Friday, November 18, 2011

PC how a hacker attacks

A typical approach in an attack on Internet-connected system is:
  • Network enumeration: Discovering information about the intended target.
  • Vulnerability analysis: Identifying potential ways of attack.
  • Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Security exploits
A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.

No comments:

Post a Comment