Hacking….The one of best interesting topic for IT person. Exactly what is hacking?
In computer networking system, hacking is the technical effort of changing, modifying, manipulating the behavior of network connection and the connected Device. The person who goes for hacking has known as a Hacker.
Hacking done on the computer network by writing some programmatically, codes or we can say some scripts that will run automatically with attached program. Here I am going to describe some hacking techniques used for hacking.
1. Phishing
Phishing is the most popular method used by hackers for hacking the password of a person’s facebook ID and it is an easiest process of hacking Facebook ID password.
Phishing, the hacker creates a login page, which is look like original login page. After creating this fake login page hacker asks from the person whose password he\she wants to hack for login into the page. Once the person login into fake page the parson’s email id and password has saved in a text file, and than the hacker has succeeded in his\her task of getting password of that person.
2. Key logging
Key logging is also a easiest way of getting any persons password and important data. A Key logger is a small program, which has installed on the system of person. Once it has installed on the system, it will start recording all the data whatever person type on his system. The recorded data is send back to the hacker by using FTP or mailing information.
3. Stealer’s
Stealer’s as the name meaning go, is the process stealing data from the person’s system. Stealer’s are basically a software which is designed to steal the saved information (like password) from the person’s system.
4. Session Hijacking
Session Hijacking is more difficult than others are. In session, hijacking hacker used person’s browser cookies. Server for authentication of client person uses cookies. That means hacker steals the cookies and uses it for accessing person’s account on website. Session hijacking used in LAN and WIFI networks.
What is Hacking? And different types of hacking.
Shashi Naruka