.

Most Popular Hacking Methods 2015



Today i am going to share the  commonly used and most popular all hacking techniques. Everyday lope holes are found and new methods of hacking are invented. But this post covers the common techniques that almost every hacker use, and we can say that these are the backbone of hacking.

So lets talk about the hacking techniques.

  • Denial of Service 

    Denial of Services or DOS attack is used by hackers to bring the whole network down without gaining the access of the network. This attacks works by flooding the access routers with huge amount of traffic. Hence it is one of the easiest way of bring the whole network down.
  •  Sniffing

    Sniffing is an act of intercepting Transmission Control Protocol (TCP/IP) packets. Then sniffing technique may be happen through eavesdropping or something else.
  •  Spoofing

    In Spoofing technique hackers make new TCP/IP packets by using someones IP address. In order to forward packets through packets through internet routers use destination IP, but during this whole scene it leave Source IP. Only destination computer used this address in-order to respond to source computer.
  •  SQL Injection

    SQL Injection is a techniques used for exploiting SQL vulnerabilities in database layer of any application. Hackers use common SQL commands to get access of database all with all access privileges.

  •  Viruses and Worms

    Viruses and Worms are the programs coded for destructive purposes. Hackers or programmers code them for many purposes like some viruses are used for hacking PC, some are used for deleting computer files etc.
  • Brute Forcing

    This is one of the annoying and time consuming method. It require set of passwords and a tool which is used for automatically logging into account by trying those set of passwords automatically.
  • Phishing

    In this method attacker make some fake page asking for email, password, username etc in such a beautiful way that it doesn't look fake. And after this he forward that page to the one who he wants to hack his username or password. When the user enters his personal email address, username, password etc then that information is got by the hacker and then he hacks the account using that information of email and password. This is one of the best way of hacking Facebook, twitter, Gmail etc accounts.
  • Cookies Stealing

    Cookies Stealing is the technique to exploit the valid session of a valid computer. It is a method of getting illegal access to users information or account by stealing his browser cookies.
  • Cross Site Scripting(XSS)

    This is a security vulnerability which is mainly found in web applications. It allows attacker to inject client side harmful script into website pages. This techniques is also used for stealing cookies. Hence hackers can exploit this vulnerability in many different ways.
  • DNS Spoofing or Poisoning

    DNS spoofing is a method used for spoofing DNS. Attacker  get access to DNS control panel thereby redirecting the domain(website) to some other website, hence diverting whole traffic to other website.
  • Cross-Site Request Forgery(CSRF)

    CSRF occurs when malicious site, blog, email, instant messages etc cause the browser of user to perform some unwanted actions on a site in which user is currently online.  

So these are the most popular techniques used in hacking. There are also many other techniques that can't be written in a single post. So i shared only those which are popular. So don't forget to comment below, share you views with us about this post or if you have any problem or want to give me suggestion then simply comment below.

NOTE:
This post is only for educational purpose.
Previous
Next Post »

1 comments:

Write comments
felisha green
AUTHOR
24 December 2020 at 02:37 delete


Are you willing to know who your spouse really is, if your spouse is cheating just contact cybergoldenhacker he is good at hacking into cell phones,changing school grades and many more this great hacker has also worked for me and i got results of spouse whats-app messages,call logs, text messages, viber,kik, Facebook, emails. deleted text messages and many more this hacker is very fast cheap and affordable he has never disappointed me for once contact him if you have any form of hacking problem am sure he will help you THANK YOU.
contact: cybergoldenhacker at gmail dot com

Reply
avatar