cacti
+ Reply to Thread
Results 1 to 2 of 2

Thread: Hacking Techniques

Hybrid View

  1. #1
    carlo Guest

    Hacking Techniques

    Hacking Techniques by carlo

    Brute Forcing
    Description:
    A brute forcer tries multiple passwords for a given username. e.g you want to access a pornsite but i costs big $$$$. All you would have to do is get a brute forcer (Cough! Cough! [URL="http://www.accessdiver.com/php/getad.php"]Access Diver[/URL] Cough! Cough!) All you would have to do have to do is get the members section address e.g "www.pornsite.com/members/" and type that into the green bar in access diver's case or in any over http bruteforcer you have in the address bar it tell you to type the url in. Then of course if you have any sence you will select the proxy option and type a proxy address in (Google 4 *!) then click standard to hack an account for the porn site. Once its found a match for a username it will list it.

    Keystroke logger (Keylogger)
    Description:
    Once executed on a remote computer loggs all activity including passwords and send them to the hacker. e.g A hacker is short of $$$ and needs some fast. He will convince the owner of a paypal account to open a malicious
    exe of which is the keylogger and wait for the account holder to type in his/hers username and password and it is mailed to the hacker via email or ftp.

    Trojan Horse
    Description:
    Consists of a sever and a client. The sever is sent to the victim and the hacker uses the client to connect to the sever. The hacker from the client can take total control over the victims computer through the client.

    I will post more in a few days

    carlo

  2. #2
    carlo Guest

    Part 2

    Cross site scripting
    I believe mike*0* has written a brilliant overview of cross site scripting.
    You can view this [URL="http://www.all-nettools.com/forum/showthread.php?t=2**6"]here[/URL]

    D.o.s (denial of service) attacks
    (From webopedia)
    Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.

    A dos attacker can be found [URL="http://home.conceptsfa.nl/~juky_d/dos/assault.zip"]here[/URL] ( i take no responsibility for anything that you do with this tool)

    Part * coming soon.

+ Reply to Thread

Similar Threads

  1. Request on Advanced Game Programming Techniques
    By aditya258 in forum Programming
    Replies: 6
    Last Post: 01-05-2010, 04:15 AM
  2. Hacking???
    By bikers314 in forum Security & Encryption
    Replies: 11
    Last Post: 08-12-2007, 02:10 AM
  3. help hacking
    By markman27 in forum Internet Privacy
    Replies: 1
    Last Post: 03-22-2007, 05:41 PM
  4. useful hacking
    By ~~smart~fool~~ in forum Security & Encryption
    Replies: 24
    Last Post: 12-24-2006, 12:07 PM
  5. hacking how?
    By vietlinh23ark in forum Viruses and Trojans
    Replies: 11
    Last Post: 10-30-2005, 02:32 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts