Hacking Techniques : There are so many different techniques of Hacking. Now we
will discuss about some basic Hacking methods .Normally we can divide it in two
types ,like - Website Hacking & Account Hacking.But those are connected with each other .Different types of
Hacking Methods & Short Description are given below...
SQL Injection : This is a very big fault on SQL database of
any site ,hackers uses this technique for retrieving valuable information from
it & also they can make changes on database.
DNN : Dot Net Nuke is Microsoft .NET 's Open Source Web
CMS(Content Manage System).If any website are made by using this software ,then
any kind of error is harmful for the site, hackers can easily Upload and deface
contents on the site.
XSS : Cross-Site Scripting is a kind of Computer System
Fault available in Web Applications ,Hackers can also hack by using this.
IIS : Internet Information Server is a Web server Application .Any type of fault in this application is very helpful for hackers to deface websites.
IIS : Internet Information Server is a Web server Application .Any type of fault in this application is very helpful for hackers to deface websites.
RFI : Remote File Inclusion is also a fault of Websites .By
using this error ,hackers Include Remote file by scripts On Web Server.
LFI : Local File Inclusion is a same fault like RFI.
Account Hacking :
Phising : In this technique Hackers creates a same page like
login page and tell victim to login and if victims login into the fake page, then
the Hacker got his username and password.
Keylogging : Keylogger is a special kind of software which
records all keystrokes means whatever you've typed using your keyboard,and
those keyloggers sends many kind of data and informations about you,like your
browing history,webcam auto snap's,chat messanger info, all keystorkes with
site name,you've entered your informations .
Brute Force : This is a very cheap method ,Hackers uses many
type guess Combinations to get the accurate password.
Others :
RAT : Remote Administrative Tools ,it's an very dangerous
for the victim because using this method Hackers can remotely operate your
computer.
If you want be A Good Hacker ,then you've to learn each and
every methods ,but slowly slowly,we'll discuss about all methods...