Ipoh Community Forums

Full Version: What are some common aspects of hacking?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hacking involves various techniques and methods used to gain unauthorized access to systems or data. Here are some common aspects:
  1. Social Engineering: Manipulating people into divulging confidential information. Examples include phishing, pretexting, baiting, and tailgating.
  2. Malware: Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Common types include viruses, worms, trojans, ransomware, spyware, and adware.
  3. Exploits: Taking advantage of vulnerabilities or weaknesses in software, hardware, or networks. This can include exploiting zero-day vulnerabilities, buffer overflows, and SQL injection.
  4. Password Cracking: Methods to discover or guess passwords, including brute force attacks, dictionary attacks, and rainbow tables.
  5. Network Sniffing: Intercepting and analyzing network traffic to capture sensitive data, such as passwords and credit card information. Tools like Wireshark are commonly used for this purpose.
  6. Privilege Escalation: Gaining higher access levels within a system, typically by exploiting vulnerabilities, to perform unauthorized actions.
  7. Denial of Service (DoS) and Distributed Denial of Service (DDoS): Overwhelming a network, service, or website with traffic to make it unavailable to users.
  8. Rootkits: Software tools that enable persistent, undetected control over a computer system by hiding their existence and the existence of other malicious software.
  9. Backdoors: Secret methods of bypassing normal authentication or encryption in a computer system, product, or embedded device.
  10. Keyloggers: Software or hardware that records keystrokes made on a keyboard, often used to capture sensitive information like passwords and credit card numbers.
  11. Remote Access Tools (RATs): Software that allows a hacker to control a computer remotely, often used for espionage, data theft, or system manipulation.
  12. Man-in-the-Middle (MitM) Attacks: Intercepting and potentially altering communication between two parties without their knowledge.