PDA

View Full Version : Hacking Techniques



carlo
02-12-2006, 04:02 PM
Hacking Techniques by carlo

Brute Forcing
Description:
A brute forcer tries multiple passwords for a given username. e.g you want to access a pornsite but i costs big $$$$. All you would have to do is get a brute forcer (Cough! Cough! Access Diver (http://www.accessdiver.com/php/getad.php) Cough! Cough!) All you would have to do have to do is get the members section address e.g "www.pornsite.com/members/" and type that into the green bar in access diver's case or in any over http bruteforcer you have in the address bar it tell you to type the url in. Then of course if you have any sence you will select the proxy option and type a proxy address in (Google 4 *!) then click standard to hack an account for the porn site. Once its found a match for a username it will list it.

Keystroke logger (Keylogger)
Description:
Once executed on a remote computer loggs all activity including passwords and send them to the hacker. e.g A hacker is short of $$$ and needs some fast. He will convince the owner of a paypal account to open a malicious
exe of which is the keylogger and wait for the account holder to type in his/hers username and password and it is mailed to the hacker via email or ftp.

Trojan Horse
Description:
Consists of a sever and a client. The sever is sent to the victim and the hacker uses the client to connect to the sever. The hacker from the client can take total control over the victims computer through the client.

I will post more in a few days

carlo

carlo
02-17-2006, 02:30 PM
Cross site scripting
I believe mike*0* has written a brilliant overview of cross site scripting.
You can view this here (http://www.all-nettools.com/forum/showthread.php?t=2**6)

D.o.s (denial of service) attacks
(From webopedia)
Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.

A dos attacker can be found here (http://home.conceptsfa.nl/~juky_d/dos/assault.zip) ( i take no responsibility for anything that you do with this tool)

Part * coming soon.