HOW TO BE ANONYMOUS DURING HACKING

Image
If you wish to start your career in the hacking domain, then the main thing you need to consider about is anonymity. So, what you need be concerned is how to be anonymous. The basic techniques of anonymous will be discussed. Let’s discuss A. VPN VPN is known as Virtual Private Network. 1) VPN The mobile or computer will get connected to a new network; we will be accessing the internet in the name of IP address provided by VPN provider. The VPN that your getting connected should be so secure enough or reputed one. Or else you’re in a vulnerability point of action. So always be cautious on connecting to any network. Let me tell you something about IP address. If you connected to the internet, then google “what is my IP” you will get your dynamic IP address which is given by your mobile network service provider which may change by an hour, a day no longer than that. Static Public IP is costly. If you are a broadband provider then you can have a one public static IP address, E

TYPES OF HACKING ( "BEGINNER LEVEL" )

Types of Hacking Computer Terminals (Servers): The method of taking control of terminals or completely make it is useless or crash it. These are the common types of hacking used from ancient times of hacking. 1. Denial of Service Types of Hacking The most common methodology of attack is DoS attack which is also called as Denial-of-Service. This method of hacking may crash your system completely or make your computer or server entirely busy without allowing to access. There is also an important point to be noted in the DoS attack; your computer will become a participant to be DoS attacker from another server or computer if your system is attacked in this method. 2. Distributed DoS Types of Hacking Distributed DoSs are the coordinated DoS which have the multiple sources.A DDoS is extremely difficult to block because it will be multiple, changing and they have the multiple Pubic addresses. 3. Sniffing Types of Hacking TCP is the packet which is the protocol always get connected between the hosts and the client. But UDP is not like that this protocol throws the information from one end to end and become inactive when there is no information passed. So, now you may understand the TCP concept. This sniffing method is the intercepting the TCP packets.This can be performed by eavesdropping or something more sinister. 4. Spoofing Types of Hacking Spoofing is the act of sending an illegitimate package which is as expected knowledge (ACK). Through this hacker can guess, predict, or directly obtained by snoofing. For Example, I assume you may know about SNMP protocol. It is the protocol which is available on all the networking devices from the router to the server level. They have some amount of information about the host (device). By default, the SNMP Community(password) is “public.” If you’re smart enough to change that you can be safe from this attacks. Although there are a lot of evil tool break that too. 5. SQL injection Types of Hacking SQL Injection is the method of injecting the codes into the username and password Colum with any codes that allow you inside any administrative console. You need to test the vulnerability of the host; the host can be an application or a website. SQL Docks are the small codes which you need to try. For example, 1=1#0’ like code is used on the site. This means when the user name is true, and password is true then the access is a pass. If the SQL dock failed, the username is true, or password is false, then the access is denied. I hope you remember the Boolean table. As long the years go, new codes come into the market. Like the competition grown, the SQL dock too developed. They are the key for vulnerability 6. Viruses and Worms Viruses are self-replicating programs which have the code that will be attached to themselves to programs (viruses) or machine (worms). This thing will be spread over the internet and try to upset the whole network with its evil ability. They spread over everywhere through the mail. If an organization or a school did not use the proper antivirus, they would send 7. Back Doors Types of Hacking Hacker always gains advantage through the exploited backdoors such as configuration error, developers human error, easily deciphered password and unsecured dial-ups. Through a script or a bot, the hackers can find the vulnerability(weakness) in the network. For example, there is an application in Kali Linux called Hydra. We need to feed a common password txt file to the application. We need to mention the vulnerability we need to hack. Standard password txt file should have the normal possible password. It will attempt to open the host with the password you have in the password file. We all are humans; there is no password called which doesn’t exist. So, always try to get want you wanted to get through your smart work. So, not interested in this stuff.. huh??? Wait there is more for you. So, how about the one related to hacking the passwords of email and doing some more exciting stuff.. The various methods employed for this are: Also Read : 8. Trojan horses Types of Hacking board background Trojan horses are the programs which are a leading cause of all the defective attack commonly happen on a computer. They are attached to another program. When the Trojans are downloaded from the internet and activated in a particular system, then it will start taking control of host system and connect you remotely to the whole system. Great!! They are also called as RAT also called as remote Administrative Tool. Even antivirus also fails before this guy, mostly affect the system when downloading things from torrent. I would also say something about torrent here. Torrent is a fantastic application which will connect to any computer remotely and starts downloading.This method is also called as peer to peer. They don’t need a relay server or a server in between them to receive and send it back to another person. 9. Keyloggers Types of Hacking There is an interesting thing here, what if you came to know that a hacker can see anything you typed in your keyboard. The password, sensitive information and much more.This application is called as Keyloggers. 10. BruteForcing Types of Hacking The method of hacking being tried by a lot of hackers. The internet is the place where all the system is connected. It is also known as the virtual world. All computer on internet communicates with some other system. They communicate between them through data bit, bytes such as kilo, mega, etc. But the information sent over the internet is either non-encrypted (HTTP, telnet, etc.,) or encrypted (https, ssh, etc.,). For example, if you listen to the internet packages send to the internet from your computer through any listening software like Wireshark. They will even give you the password you typed in the HTTP website, but for https case, if you listen you can get only codes something looks like machine language, it means the information is encrypted in one end and decrypted in another end. The method of trying decrypting the packets to steal data is called brute forcing. If you even tried to hack your neighbour’s Wi-Fi with kali Linux is a brute forcing. There are some good tools to do it perfectly let’s discuss it later. 11. Social Engineering Types of Hacking It is the oldest method of hacking. In this method, the hacker tries to convince you that he is the legitimate person and needs your password for some continuation of service. Similar to recent activities at this decade that user gives the mobile OTP number to a hacker when he calls and says he is a bank manager. This method is called as Social Engineering 12. Phishing Types of Hacking The method of creating some legitimate website similar to any reputed one and get the password of the users. Many of us use the same password for all the services. So, we are the test rats in their labs. 13. Fake Messengers Types of Hacking Something like WhatsApp spamming and spreading everywhere, to seek users data. 14. Cookie Stealer Types of Hacking This is the method of hacking the user’s browser history and his password. If you’re lucky enough you can get that at your hard work. There are the lot of tools to do this technique. 15. DNS Poisoning or PHARMING Types of Hacking The method of changing the users DNS entry of the website or host.So the users go and hit on the server they usually use. The redirected DNS will have the same web page like that through which you can get the users password. The user may not know aware of it, and fall like a dump sheep are all together. 16. Whaling Types of Hacking Whaling is sent a mail which is designed and sent to users as like a professional one. It will contain the scam that they won 1 Cr lottery, so they will be asked to type the user details including the bank details. Get screwed up by giving the same bank account number’s OTP to a hacker. 17.USB Cleaver. Types of Hacking USB cleaver is the method through which you will boot a hacking software into your pendrive and inject into the target computer. The computer will automatically steal the data of the users such as system username and password hash files. The browser history and password through the cache stored by the browser. 18.Man in the middle. Types of Hacking If a there is a host and client such as a website and a user, they communicate with data’s. The hacker will be in the middle and listen to the packets sent and received between the user and website. 19.Crytopgarhy Types of Hacking This is an art of decrypting and encrypting the data sent through the internet, where the hacker is the best role-player in doing this jobs. 20.Ransomware Types of Hacking The most trending business now in the market from the dark web. The ransomware is the vbs scripts send to the important system in the network through the mail. If the user opened the mail without proper knowledge, it would obviously attack the whole system. They will encrypt all the documents of the organization and demand bitcoins to open it. Minimum they demand three bitcoins, each bit coins’ Worth’s 3L for Indian money. As like in our world, we recruit people to work. In deep web (where hackers live) they hire hacks to do this jobs. All the above tech are from long times; there are such more things are available, stay tuned for our updates in midnight. If you feel, we missed out something or you have any doubts post it down.

Comments

Post a Comment

Related Posts Plugin for WordPress, Blogger...

Popular posts from this blog

HOW TO BE ANONYMOUS DURING HACKING

Download Adobe Illustrator CC 2015 Full + Crack (32bit, 64bit)

WOW!!!! ETISALAT INTRODUCED "TIME BASED BROWSING" FOR DEVICES/PC