SYSTEM HACKING
System hacking is the science of testing computers and networks for vulnerabilities and plugins,Password hacking is one of the easiest and most common ways hackers can obtain unauthorized computer or network access.Strong passwords that are difficult to crack are easy to create and maintain users often neglect this.
Hackers can easily can gather password information from your network and describes password vulnerabilities that can exist in computer networks from being exploited on your systems.
System hacking is the science of testing computers and networks for vulnerabilities and plugins,Password hacking is one of the easiest and most common ways hackers can obtain unauthorized computer or network access.Strong passwords that are difficult to crack are easy to create and maintain users often neglect this.
Hackers can easily can gather password information from your network and describes password vulnerabilities that can exist in computer networks from being exploited on your systems.
- Extracting administrator passwords
- Hiding files and extracting hidden files
- Recovering passwords
- Monitoring a system remotely
Password Cracking Techniques
- Dictionary Attack
- Brute Forcing Attack
- Hybrid Attack
- Syllabe Attack
- Rule Based Attack
Types of Password Attacks
1). Passive online Attack
Attacker Perform Password hacking without communicating with authorizing party
2). Active Online Attack
Attacker tries a list of passwords one by one against the victim to crack the passwords
3). Offline Attack
Attacker's copies the target's password file and then tries to crack the password in his own system at different location
4). NoN Electronics Attack
Attacker need not posses technical knowledge to crack password,thus know as non technical attack
Default Passwords
A default password is a password supplied by the manufacturer with new equipment that is password protected
1). Manual Password Cracking
2). Automate password Cracking Algorithm
3). Stealing Password Using USB Drive
4). Stealiung Passwords Using Keyloggers
Microsoft Authentication
RootKits
Rootkits are programs that hide their presense as well as attacker malicious activities,granting them full access to the server or host at that time and also in future.
Rootkits replace certain operating system calls and utilizes with its own modified version of those routines that in turn undermine the security causing malicious functions to be executed
A Typical rootkit of backdoor programs, DDos programs,packet sniffer,log-wiping utilities etc,...
Types Of RootKit
- HyperVisor Level RootKit
- Kernel Level Rootkit
- Application Level Rootkit
- Hardware/Firmware Rootkit
- Bootloader Level Rootkit
- Library Level Rootkits
Post a Comment
Thank you for visiting Afridi's Technoworld