Tactics and methods used by Internet hackers may not know them!

in #hackers6 years ago

With the increasing use of the Internet in all walks of life, it remains a valuable opportunity for anyone who wants to obtain personal data and information and threaten our safety on the Internet. Piracy Despite the great efforts of security companies and organizations to combat it, it remains and will remain the biggest concern for all in the world of the Internet.

hackers generally have many tactics and methods to get data and information, so we need to know some hacking techniques that are commonly used to get your personal information in an unauthorized way, which is what we'll read in the following lines

Denial of service attacks DoS \ DDoS

One of the most famous and most popular tactics used by hackers to capture information and data is usually directed to specific sites or multiple sites for the purpose of blocking the service and making them unavailable to the visiting user. This means that when a "DoS attack" occurs, traffic is consumed, The site is about work and appearance for ordinary visitors.

Such attacks and methods are a global language for a number of hackers directing their efforts using a huge number of computers hacking around the world to a single target. One of the most common attacks of this kind was the same as the previous year for Dyn DNS, resulting in half of the Internet paralyzed and these attacks A group called New World Hackers claimed responsibility for the attack. It was the same group that attacked the BBC News site and briefly stopped the site.

Keylogger method

It is common for hackers to know what you are pressing on your keyboard, whether your PC, laptop, or even your mobile smartphone. In fact, it is an extension of your online behavior. The hacker relies primarily on planting this program or virus on user behavior by installing programs Or use the operation of known modes of transmission without scanning them in a control program, or clicking links without verifying their real address.

Once in the victim's machine, you record all our finger strokes on the keyboard, allowing hackers to know all your passwords for different accounts and email. The danger of this tactic is that it does not destroy the hardware or destroy files or anything that would catch your attention. Working in silence and quiet so that the victim does not feel anything abnormal or familiar.

It also highlights the mode of placing a tool in the input devices such as the keyboard is between the computer interface and CPU, which enables the recording of characters that are pressed on the keyboard, and this method is always found in public Internet cafes.

Waterhole style

Is a fairly complex and new method, but if successful, it can cause severe damage that can not be quickly recovered. It is a common attack on computers by gathering information about the victim, whether it is a site, individual, organization, or government entity targeted , And then the most visited sites are blocked by injecting the site with a JavaScript or HTML program that converts the visitor to a malicious site that was previously set up. The attacker then installs the malicious software on the victim's machine (Trojans, Turgan, etc.) The attacker can control and control the system completely, and usually find This type of method is very difficult and comes in later stages.

Tactic Tapping or Passive Attacks

Unlike other attacks that are active in nature, using an attack that would affect the user and steal his data, the hacker monitors in this method computer systems and networks to obtain confidential information.

The motive behind eavesdropping is not to harm the system or the site, but to get some sensitive information or knowledge of certain information, these types of intrusions can target e-mail, instant messaging services, phone calls, Internet browsing, and other communication methods Tactics are often government agencies that listen to their opponents or hackers driven by a certain political, economic or moral orientation to achieve a goal.

Tactic viruses, trojans, worms ... etc

Viruses, Trojans, Worms, etc. are popular methods for hackers and hackers to get information, which is malicious software installed on a victim's device in one of the common ways, through which data and information are sent from the victim's device to the hacker.

These methods can also encrypt your files, display fraudulent ads, or transfer or publish traffic from your site on all computers connected to your network.

The method of stealing cookies

Browser cookies preserve our personal data such as your browsing history, user name, and passwords for various sites we visit regularly. Hackers can access, control, and change their log files to serve a specific purpose.

Another method is followed by pirates with cookies, known as the SideJacking hack session, where this method remains victim in line with the attacker on the same site, the victim's contact is not separated from the site, and after the user logs in, both the attacker and the user share access to the site Without the user knowing that someone else is on the same account, once the user session is done, the attacker can access the site using the victim's session and do what he wants without having to have a password or user name.

Tactic and switch Bait and switch

This tactic can be considered as a form of commercial fraud, but hackers have taken a method of stealing data. The hacker buys ad space on multiple sites or sites. Later, when a user clicks on the ad, he is directed to a malicious page.

In this way, the hacker has a valuable opportunity to install malicious software in the victim's devices. The risk is that the ads and download links displayed using this method are always very attractive and eye-catching, so the number who click on this ad will be large over time Or delete it after the end of its purpose.

Phishing method

Of the oldest tactics and methods that hackers and hackers still resort to, despite the articles, studies and books that speak about this technology, but it is still steadfast and continuing to be one of the most successful methods and most efficient in the theft of data and information.

The solution is always and always is not to click on the random links in social networking sites or applications, or emails, and update the antivirus and operating systems periodically and regularly and install security additions in different browsers to prevent the disaster before it occurs.

The tactic of creating imaginary contact points

From the easiest methods and tactics, hackers can use the software and applications deployed to create a fake wireless access point, once you get a virtual network connection, hackers can access your data.

It is one of the easiest methods, you can create a fake network and call it a tempting name such as "Free Wifi" and waiting impatiently to enter it and begins to steal your data and information easily, the best solution is to encrypt communications using reliable VPN programs

Sort:  

Great job with this post. Very useful information. UPVOTED!

Thankque with this post. Very useful information. UPVOTED!

There are many tactics, the problems begin when a hacker get swooped by the filters, and there are much more of those, than hacking methods.

Coin Marketplace

STEEM 0.29
TRX 0.12
JST 0.033
BTC 62963.68
ETH 3115.67
USDT 1.00
SBD 3.89