1.)Rainbow Table Attack
- A rainbow table attack is a type of hacking wherein the perpetrator tries to use rainbow hash table to crack password stored in a database system.A rainbow table is a list of pre-computed hashes-the numerical value of an encrypted password , used by most systems today-and that's the hashes of all possible password combinations for any given hashing algorithm mind.Sensitive data are hashed twice (or more times) with the same or with different keys in order to avoid rainbow table attacks.
- A dictionary attack is a technique or method used to breach the computer security of a password-protected machine or server.A dictionary attack attempts to defeat an authentication mechanism by systematically entering each word is a dictionary as a password or trying to determine the decryption key of an encrypted message or document.Dictionary attacks are often successful because many users and business use ordinary words as passwords.
3.)Brute Force Attack
- A brute force attack is a trial-and-error method to obtain information such as a user password or personal identification number (PIN).In a brute force attack , automated software is used to generate a large number of consecutive guesses as to the value of the desired data.Brute force attacks may be used by criminals to crack encrypted data , or by security analyst to test an organization's network security.
4.)Phishing
- Phishing is the fraudulent act of acquiring private and sensitive information , such as credit card number , personal identification and account usernames and passwords.Using a complex set of social engineering techniques and computer programming expertise , phishing website lure email recipients and web users into believing that a spoofed website is legitimate and genuine.In actuality , the phishing victim later discovers his personal identity and other vital information been stolen and exposed.
5.)Social Engineering
- Social engineering is the non-technical cracking of information security(IS).It applies deception for the sole purpose of gathering information , fraud or system access.A number of tactics may be used , including
- Taking advantage of human kindness
- Searching for sensitive data outside of a computer , like looking inside a dumpster.
- Obtaining computer passwords via covert methods
6.)Guessing
- This seems silly but this can easily help you to get someones password within second.If hacker knows you , he can use information he knows about you to guess your password.Hacker can also use combinations of Social Engineering and Guessing to acquire your password.
7.)Shoulder Surfing
- Shoulder surfing refers to the act of obtaining personal or private information through direct observation.Shoulder surfing involvers looking over a person shoulder to gather pertinent information while the victim is oblivious.This is especially effective in crowded place where a person uses a computer , smartphone , or ATM.If shoulder surfing occurs when there are few people , the act becomes suspicious very quickly.Binoculars , video cameras and vision-enhancing devices also are used , depending on location and situation.
8.)Malware
- A keylogger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process , and then forwards a copy of this file to hacker central.Some malware will look for the existence of a web browser client password file and copy this which , unless properly and encrypted will contain easily accessible saved passwords from the user's browsing history.
0 comments:
Post a Comment