For the last twenty posts , i never talk about applications of hacking concepts, just i am sharing the concepts like how the hackers attacking , What are the strategies used by them , What is the basic idea behind them. like phishing , keyloggers, rat softwares etc...
Now i am going to explain how these concepts used practically implemented on a desired target(victim).Consider a contract has been received by hacker . now lets see how he proceed to hack victims account.
in my case iam going to find the info by search like this ."xyz@abc.com" , including double quotes.
In previous articles, i have shared every thing about it check the following two links.
Now i am going to explain how these concepts used practically implemented on a desired target(victim).Consider a contract has been received by hacker . now lets see how he proceed to hack victims account.
step 1
He(hacker) is going to collect information about the victim with the help of email or password .this step also called as foot printing. To collect the information , he is using several search engines, social networking sites.
for example , victims mail is xyz@abc.com. than by using some advanced search operators like inurl, intext,inline etc. there is lot of operators like that
in my case iam going to find the info by search like this ."xyz@abc.com" , including double quotes.
than it will give info mostly . still ,if there is no information than he will move to facebook , where he may found profile information , which gives full details of user (victim) like his DOB, any other conct info, what he like mostly , what are his preferences etc..
still no info there several search engines to gather info using email/ username/mobile number etc
i suggest you pipl.com. here he can find a lot of info.
step 2:
After collecting the information , his next step is to attack the victim. he choose an attack type based on the situation. At first he goes for an awesome attack, which usually followed by all hackers is that password guessing.
types of attack :
Password guessing :
this is the first attack, every hacker used follow and this one as his first preference. With the help of gathered information about victim he is trying to guess the password. Its an art only few hackers can succeed in it.
this type of attack is called social engineering.
soon i will be come up with full details .. with a post.stay tune
key loggers approach :
This attack much easier, if hacker have access of the victim pc/lap . just he install the keyloggers on the pc .
In previous articles, i have shared every thing about it check the following two links.
RAT softwares.
Its a software attack , which is similar to keyloggers but it is used if the hacker doesn't have any direct access of victims PC. This attack is also called as trojan horse attck.
In previous articles ,i have shared every thing about it check the following link.
Phishing :
its a simple methodology .but very dangerous attack. actually phishing is cyber crime crime.
In previous articles, i have shared every thing about it check the following links
introdution
http://wejusthack.blogspot.in/2012/02/wellif-your-new-to-hacking-world-this.html
attack style :
http://wejusthack.blogspot.in/2012/02/how-to-prepare-tools-for-phishing.html
how to save from this attack :
http://wejusthack.blogspot.in/2012/02/how-to-detect-fake-page.html
there is advanced attack, we can say it as modified phishing attack. for details click the following link.
http://wejusthack.blogspot.in/2013/01/tabnabbing-latest-version-of-phishing.html
virus attack :
in this attack , hacker wrote a virus program , he sent the program to the victim pc/lap. after taht it will automatically executed and catches the sensitive information of victim. all these collected info will send to the hackers adda.
there are few more attacks .but these are very frequently used attacks.
In previous articles, i have shared every thing about it check the following links
introdution
http://wejusthack.blogspot.in/2012/02/wellif-your-new-to-hacking-world-this.html
attack style :
http://wejusthack.blogspot.in/2012/02/how-to-prepare-tools-for-phishing.html
how to save from this attack :
http://wejusthack.blogspot.in/2012/02/how-to-detect-fake-page.html
there is advanced attack, we can say it as modified phishing attack. for details click the following link.
http://wejusthack.blogspot.in/2013/01/tabnabbing-latest-version-of-phishing.html
virus attack :
in this attack , hacker wrote a virus program , he sent the program to the victim pc/lap. after taht it will automatically executed and catches the sensitive information of victim. all these collected info will send to the hackers adda.
there are few more attacks .but these are very frequently used attacks.
note:(warning)
The articles in this blog are completely for education purpose only, In any manner this author /blog do not intent to encourage to do hacking over the network,In case any sense the issues caused by you, the author responsible for your work ,its your own risk please have a kind sense and be ETHICAL