"Tell me first,what comes in your mind when you think of hacker or hacking?"
"HACKER is one who enjoys and sense great freedom with computers. HACKER’S carries deep interest in CORE computer technology along with knowledge of Information processing. They live with it and live for it.
Many post about hacking will tell you not to survive on WINDOWS if you Dreams to be Hacker.Remember Hacker can't be conservative. You knows no boundary so you are here. Hackmania will talk with each and every aspect. Here i will account that each and every operating system are best in their own way serving the needs of people.
- Sniffers and snoopers
- Spoofing tools
- Trojan horse
- Password cracker
- Denial of service tools
- Stealth and back-door tools
- Malicious applets and scripts
- Logic bombs
- Buffer overflow
- Bugs in software
- Holes in trust management
- Social engineering
- Dumpster diving
To gain access to network from outside- If the firewall of target network is not configured to filter out spoofing packet with source address belonging to the local domain; it's possible for an intruder to inject packets with spoofed inner address through the firewall.
List of spoofing tools:
- Remote access
- Data destruction
- Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
- Disable security software
- Denial-of-service attack (DoS)
This is process running under window platforms like many other process. Now experts suggests that this Trojan allows attackers to access your computer from remote locations, stealing passwords, Internet banking and personal data. This process is a security risk and should be removed from your computer.shmgrate.exe if running on your PC it means that your pc has been nfected with a Trojan known as 'gaster'.
Brute Force Attack
Album.aspxand the browser sends the Web server the parameter
uid=39101007091397604758&aid=1247473078IHJD. An attacker may try brute force values for u
idto get users.