- Types of Hacking
- Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for knowing the weakness of the computer. they will check which computer is open to access and they will access in to the personal information
- Password cracking
- Password cracking is the process of recovering passwords from data that are saved or used in a computer the common method used is guessing your password. This will be commonly done by people who knows you may be friends or relatives
- Packet sniffer
- A packet sniffer is an application that records the data that will send to the internet
- Spoofing attack (Phishing)
- Spoofing means taking a copy of a genuine page or a website and making fool of actual user. Mainly used to hack/take the personal information that you will use to login or sign up
- Rootkit
- A rootkit is malicious software that is able to hide the existence of some process in the system. this will help a hacker to act silently in a remote computer and access the personal data
. the hidden program may be capable of handling the operating system
- Trojan horses
- A Trojan horse is a program which act as doing nothing but is working.
a hacker can get data any time from the affected computer
- Computer virus
- A virus is a self-replicating program that affects by inputting copies of itself into other executable code or documents.And destroys the necessary files inside the computer
- Computer worm
- Like a virus, a worm is also a self-replicating program.it will spread its own copies and tries to make the system slower and due to the self replicating program it will reduce the disk space
- Key loggers
- A keylogger is a tool used to monitor the keystrokes or key presses on the key board. The software will save the keystrokes and mail it to the hacker who created the keylogger.
Newly created keyloggers are capable of taking screenshots. it will take screenshots in a specific interval of time. and mail it . Keyloggers are capable of completely monitoring the activities that are done on the system and informs the hacker.
No comments:
Post a Comment