Powered by Blogger.
RSS
Custom Search
King-Shan

IP

Hacking Types….



There are many types of HACKING, I wise to say some of them and they do…..
1)Trojan Horses:
Trojan Horses is the best and easy way of get break-in to your PC. Usually hacker send a trojan by BINDING it with other genuine program , By this it will try to hide from your Anti-virus.
When the user opens the program, trojan executes first and opens BACKDOOR for the Hacker…
2) Viruses and Worms:
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
3) Back Doors:
Hackers can gain access to a network by exploiting back doors ‘administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network…
4) Rogue Access Points:
Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech..
5) Denial of Service:
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
6) Anarchists, Crackers, and Kiddies:
Who are these people, and why are they attacking I your network?
Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch.
Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
7) Sniffing and Spoofing:
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
And there are many more type which we discus later…….
King-Shan


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

1 comments:

felisha green said...

This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change

Email: cybergoldenhacker at gmail dot com

Post a Comment