Hacking Techniques Attackers Use

1670 Words4 Pages

Attackers use various hacking techniques to compromise a website or a computer. The most common ones are Trojan horse programs, Denial of Service, unprotected windows shares, mobile code, cross-site scripting and packet sniffing. This paper will discuss in details how attackers use these hacking techniques to compromise a system, how attackers gather information from a victim via their e-mail communication and how to prevent the attacks.
Trojan horse programs are a common way for intruders to trick a user into installing back door programs. According to Armor2net, these programs can allow intruders easy access to a computer without the user's knowledge, change the system configurations, or infect the computer with a computer virus. These back door or remote administration programs are also known as social engineering. In fact, hackers usually use BackOrifice, Netbus, and SubSeven to gain remote access to users' computers. Once installed, these programs will allow them to access and control the computers.
Denial of Service (DoS) is another technique that hackers frequently use. DoS attack causes user's computer to crash or to become so busy processing data that the computer is unable to use it. According to Armor2net, it is important to note that in addition to being the target of a DoS attack, it is possible that the attackers also us the computer to participate in another DoS attack on another system. In fact, this technique is called Distributed Denial-of-Service (DDoS) attack. The attackers install a back door program that runs on the compromised computer and wait for further instructions. When a number of back doors are running on different computers, a single "handler" can instruct all of these back doors to launch a DoS atta...

... middle of paper ...

...derstand the concepts behind client-side attacks and how they relate to the coding. This will help to secure his or her application systems better (Riden, 2008). Being able to use existing client-side exploits to compromise lab victim machines will help a software developer understand the attacks better and be able to prevent them.

References
Riden, Jamie. August 2008. Client Side Attacks. Retrieved on April 21, 2014 from http://www.honeynet.org/node/157
Curphey, M. & Groves, D. 2008. OWASP Testing Guide: How to Value the Real Risk? Page 325-333.
Armor2net. “The most common methods used by Hackers”. Retrieved on 5/3/2014 from http://www.armor2net.com/knowledge/hackers_methods.htm
Combo fix. “Three Techniques Used by Hackers to Break Into Accounts.” Retrieved on 5/2/2014 from http://www.combofix.org/three-techniques-used-by-hackers-to-break-into-accounts.php

More about Hacking Techniques Attackers Use

Open Document