Skip to content
spaceshuttle

HACKING TECHNIQUES

Hackers, hack. Here's how.

How do Hackers Hack?

There are many different kinds of techniques that hackers can use to exploit businesses and individuals. We'll dive into the top 20+ techniques.

INTRODUCTION

WHAT IS A HACKING TECHNIQUE?

Hackers are bad people who use technologies to cause chaos to businesses and individuals alike.

Not all hackers carry the same talents - because let's face it, they are intelligent criminals. Working beneath the shadows of their computers and networks.

We'll dive into 20+ types of hacking tricks.

Understanding how hackers are attempting to steal from us, is the best place to start in terms of forming a defense strategy.

#1

BAIT AND SWITCH

Threat scale: 10/10

Hackers purchase advertising space on websites. The intent here is to get you to click on the link within the ad. That link points to a page that is loaded with malicious content. Once you hit the web page, it automatically begins to infect your device(s) with a ton of malware. The malware placed typically gives a hacker unlimited access to your systems.

CYBERSECURITY IS COMPLICATED

Find out what you need to consider building a cybersecurity strategy.
#2

BRUTE FORCE

Hit them, and hit them again. This technique is use to gain access to websites. Hackers will try password combinations until they succeed. This is why having unique, extensive passwords is important. So that hackers aren't able to easily guess.

#3

CLICKJACKING ATTACKS

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr.

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, ore magna aliquyam erat, sed diam voluptua.

Most commonly found in movie streaming, torrent websites, and app downloads.

How it impacts you? Well hackers hide these links within these apps and other services. Once you click on the hidden link. Boom. The hacker is allowed to hijack your clicks.

#4

COOKIE THEFT

Let's start with the basics.

Cookies are tiny text files that are stored on your system or browser cache. When you access different websites, they collect different information about you and store these text files as "cookies." You've probably seen websites prompt you with a notice about what cookies they use and why. You can now opt out.

Hackers can steal your cookies. When they steal them, they often have to decrypt them, but after that, they'll have access to your personal information. They can even use these cookies and pretend to be you. *hint* don't remember computers when you log into banking apps.

#5

CREDENTIAL REUSE

Different site, different password. But now that so many sites require a user name and password, it's nearly impossible to keep passwords unique.

Hackers realize that this is a burden, and that as a result, some of us are more likely to reuse passwords. So, when a hacker gets access to a user name and password for a specific site, they also use that combination on other sites. Hoping they strike gold on more than one account.

*Remember to use unique passwords across all the sites you use daily. It's also important to deactivate any old accounts - they can still be hacked even if you aren't using them.

#6

CROSS-SITE SCRIPTING (XSS)

With this technique, a hacker has one objective, attack the website visitor.

It's a rather simple assault as the hacker simply inserts their malicious code into a comment or script. When we visit the website as a user, the code is then injected into our web browser.

#7

DENIAL OF SERVICE (DoS/DDoS)

The mindset behind this attack is hit them hard, again, and again, and again. The objective is to bring down a network or a site. The network or site can be overwhelmed by data requests, excessive login attempts, or repetitive tasks that essentially make the supporting servers struggle to perform.

Another way of forcing a server meltdown? Malware. Once the malware starts replicating, the servers are flooded with unmanageable traffic that again brings the server(s) to a halt.

#8

DNS SPOOFING

What is a DNS anyways? DNS is Domain Name Server. The DNS is responsible for bringing your device to a website once you enter a URL.

When a DNS is spoofed, it can do a few things. One of those things is to bring data back to you corrupted. 

#9

EAVESDROPPING

This form of attack is fairly different from the rest. It's also referred to as a Passive Attack. Just like if you were to eavesdrop on a conversation, hackers sit idle, monitoring your network in hopes of obtaining valuable information without any detection.

#10

FAKE WAP

WAP is an acronym standing for Wireless Access Point. A fake WAP is very much what it sounds like. A hacker will set up a fake Wi-Fi access point. When you connect to their fake WAP the hacker is able to redirect you to their page so they can steal your information.

*How can you prevent this from happening? Deploy a VPN

#11

IoT ATTACKS

Ah, the Internet of Things - or the Internet of Everything as it seems. Since so many things are dependent on internet access now, hackers seek out ways to compromise them. Because most of us don't change the default user name and passwords on these IoT devices, hackers are able to easily access them. The hackers can then deploy malware, and since the security within these systems is weak, the malware is easily transmitted to other IoT devices.

#12

KEYLOGGER INJECTION

The Keylogger technique actually involves using a program dubbed a Keylogger. A keylogger keeps tabs on the keys and strokes you make on your keyboard and then logs that data into a file on your system. They can log things like your password, or other important, confidential information.

#13

MALWARE

Malware: virus, trojan, worm, spyware, adware, and ransomware. Malware can wear different hats.

It's main objective is to gain control of your system, monitor what you do, and steal your confidential data. Often times, hackers are able to manipulate us into installing the malware ourselves. We can do this by clicking on a malicious link, downloading a tainted file, or opening attachments. 

#14

MAN IN THE MIDDLE (MITM) ATTACK

Interception!

With this method, hackers are able to listen in on conversations between two or more targets.

There are several ways this can be accomplished. Rogue access points, ARP spoofing, and DNS spoofing are just a few to name.

#15

NON-TARGETED WEBSITE HACK

Malware: virus, trojan, worm, spyware, adware, and ransomware. Malware can wear different hats.

It's main objective is to gain control of your system, monitor what you do, and steal your confidential data. Often times, hackers are able to manipulate us into installing the malware ourselves. We can do this by clicking on a malicious link, downloading a tainted file, or opening attachments. 

#16

PHISHING

One of the most popular and effective tactics. Phishing involves compromising a user with a spoofed webpage.

Hackers have continually adapted their technique to trick us into making a quick error.

What they will do is send an email, or text with a link that points to a webpage that is essentially a cloned page of the legit site.

Often times, they will have you enter your legitimate information into their illegitimate site. Now they have your credentials for the legitimate site.

What happens next, varies. They may change the password and associated email so you can on longer access your account. They can also encrypt your info (for example in 0365) and hold it hostage for ransom.

#17

SESSION HIJACKING

Very similar to man-in-the-middle attacks, session hijacking occurs when a hacker is able to capture your session id (which happens anytime you log into a website or browse the internet). What this allows the hacker to do? Steal your valuable information.

#18

SOCIAL ENGINEERING

Tricky, tricky. In this situation hackers are looking to exploit us humans to hand over some kind of confidential information. This could be login details or admin access credentials.

 

*TIP* To counter this type of attack - implement multifactor authentication. Be sure not to share this code with anyone!

#19

SQL INJECTION

SQL databases can house a TON of valuable datasets. So what hackers like to do is search for vulnerabilities so they can exploit the system.

If a hacker is able to find a vulnerability (or weakness) they can then insert a code into a text field and steal passwords, usernames or other important information. They can also corrupt, delete or alter data. Typically they like to focus on websites first and then move onto the visitors next.

#20

UI REDRESS

This one is relatively new - hackers interfere with the user interface that we use and make it so we can't interact with the app or site we want to. Then we click on a fake user interface (that they've created) and we're redirected to another page.

#21

VIRUSES AND MALICIOUS CODE

Bad code. Like the Allstate's Mayhem guy - they just want to cause trouble. Once the bad code is installed on a device, it can help to steal data, lock out access and many other things.

#22

WATERHOLE ATTACKS

In this case - the hacker takes the time to get to know you. What are your favorite coffee shops? Where do you go to hangout?

The hacker will get to know you and then inject malicious code via dun..dun..dun.. public wifi. While you might be the primary target, a hacker won't be mad they've assumed extra victims.

*TIP* Don't connect to public Wi-Fi

webinar-03-unsplash

NEED GUIDANCE? WE'RE HERE TO HELP.

Source:Tech Funnel