The 10 most common hacking techniques you should know



Using simple techniques, a hacker can access confidential information, information that should not be disclosed.  Knowing the existence of these common hacking techniques such as phishing or DDoS can help us stay alert to a possible attack.

Hacking or hacking is an illegal activity that seeks to obtain access to unauthorized information through the characteristics of a system and the exploitation of vulnerabilities present in it.

Currently most things happen online;  This is why hacking creates more opportunities for hackers to have unauthorized access to information not classified as credit card data, e-mail account details and other personal information.

Therefore, it is important to know some of the hacking techniques that are commonly used to obtain personal information in an unauthorized manner.

1. Keylogger
It is a simple software that records the sequence and keystrokes in a record file on a computer.  These log files can even contain your personal email IDs and passwords.
The Keylogger is one of the main reasons why online banking sites give the option to use their virtual keyboards.

2.Distributed Denial of Service (DoS / DDoS)
A denial of service attack is a hacking technique to kill a website or server by flooding that site or server with a large amount of traffic that the server, to the extent that it can not process all requests in real time and, finally, it falls. 
For DDoS attacks, hackers often deploy networks of bots or zombie computers that flood the system with request packets.

3. Waterhole attacks
If you're a big fan of discovery or channels like National Geographic, you could be easily related to Waterhole attacks.  To poison a place, in this case, the hacker hits the most accessible physical point of the victim.
For example, if the source of a river is poisoned, poisoning will reach a whole group of animals that consume water from that river.  In the same way, hackers go to places visited to attack any victim.  That point could be a cafeteria, for example.
Once the hackers study the terrain, they could create a false Wi-Fi hotspot and modify a website visited by the victims to obtain their personal information.

4. False WAP
Even just for fun, a hacker can use software to simulate a wireless access point (WAP).  This WAP connects in a public place where there is a true WAP.  Once someone has connected to the fake WAP, a hacker can access their data, just as in the previous case.

5. Eavesdropping (passive attack)
Unlike other attacks that are active by nature, using a passive attack, a hacker only monitors computer systems and networks to get a little information.
The reason behind this technique is not to damage the system, but it serves to get some information without being discovered.

6. Phishing
Phishing is a hacking technique by which a hacker replicates more sites and traps the victim by sending the false link.
Once the victim tries to log in or enter some data, the hacker gets the victim's private information to reach him through the trojan that runs in the fake site.

7. Viruses, Trojans ...
Viruses or Trojans are malicious software programs, are installed in the victim's system and send data from victims to the hacker.

8. ClickJacking attacks
The ClickJacking is also known by a different name: UI Redress.  In this attack, the hacker hides the real user interface in which the victim is supposed to click.
In short, the attacker hijacks the victim's clicks, these are not carried out on the page you want, but on a page where the hacker wants it to be.

9. Theft of cookies
The cookies of a browser store our personal data, such as browsing history, username and passwords for different sites where we have access.  Once the hacker gets access to the cookie, you can even authenticate yourself in a browser.

10. Bait and switch
In this hacking technique, the hacker has a malicious program and makes the user believe that it is authentic.  In this way, after installing the malicious program on your computer, the hacker gains unprivileged access to the victim's computer.
Copyright © The Hacking Blog Designed by ElHackingBlog