Subscribe For Free Updates!

We'll not spam mate! We promise.

Sunday, 22 May 2011

Hacking Tricks, Must Know to be Safe -2011

                                                    Hacking Tricks, Must Know to be Safe.

HACKING EXPOSED WEB APPLICATIONS, 3rd EditionHacking tricks that every computer know and be aware of !!! A must for every one at the present computerized. The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. 

The second definition refers to breaking into computer systems or someones personal accounts without the persons knowledge. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.  It is popularised by movies and college going students who play pranks on their friends.  I also mean to put a light on the second definition of Hacking.  My main focus on this article will be hacking mail accounts.
Basically there are two ways of hacking ones accounts.  Using a keylogger or by creating a pishing site.
1. Keylogger
Keylogger is just a software that stores the keys that is being typed in a file.  The file is then later accessed by the hacker.  By this way one can know the computers user account information like, password to emails, passowrd to systemadministrator of the computer.  He can know everything that is being typed. 
There also exist of somthing called Remote access software keylogger.
These are local software keyloggers programmed with an added feature to transmit recorded data from the target computer to a monitor at a remote location. Remote communication is facilitated by one of four methods:
  • Data is uploaded to a website, database or an FTP account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • The software enables a remote login to the local machine via the internet or ethernet, for data logs stored on the target machine to be accessed.
There also comes a software that stores the screen view of the user as pictures.  So now wht ever was visible to the us user is also available to the the hacker. This is called Screen logging. Screenshots are taken in order to capture graphics-based information. Applications with screen logging abilities may take screenshots of the whole screen, just one application or even just around the mouse cursor. They may take these screenshots periodically or in response to user behaviours (for example, when a user has clicked the mouse). A practical application used by somekeyloggers with this screen logging ability is to take small screenshots around where a mouse has just clicked; these defeat web-based keyboards (for example, the web-based screen keyboards that are often used by banks) and any web-based on-screen keyboard without screenshot protection.
There are several other advanced hacking method.  I will not discuss them but I am just mentioning them below
  • Wireless keyboard sniffers
  • Keyboard overlays
  • Acoustic keyloggers
  • Electromagnetic emissions
             How to remove Keylogger
Most keyloggers work in the same manner as the computer viruses and therefore can be found and removed with the help of effective Antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus
2. Pishing
In the field of computer security, phishing is the criminallyfraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
(source: wekipedia)

(pishing page of gmail will look like this)
The hacker creates a fake web page resemlimg exactly like the real mail loging page as show above. The user enters his account information to login into the fake account.  The fake account is designed in such a manner that it will direct the users account (user name and password) to some file and save it.  The hacker then retrives the file, thus making him able to gain access to the private domain of the user. 
To deploy a pishing page, the hacker will try to find sites which let them store files for free.  Such sites are called webhosting or file hosting sites.  All one has to do to find a free webhosting site is to google it.
The best way to remain safe is to watch for URL.
Say you are logging in to your yahoo account then the URL should be of yahoo domain.  That is "yahoo" will appear at the begining not after "/" at the URL address.   For a little detailed understand read " What is URL???"  This is important for your safety.
What is URL???
(by http://www.webopedia.com)
Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web.
The first part of the address is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name are separated by a colon and two forward slashes.
For example, the two URLs below point to two different files at the domain pcwebopedia.com. The first specifies an executable file that should be fetched using the FTP protocol; the second specifies a Web page that should be fetched using the HTTP protocol:
  • ftp://www.pcwebopedia.com/stuff.exe
  • http://www.pcwebopedia.com/index.html
.
Now for an ending note let me share a fact about pishing
The word phishing comes from the analogy that Internet scammers are using e-mail lures to fish for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replacing "f" with "ph" the termphishing was derived.
Thats all i have got to say for now.  Hope you liked my article.  And more importantly wish it will be of some use to you. 
Thank You !!!
cynidepercolate  :-)

 

Please Give Us Your 1 Minute In Sharing This Post!
SOCIALIZE IT →
FOLLOW US →
SHARE IT →
Powered By: BloggerYard.Com

0 comments:

Post a Comment