- How To Generate Payload – Backdoor Using Ezsploit Tool And How To Hack Android Device Using Ezsploit Tool?
- What Is MITM Attack ? How To Perform Man In The Middle Attack Using Android Phone ?
ACCORDING TO WIKIPEDIA :
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as trustworthy entity in an electronic communication.
So how do a hacker steal such information from you?
First a hacker creates a fake login page, which looks like an original page and somehow, convince you to enter your usernames and passwords to it.
By sending fake offers, promises or any other eye catching things.
This can be done by the means of SMS, MMS, On Social Networking Sites.
A Hacker can send you a email with any email id (We will discuss it later)
And when you click this update button above, you will be redirected to the fake Facebook page which is created to steal your information.
This page is designed in such a manner that after stealing your information you will be redirected to the original Facebook page. Smart, right
Now look at the rounded area The Address Bar. Its https://faceebook.com an extra “e” which is an ideal way of trapping users. Making a similar looking address.
This is how a basic phishing hack works. It works for all websites and even for bank accounts, when the user is not aware of this kind of hack.
So, Always look for an address bar for your safety.
Phishing is illegal, and by this method many criminal minded peoples are stealing information from common peoples who does not have a proper knowledge of cyber tricks and hacking.
ACCORDING TO WIKIPEDIA:
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
A Basic HTML Website does not contain a SQL database which is based on structured query language. So This type of hack works only for SQL based websites.
WHAT IS A DATABASE? WHY IT IS IMPORTANT FOR A WEBSITE?
Database is a collection of data which is called by an application when required.
For explaining this lets take help from an example.
An attendance register of a class room contains daily attendance records for each student, you can say this is a database of class attendance. Whenever there is a requirement of counting attendance of any student, the register is taken for analysis, same thing happens in a website. Whenever a new user got registered on a website, his all information kept stored in database of the website for future.
HOW A HACKER HACKS A WEBSITE?
Data is Stored in a Database with SQL (Structured Query Language) Even the Administration data. So if somehow hacker gained access to the database, he can get the stored administration password (Owner’s Password to gain access to Website’s Admin panel. Where you can add contents or even completely delete the website)
But this is not Enough, Many Criminal Hackers Gain access to the database of Online Shopping Websites to get Stored Credit Cards and other Confidentialinformation and they Make Money With it.
At first Hacker Scan the whole website for Vulnerabilities in database.
After finding a loophole, he injects malicious codes in the database.
Than Finally the database is accessed and dumped (Downloaded to his computer with all the information)
SQLI Dumper is a secret program developed to find out weak security websites from the internet and this program is powerful enough to dump databases quickly.
Certain “Dorks” is entered in the search option for eg. Php?=
So the websites which contain this string will be scanned first.
After a successful scan a list of websites appears on the screen.
In next step again this list is again scanned for finding exploitable websites.
And finally the shortlisted website is scanned for injectable websites which can be easily hacked with this program.
Simple, Right ?
No, absolutely not.
If any hacker do this without any previous knowledge of hiding his Ip (internet protocol) which is a unique identification of every individual internet user, he will be in trouble for sure.
Hiding an ip is an art and a completely different secret nobody will tell you. But We will get into this to explain it further in an another chapter.
Hacking is a crime, But Having a knowledge can save you from being hacked.
It Depends on you. How you use this information. Just like fire can burn you but It can also cook food for you.
Anonymity is the state when nobody knows who you are on the Internet.
This State is used by Hackers Worldwide to perform their activities so that no one can trace them.
Internet Protocol (IP)
Internet protocol is an unique numeric identification number of every individual internet user which can be used to track your name, geographical location and your online activities.
An IP Looks like this
This is your address and to this address the data is being sent by your internet provider as data packets and this is how your internet works.
Hackers hide their identification on the internet to perform hacking activities so that no one can trace them.
How Hackers Hide their IP?
There are so many of ways to hide an IP, lets discuss about them.
VPN (Virtual Private Network)
VPN is a network that is constructed by using public wires, usually the internet.
To connect to a private network, such as a company’s internal network. There are a number of systems that enables you to create networks using the internet as the medium for transporting data.
How VPN Works?
VPN Works as a medium between you and the internet, the data is first received by the VPN server than it will come to your computer.
A proxy or proxy servers is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy servers which then processes your request and returns what you were wanting.
This way you IP is not shown to the tracker.
TOR BROWSER (The Onion Reuter)
Tor browser is the best software for anonymous browsing till date.
Even FBI can’t trace it easily. This works on layer IP basis. A circuit of different internet protocol is created (minimum 8 ) which acts as layers. (just like layers of an onion)
The data is first received by first IP than transferred to second than third and so on. Then finally you get the data on your browser. This is the first tool every hacker should have and surprisingly this is a free software. Very less people know about this browser.
ACCORDING TO WIKIPEDIA:
A hex editor (or binary file editor or byte editor) is a type of computer program that allows for manipulation of the fundamental binary data that constitutes a computer file. The name ‘hex’ comes from ‘hexadecimal’: a standard numerical format for representing binary data. A typical computer file occupies multiple areas on the platter(s) of a disk drive, whose contents are combined to form the file. Hex editors that are designed to parse and edit sector data from the physical segments of floppy or hard disks are sometimes called sector editors or disk editors.
So Basically any file can be edited by a hex editor. By using this software you can change options, texts, parameters, text fields and other things of a program. Or configuration files.
Computer games can be cheated with this tool. As we know the games contains many configuration files in it, which defines many parameters, stages, levels and so on. And surprisingly they are defined in a simple text and their values which can be easily edited by a hex editor. By doing this you can bypass levels and also reduce the level of difficulties.
For example: Game_level:1_diff=2
here the difficulty level for level one is 2, which can be manipulated with a hex editor.
WHY HEX EDITOR ?
You might be thinking, why use hex editor and why not a simple text editor?
The answer is simple because a hex editor is a hexadecimal based editor.
It targets the hex values not the simple text only, and its ideal for any type of file not just a simple text. This is why hex editor can replace normal text editor but a notepad can’t replace a traditional hex editor.
Hex editors are normally free, You can Google it and download it for free.
A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.
So whenever you enter anything on your computer with keyboard it will go to the keylogger which secretly records everything you type.
For example: Usernames, passwords, credit card details email id.
There are two types of keyloggers
- Software key logger
- Physical Key logger
Software Key logger is a secret program which is either installed or hidden inside a pc to record all the key strokes. Whereas the physical key logger is a hardware component which is attached with keyboard or inside the computer hardware system. Hackers install these key loggers in cyber cafes to steal information from the public.
So friends this is the end of the article ,if you like this post please share it your friends.If you face some problem in any steps please drop your email by going to contact us section of this site. thank you