DIR Return Create A Forum - Home
---------------------------------------------------------
gworld
HTML https://gworld.createaforum.com
---------------------------------------------------------
*****************************************************
DIR Return to: HACKZ WORLD
*****************************************************
#Post#: 180--------------------------------------------------
TYPES OF HACKING METHODS
By: eba95 Date: August 2, 2010, 8:36 pm
---------------------------------------------------------
There are alot of different
attacks but I'm going to
cover only these:
Eavesdropping
Snooping
Interception
Modification Attacks
Repudiation Attacks
Denial-of-service (DoS)
Attacks
Distributed denial-of-service
(DDoS) Attacks
Back door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password Guessing Attacks
Eavesdropping -
This is the process of listening in or
overhearing parts of a conversation.
It also includes attackers listening in
on your network traffic. Its generally
a passive attack, for example, a
coworker may overhear your dinner
plans because your speaker phone is
set too loud. The opportunity to
overhear a conversation is coupled
with the carelessness of the parties
in the conversation.
Snooping -
]This is when someone looks
through your files in the hopes of
finding something interesting
whether it is electronic or on paper.
In the case of physical snooping
people might inspect your dumpster,
recycling bins, or even your file
cabinets; they can look under your
keyboard for post-It-notes, or look
for scraps of paper tracked to your
bulletin board. Computer snooping
on the other hand, involves someone
searching through your electronic
files trying to find something
interesting.
Interception - This can be either an
active or passive process. In a
networked environment, a passive
interception might involve someone
who routinely monitors network
traffic. Active interception might
include putting a computer system
between sender and receiver to
capture information as it is sent.
From the perspective of interception,
this process is covert. The last thing a
person on an intercept mission
wants is to be discovered. Intercept
missions can occur for years without
the knowledge of the intercept
parties.
*****************************************************