URI:
   DIR Return Create A Forum - Home
       ---------------------------------------------------------
       gworld
  HTML https://gworld.createaforum.com
       ---------------------------------------------------------
       *****************************************************
   DIR Return to: HACKZ WORLD
       *****************************************************
       #Post#: 180--------------------------------------------------
       TYPES OF HACKING METHODS
       By: eba95 Date: August 2, 2010, 8:36 pm
       ---------------------------------------------------------
       There are alot of different
       attacks but I'm going to
       cover only these:
       Eavesdropping
       Snooping
       Interception
       Modification Attacks
       Repudiation Attacks
       Denial-of-service (DoS)
       Attacks
       Distributed denial-of-service
       (DDoS) Attacks
       Back door Attacks
       Spoofing Attacks
       Man-in-the-Middle Attacks
       Replay Attacks
       Password Guessing Attacks
       Eavesdropping -
       This is the process of listening in or
       overhearing parts of a conversation.
       It also includes attackers listening in
       on your network traffic. Its generally
       a passive attack, for example, a
       coworker may overhear your dinner
       plans because your speaker phone is
       set too loud. The opportunity to
       overhear a conversation is coupled
       with the carelessness of the parties
       in the conversation.
       Snooping -
       ]This is when someone looks
       through your files in the hopes of
       finding something interesting
       whether it is electronic or on paper.
       In the case of physical snooping
       people might inspect your dumpster,
       recycling bins, or even your file
       cabinets; they can look under your
       keyboard for post-It-notes, or look
       for scraps of paper tracked to your
       bulletin board. Computer snooping
       on the other hand, involves someone
       searching through your electronic
       files trying to find something
       interesting.
       Interception - This can be either an
       active or passive process. In a
       networked environment, a passive
       interception might involve someone
       who routinely monitors network
       traffic. Active interception might
       include putting a computer system
       between sender and receiver to
       capture information as it is sent.
       From the perspective of interception,
       this process is covert. The last thing a
       person on an intercept mission
       wants is to be discovered. Intercept
       missions can occur for years without
       the knowledge of the intercept
       parties.
       *****************************************************