Part-11
Ethical Hacking Course
Best Hack

🦑BEST My Top Favorite Example Of Hacks:(Cyber Ninja TestingOfficial)

1) Ransomware / Wannacry-like attacks –        attacks against network shares.....


2) Data Exposures – forget breaches, this         is  where we do it to ourselves.....


3) Device / Server Defacement – no                  hacking is needed if we leave the front          door open.....


4) DDoS Botnets and Booters – we are              helping them make their networks                  bigger.....


5) Phishing
Pishing is one of the most common hacking terminology used by security people. Phishing is a technique which tricks users into revealing sensitive information (like usernames, passwords or credit card details) to seemingly benign sources. A phisher disguises as a trustworthy entity and contacts potential victims asking them to reveal information. This could be further used for malicious intent.....


6) Spoofing
E-mail and IP spoofing are few common hack techniques encountered by users worldwide. E-mail spoofing involves altering the header of an e-mail to make it look legit. For instance, a black hat hacker can make an e-mail look as if it has appeared from your bank or any other source you may trust. On the other hand, IP spoofing refers to an illegitimate packet sent to a computer with an altered IP appearing to be a trusted host. This is carried out with the hope that the packet would be accepted to allow the sender access to the target machine.....


7 )  Encryption
Encryption is a process of encoding a message or information to make it unreadable and secretive. This ensures that the concerned information is concealed only to the authorized parties. Often, encryption is employed by hackers to extort money by unleashing ransomware on computer systems, thus locking out victims and encrypting their files.....


8)  Adware
Adware is typically a software which acts as a spyware to track a user’s browsing activities covertly. It then generates advertisements based on the user’s browsing history. Some adware is maliciously designed to pop up ads with a frequency ultimately slowing down your system. It can collect your personal information, browsing history and provide inputs for further phishing attack.....


9)  Zero Day threat
A zero-day threat refers to a threat which is undocumented and hence hidden from any antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners, making it oblivious to developers who built antivirus functionalities based on knowledge of these vulnerabilities. Such vulnerabilities are exploited through different vectors, popularly web browsers, and malicious attachments via e-mails.....


10) Brute Force Attack
Another commonly hacking terminology to get bypass the login pages. Brute Force, aka Exhaustive key search, is a trial and error method to decrypt data such as passwords, Data Encryption Standard (DES) keys or other encrypted information. This method is widely used to crack passwords to admin accounts, which in turn can be used to steal information and documents of paramount importance.....


11)  HTTPS/SSL/TLS
 HTTPS, which stands for Hypertext Transfer Protocol with the “S” for “Secure”, is a basic framework that controls how data is transferred across the web.  This protocol adds a layer of encryption to provide you with secure daily browsing—your bank, your email provider, and social network. SSL and TLS are protocols used by HTTPS to provide an added identity proof to your website. It is advised to avoid browsing the website using HTTP and enter any passwords or credit card detail on it.....


12) Bot
A bot is a software robot that runs automated tasks (scripts) over the Internet. Many search engines like Google and Bing employ bots, also called spiders, to scan websites and index them for purpose of ranking them according to returns on search queries.....


13) Rootkit
Rootkits are one of the scariest methods to perform a cyber intrusion mostly because it goes undetected.....


Written by Cyber Ninja.....


All The Best

By Cyber Ninja
꧁UNDER SCOPE꧂
       -----------------------
Previous
Next Post »