an illegitimate package which is as expected knowledge (ACK). Through this hacker can guess, predict, or directly obtained by snoofing. For Example, I assume you may know about SNMP protocol. It is the protocol which is available on all the networking devices from the router to the server level. They have some amount of information about the host (device). By default, the SNMP Community(password) is “public.” If you’re smart enough to change that you can be safe from this attacks. Although there are a lot of evil tool break that too.
5. SQL injection
SQL Injection is the method of injecting the codes into the username and password Colum with any codes that allow you inside any administrative console. You need to test the vulnerability of the host; the host can be an application or a website. SQL Docks are the small codes which you need to try. For example, 1=1#0’ like code is used on the site. This means when the user name is true, and password is true then the access is a pass. If the SQL dock failed, the username is true, or password is false, then the access is denied. I hope you remember the Boolean table. As long the years go, new codes come into the market. Like the competition grown, the SQL dock too developed. They are the key for vulnerability
Also Read: Types of Hacker
6. Viruses and Worms
Viruses are self-replicating programs which have the code that will be attached to themselves to programs (viruses) or machine (worms). This thing will be spread over the internet and try to upset the whole network with its evil ability. They spread over everywhere through the mail. If an organization or a school did not use the proper antivirus, they would send
7. Back Doors
Hacker always gains advantage through the exploited backdoors such as configuration error, developers human error, easily deciphered password and unsecured dial-ups. Through a script or a bot, the hackers can find the vulnerability(weakness) in the network. For example, there is an application in Kali Linux called Hydra. We need to feed a common password txt file to the application. We need to mention the vulnerability we need to hack. Standard password txt file should have the normal possible password. It will attempt to open the host with the password you have in the password file. We all are humans; there is no password called which doesn’t exist. So, always try to get want you wanted to get through your smart work.
So, not interested in this stuff.. huh??? Wait there is more for you. So, how about the one related to
hacking the passwords of email and doing some more exciting stuff.. The various methods employed
for this are:
Also Read :
8. Trojan horses
Trojan horses are the programs which are a leading cause of all the defective attack commonly happen on a computer. They are attached to another program. When the Trojans are downloaded from the internet and activated in a particular system, then it will start taking control of host system and connect you remotely to the whole system. Great!! They are also called as RAT also called as remote Administrative Tool. Even antivirus also fails before this guy, mostly affect the system when downloading things from torrent. I would also say something about torrent here. Torrent is a fantastic application which will connect to any computer remotely and starts downloading.This method is also called as peer to peer. They don’t need a relay server or a server in between them to receive and send it back to another person.
There is an interesting thing here, what if you came to know that a hacker can see anything you typed in your keyboard. The password, sensitive information and much more.This application is called as Keyloggers.
The method of hacking being tried by a lot of hackers. The internet is the place where all the system is connected. It is also known as the virtual world. All computer on internet communicates with some other system. They communicate between them through data bit, bytes such as kilo, mega, etc. But the information sent over the internet is either non-encrypted (HTTP, telnet, etc.,) or encrypted (https, ssh, etc.,). For example, if you listen to the internet packages send to the internet from your computer through any listening software like Wireshark. They will even give you the password you typed in the HTTP website, but for https case, if you listen you can get only codes something looks like machine language, it means the information is encrypted in one end and decrypted in another end. The method of trying decrypting the packets to steal data is called brute forcing. If you even tried to hack your neighbour’s Wi-Fi with kali Linux is a brute forcing. There are some good tools to do it perfectly let’s discuss it later.
11. Social Engineering
It is the oldest method of hacking. In this method, the hacker tries to convince you that he is the legitimate person and needs your password for some continuation of service. Similar to recent activities at this decade that user gives the mobile OTP number to a hacker when he calls and says he is a bank manager. This method is called as Social Engineering
The method of creating some legitimate website similar to any reputed one and get the password of the users. Many of us use the same password for all the services. So, we are the test rats in their labs.
13. Fake Messengers
Something like WhatsApp spamming and spreading everywhere, to seek users data.
14. Cookie Stealer
This is the method of hacking the user’s browser history and his password. If you’re lucky enough you can get that at your hard work. There are the lot of tools to do this technique.
15. DNS Poisoning or PHARMING
The method of changing the users DNS entry of the website or host.So the users go and hit on the server they usually use. The redirected DNS will have the same web page like that through which you can get the users password. The user may not know aware of it, and fall like a dump sheep are all together.
Whaling is sent a mail which is designed and sent to users as like a professional one. It will contain the scam that they won 1 Cr lottery, so they will be asked to type the user details including the bank details. Get screwed up by giving the same bank account number’s OTP to a hacker.
USB cleaver is the method through which you will boot a hacking software into your pendrive and inject into the target computer. The computer will automatically steal the data of the users such as system username and password hash files. The browser history and password through the cache stored by the browser.
18.Man in the middle.
If a there is a host and client such as a website and a user, they communicate with data’s. The hacker will be in the middle and listen to the packets sent and received between the user and website.
This is an art of decrypting and encrypting the data sent through the internet, where the hacker is the best role-player in doing this jobs.
The most trending business now in the market from the dark web. The ransomware is the vbs scripts send to the important system in the network through the mail. If the user opened the mail without proper knowledge, it would obviously attack the whole system. They will encrypt all the documents of the organization and demand bitcoins to open it. Minimum they demand three bitcoins, each bit coins’ Worth’s 3L for Indian money. As like in our world, we recruit people to work. In deep web (where hackers live) they hire hacks to do this jobs.
All the above tech are from long times; there are such more things are available, stay tuned for our updates in midnight.
If you feel, we missed out something or you have any doubts post it down.