Monday, January 24, 2011

Email Based Hacking


There are two types of hacking. E-mail based hacking is the one type which we will discuss now. The next based hacking is the second portion of the types of hacking, keep to remember that both types are very important, hackers can use any way of hacking of any type.

Email or user information:
Now-a -days mostly hackers want to hack the basic information of the user which can be easily available on the internet like emails, passwords, credit card information etc.
         i.            Phishing
       ii.            Key logging
      iii.            Trojans
     iv.            Brute Forcing

Phishing:
It is a basically attack which is used by hackers, what’s happened in this attack. Hackers make a same web page as yahoo or gmail with his own server name. When user opens that page he thinks it is a real website, he enters username and password then click on submit button, then WHOA! His information has stored on the server of hackers, most interesting example, it happened in INDIA when so many clients of the ICICI bank stolen information.
The best way to protect, use the firewall that block the unregistered website.

Key logging:
Key loggers programs are the special type of software which sometimes automatically install on victim computer. What happened with this software that every key pressed by the user record automatically and start to save on the computer of hackers.  FTP, messengers, email are the method by the hackers to install the key loggers on the computer. It is very dangerous programs so be protect from these attacks, these happened without the knowledge of the users. The best way to protect, use the firewall that block the exe file to open automatically without the user authorization.

Trojans:
Trojans are called the father of key loggers. Trojans are like a gift which shows on screen on computer. Some innocent users do not know the programming language of the computer, so they install that gifts like screensavers etc. from the front end Trojans shows that these are screensavers but in the internal working the overall structure is different. For example tiny is the Trojan software. The updating of firewall or antivirus is the best way to protect operating system.

Brute Forcing:
These are used by the crackers to break the password of the system. With the help of this software you have to put the just username and for a password you put a notepad file, where will be all the password guessing list of passwords, system start to match the password file and continue until password does not match. On the internet there are lot of information about the guessing password.
To protect your system from these attacks, password should be more strong and complex, try to use the alphabets, numeric, special characters in your password.

No comments:

Post a Comment