Question:

What are the common techniques do hackers practice whether white/black/grey hat hackers?

by  |  earlier

0 LIKES UnLike

Please name me some common approaches hackers do in doing their job. Just a general information. SImply, like:

- How do they break into a computer? Personal or corporate.

- What do they do to retrieve their desired info? e.g. phishing (what's that?)

I just want to be aware. :)

 Tags:

   Report

4 ANSWERS


  1. Black hat hackers break into the Government's/Banks computers for personal (often financial) gain. White hat hackers find security holes, and inform the owners of how to improve their security in future. Both groups should be called crackers though, hackers are just geeks who change electrical items to do stuff they weren't originally designed to do.


  2. Tracing IP address  

    For a hacking other computer, Break the firewall security first.

    You hit the operating system weak point, to try access the data

    For more help search “alt2600” committee website

  3. believe it or not a lot of what black hat hackers do is away from a PC. Most of the hacking is done via information gathering, 1 of the best hackers reportedly said most of what he did was spent on the phone. They pick a target and then find out as much about them as possible. Phoning up and getting an answer machine may give a clue as to who may be in charge of the website/etc. Then completely legal searches such as a whois search can tell who the website belongs to, sending an email message to fhdesiafog@company.com can give details on how their system deals with mail to a fake address. You can find out what operating system they're running which in turn tells you what exploits they could be vulnerable to. If you're that interested theres a website about it at www.mile2.com i think it is, if you google mile2, they actually run a certified course in "ethical hacking" basically teaches you the steps hackers use so you know what to look for and how to prevent it, also gives you information to test your own network.

  4. SQL Injection Hack

    Cross Site Scripting (XSS)

    Authorization Bypass

    Google Hacking

    Password Cracking

Question Stats

Latest activity: earlier.
This question has 4 answers.

BECOME A GUIDE

Share your knowledge and help people by answering questions.
Unanswered Questions