Network security, Hotspot security, Linux, Social Network Security, Website Security.

How Hackers Steal Password



There are many ways to get a password. Some of them do not require special skills. Here are the ways of the most common and most frequently used :

[1]. Social Engineering
[2]. Keylogger
[3]. web Spoofing
[4]. Facing Email
[5]. password Cracking
[6]. session hijacking
[7]. Being a Proxy Server
[8]. Utilizing User Negligence In Use Browser Features
[9]. Google

1. Social Engineering

a technique of ‘theft’ or retrieval of data or information important / crucial / confidential from the person by using a humane approach through mechanisms of social interaction. Or in other words, social engineering is a technique to obtain data / information confidential by exploiting human weakness.

2. Keylogger.

Keylogger is software that can record user activities. The results of the tape used to be stored in the form of text or images. Keylogger works by pounding the keyboard user. This application is able to recognize these forms as sensitive as the password form.

3. Phising.

this technique is to take advantage of user error when typing a website address into the address bar.Phishing is an attempt to deceive the victim into thinking he is accessing a particular site, but it’s not.

4. Facing Email.

Facing an email? Yes, and very easy to do this. One way is to use mailsnarf contained in dsniff utilities. How it works is by blocking mailsnarf data packets through the Internet and compile them into an email intact.

Dsniff and mailsnift is the software works on the basis of WinPcap (equivalent to libcap on Linux) is a library that captures data packets. Captured packets are saved in a file by Windump, while Dsniff and mailsnarf went further analyze the data packets and display the password (dsniff) or email content (mailsnarf).

5. Password Cracking.

‘Hacking while sleeping.’ Was the phrase commonly used by people who do password cracking.  Why? Because in general dibuthkan a long time to do password cracking. Can take hours, even days and – days! It all depends on the target, whether the target using a common password, the password has a length of an unusual character, or a combination of passwords with special characters.

6. Session Hjacking.

Session hijacking now increasingly prevalent among the attackers. Session hijacking usually done by imitation cookies.  So basically, we should be able to mimic the cookies of the victim to get their login session.

7. Being a Proxy Server.

We can gather information with a proxy server for the victim to be able to surf. With a proxy server, the identity of the surfer can be ours.

8. Utilizing User Negligence In Use Browser Features.

Each browser must have features intended to ease and convenience of users in the surf. Among them is the presence of the cache and Password Manager.

9. Google.

Google.com. Many sites are collapsed, passwords and numbers – credit card numbers are stolen as a result of the act of those who abuse use of supernatural power, the past, it is easy to do. Just by typing in certain keywords associated with a user name and password, you can harvest hundreds of user’s password through google. But now it looks like you have to bite the fingers if you use the above manner. :)

Advertisement


You might also like

How to Safely Surf the Web
Many of these criminals in the Internet world, and they are always trying to find lax when we're surfing...
Tips for using hotspots
Nowadays more and more WiFi hot spots are available in various public places, but every time you make...
Mounting Remote Directory Sharing ways to Local Folder in Debian / Ubuntu
We can attach / mounting directories that have been sharing on the remote computer, into a local folder...
Ways Of Connecting To The Internet With The Samsung Galaxy Tab
For those who have seen the Samsung Galaxy Tab, your initial reaction should be awe. You've got to be...

1 comment

1 watch dogs trailer { 08.08.13 at 12:11 am }

Excellent beat ! I wish to apprentice while you amend your site,
how can i subscribe for a blog site? The account helped
me a acceptable deal. I had been tiny bit acquainted of this your broadcast
provided bright clear idea

Leave a Comment