Types of Hacking: Beginner Level Part -3

Published by Sundareswaran on

Types of Hacking Computer Terminals (Servers):

The method of taking control of terminals or completely make it is useless or crash it.
These are the common types of hacking used from ancient times of hacking.

1. Denial of Service

Types of Hacking
The most common methodology of attack is DoS attack which is also called as Denial-of-Service. This method of hacking may crash your system completely or make your computer or server entirely busy without allowing to access. There is also an important point to be noted in the DoS attack; your computer will become a participant to be DoS attacker from another server or computer if your system is attacked in this method.

2. Distributed DoS

Types of Hacking
Distributed DoSs are the coordinated DoS which have the multiple sources.A DDoS is extremely difficult to block because it will be multiple, changing and they have the multiple Pubic addresses.

Also Read – Part one of this courses series : Introduction

3. Sniffing

Types of Hacking
TCP is the packet which is the protocol always get connected between the hosts and the client. But UDP is not like that this protocol throws the information from one end to end and become inactive when there is no information passed. So, now you may understand the TCP concept. This sniffing method is the intercepting the TCP packets.This can be performed by eavesdropping or something more sinister.

4. Spoofing

Types of Hacking
Spoofing is the act of sending an illegitimate package which is as expected knowledge (ACK). Through this hacker can guess, predict, or directly obtained by snoofing. For Example, I assume you may know about SNMP protocol. It is the protocol which is available on all the networking devices from the router to the server level. They have some amount of information about the host (device). By default, the SNMP Community(password) is “public.” If you’re smart enough to change that you can be safe from this attacks. Although there are a lot of evil tool break that too.

5. SQL injection

Types of Hacking
SQL Injection is the method of injecting the codes into the username and password Colum with any codes that allow you inside any administrative console. You need to test the vulnerability of the host; the host can be an application or a website. SQL Docks are the small codes which you need to try. For example, 1=1#0’ like code is used on the site. This means when the user name is true, and password is true then the access is a pass. If the SQL dock failed, the username is true, or password is false, then the access is denied. I hope you remember the Boolean table. As long the years go, new codes come into the market. Like the competition grown, the SQL dock too developed. They are the key for vulnerability

Also Read: Types of Hacker

6. Viruses and Worms

Viruses are self-replicating programs which have the code that will be attached to themselves to programs (viruses) or machine (worms). This thing will be spread over the internet and try to upset the whole network with its evil ability. They spread over everywhere through the mail. If an organization or a school did not use the proper antivirus, they would send

7. Back Doors

Types of Hacking
Hacker always gains advantage through the exploited backdoors such as configuration error, developers human error, easily deciphered password and unsecured dial-ups. Through a script or a bot, the hackers can find the vulnerability(weakness) in the network. For example, there is an application in Kali Linux called Hydra. We need to feed a common password txt file to the application. We need to mention the vulnerability we need to hack. Standard password txt file should have the normal possible password. It will attempt to open the host with the password you have in the password file. We all are humans; there is no password called which doesn’t exist. So, always try to get want you wanted to get through your smart work.
So, not interested in this stuff.. huh??? Wait there is more for you. So, how about the one related to
hacking the passwords of email and doing some more exciting stuff.. The various methods employed
for this are:

Also Read :

8. Trojan horses

Types of Hacking

board background

Trojan horses are the programs which are a leading cause of all the defective attack commonly happen on a computer. They are attached to another program. When the Trojans are downloaded from the internet and activated in a particular system, then it will start taking control of host system and connect you remotely to the whole system. Great!! They are also called as RAT also called as remote Administrative Tool. Even antivirus also fails before this guy, mostly affect the system when downloading things from torrent. I would also say something about torrent here. Torrent is a fantastic application which will connect to any computer remotely and starts downloading.This method is also called as peer to peer. They don’t need a relay server or a server in between them to receive and send it back to another person.

9. Keyloggers

Types of Hacking
There is an interesting thing here, what if you came to know that a hacker can see anything you typed in your keyboard. The password, sensitive information and much more.This application is called as Keyloggers.

10. BruteForcing

Types of Hacking
The method of hacking being tried by a lot of hackers. The internet is the place where all the system is connected. It is also known as the virtual world. All computer on internet communicates with some other system. They communicate between them through data bit, bytes such as kilo, mega, etc. But the information sent over the internet is either non-encrypted (HTTP, telnet, etc.,) or encrypted (https, ssh, etc.,). For example, if you listen to the internet packages send to the internet from your computer through any listening software like Wireshark. They will even give you the password you typed in the HTTP website, but for https case, if you listen you can get only codes something looks like machine language, it means the information is encrypted in one end and decrypted in another end. The method of trying decrypting the packets to steal data is called brute forcing. If you even tried to hack your neighbour’s Wi-Fi with kali Linux is a brute forcing. There are some good tools to do it perfectly let’s discuss it later.

11. Social Engineering

Types of Hacking
It is the oldest method of hacking. In this method, the hacker tries to convince you that he is the legitimate person and needs your password for some continuation of service. Similar to recent activities at this decade that user gives the mobile OTP number to a hacker when he calls and says he is a bank manager. This method is called as Social Engineering

12. Phishing

Types of Hacking
The method of creating some legitimate website similar to any reputed one and get the password of the users. Many of us use the same password for all the services. So, we are the test rats in their labs.

13. Fake Messengers

Types of Hacking
Something like WhatsApp spamming and spreading everywhere, to seek users data.

14. Cookie Stealer

Types of Hacking
This is the method of hacking the user’s browser history and his password. If you’re lucky enough you can get that at your hard work. There are the lot of tools to do this technique.

15. DNS Poisoning or PHARMING

Types of Hacking
The method of changing the users DNS entry of the website or host.So the users go and hit on the server they usually use. The redirected DNS will have the same web page like that through which you can get the users password. The user may not know aware of it, and fall like a dump sheep are all together.


16. Whaling

Types of Hacking
Whaling is sent a mail which is designed and sent to users as like a professional one. It will contain the scam that they won 1 Cr lottery, so they will be asked to type the user details including the bank details. Get screwed up by giving the same bank account number’s OTP to a hacker.


17.USB Cleaver.

Types of Hacking
USB cleaver is the method through which you will boot a hacking software into your pendrive and inject into the target computer. The computer will automatically steal the data of the users such as system username and password hash files. The browser history and password through the cache stored by the browser.

18.Man in the middle.

Types of Hacking
If a there is a host and client such as a website and a user, they communicate with data’s. The hacker will be in the middle and listen to the packets sent and received between the user and website.


Types of Hacking
This is an art of decrypting and encrypting the data sent through the internet, where the hacker is the best role-player in doing this jobs.


Types of Hacking
The most trending business now in the market from the dark web. The ransomware is the vbs scripts send to the important system in the network through the mail. If the user opened the mail without proper knowledge, it would obviously attack the whole system. They will encrypt all the documents of the organization and demand bitcoins to open it. Minimum they demand three bitcoins, each bit coins’ Worth’s 3L for Indian money. As like in our world, we recruit people to work. In deep web (where hackers live) they hire hacks to do this jobs.

Also Read – 7 Most Disturbing Content on Deep Web You Should Know About

All the above tech are from long times; there are such more things are available, stay tuned for our updates in midnight.

If you feel, we missed out something or you have any doubts post it down.

Categories: Hacking Courses


interpretacion simultanea · September 4, 2018 at 9:36 pm

I read this piece of writing fully regarding the difference
of latest and previous technologies, it’s awesome article.

make own wristbands · September 18, 2018 at 12:47 pm

I got what you intend, thank you for putting up.

Woh I am happy to find this website through google. https://www.silicon-wristband.com

Silicone bracelets · September 18, 2018 at 1:55 pm

Deference to author, some fantastic information. https://www.createyourownsiliconewristband.com

https://pokerku18dewa.blogspot.com · September 26, 2018 at 6:16 pm

Thanks for sharing your thoughts on Poker Online.

retinal camera · September 27, 2018 at 5:17 pm

Good post. I learn something new and challenging on websites
I stumbleupon on a daily basis. It’s always helpful to read content
from other authors and use a little something from their sites.

xx · September 28, 2018 at 8:40 am

You can certainly see your skills within the article you write.
The arena hopes for more passionate writers such as you who aren’t afraid to say
how they believe. Always go after your heart.

mobile chiropractic · October 16, 2018 at 8:22 am

Amazing things here. I’m very satisfied to see your post.
Thanks so much and I am taking a look forward to touch
you. Will you please drop me a e-mail?

Rosie · October 19, 2018 at 1:30 am

Thank you, I’ve recently been looking for information approximately this subject for a long
time and yours is the greatest I have came upon till now.
However, what concerning the conclusion? Are you positive concerning
the source?

gp bh · December 22, 2018 at 4:16 am

Appreciating the persistence you put into your site and in depth information you present.
It’s great to come across a blog every once in a while that isn’t the
same out of date rehashed information. Fantastic read! I’ve saved your site and I’m including your RSS feeds to my Google account.

Anonymous · December 27, 2018 at 7:48 am

It’s a pity you don’t have a donate button! I’d definitely donate to this excellent blog!
I suppose for now i’ll settle for bookmarking and adding your RSS feed to my Google account.
I look forward to fresh updates and will talk about this website with my Facebook group.
Talk soon!

forex forum · January 15, 2019 at 11:47 pm

If you want to improve your knowledge just keep visiting this site and be
updated with the hottest gossip posted here.

hotel casegoods and furniture brochure · January 16, 2019 at 9:17 am

Custom made hotel furniture and casegoods including headboard, nightstand, desk and table, chair and lounge chair etc

For more info please visit us at http://www.ffesupplier.com

Unblocked · January 19, 2019 at 5:38 pm

I loved as much as you’ll receive carried out right here.
The sketch is attractive, your authored material stylish.
nonetheless, you command get got an edginess over that you wish be delivering the following.
unwell unquestionably come further formerly again since exactly the same nearly
very often inside case you shield this increase.

truyện sex · January 30, 2019 at 9:22 am

Hey jᥙst wanted to give you a quick heads սp. The text in your
article ѕeem to be running off the screen in Internet explorer.
І’m not surе if this іѕ a formatting issue or sⲟmething to do with web browser compatibility ƅut I thоught I’d post
tօ let you know. Tһe layout ⅼooқ ɡreat though! Hope
you get the issue resolved soon. Thanks

above · February 8, 2019 at 10:29 am

Thanks designed for sharing such a good idea, piece of writing is pleasant, thats why i
have read it fully

CPR American Heart Association · February 21, 2019 at 5:14 pm

Hey very cool website!! Man .. Beautiful .. Amazing ..
I’ll bookmark your web site and take the feeds additionally?

I’m happy to search out a lot of useful info right here within the submit, we need work
out more strategies in this regard, thanks for sharing.
. . . . .

エルメス 財布 クロコ ダイヤ · March 21, 2019 at 4:28 pm

I am not real excellent with English but I
line up this real leisurely to read. http://armindacarbonell.com/lva.php

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.