Hacking Techniques by carlo

Brute Forcing
Description:
A brute forcer tries multiple passwords for a given username. e.g you want to access a pornsite but i costs big $$$$. All you would have to do is get a brute forcer (Cough! Cough! [URL="http://www.accessdiver.com/php/getad.php"]Access Diver[/URL] Cough! Cough!) All you would have to do have to do is get the members section address e.g "www.pornsite.com/members/" and type that into the green bar in access diver's case or in any over http bruteforcer you have in the address bar it tell you to type the url in. Then of course if you have any sence you will select the proxy option and type a proxy address in (Google 4 *!) then click standard to hack an account for the porn site. Once its found a match for a username it will list it.

Keystroke logger (Keylogger)
Description:
Once executed on a remote computer loggs all activity including passwords and send them to the hacker. e.g A hacker is short of $$$ and needs some fast. He will convince the owner of a paypal account to open a malicious
exe of which is the keylogger and wait for the account holder to type in his/hers username and password and it is mailed to the hacker via email or ftp.

Trojan Horse
Description:
Consists of a sever and a client. The sever is sent to the victim and the hacker uses the client to connect to the sever. The hacker from the client can take total control over the victims computer through the client.

I will post more in a few days

carlo