Skip to main content

how the hackers get our passwords?? what are the method they use??

Hi, guys in this post I am sharing how the hackers get our passwords?? what are the method they use?? 

 I will explain how to protect your self from each one of the treats in an upcoming post


Okay let's get started


Our all online accounts including our Google account, Even banking accounts are just protected with username and password. 

The password contains the just finite number of characters, numbers, symbols only, if someone knows or find out your password then they can get full privileges of your account authentication

One way to keep your self-secure is by knowing how do hackers hack password and what all methods and software’s they generally use. By knowing how hackers can get into your account, you will be in better situation to understand what are the possible ways you can lose your account information and passwords & you can protect yourself from getting hacked next time.

How do Hackers get Passwords?


There are some common technique which hackers use to hack passwords

1: Phishing pages:
2: Keyloggers
3: RAT
4: Trojan Horses like malware
5: Password Guessing
5: Forget your password
6: Wifi packet Traffic Monitoring
7: Brute Force Attacks


Phishing web pages:

  Phishing attacks over the years have become more sophisticated.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
 The attacker sends the duplicate website looks same as a legitimate site on your Email. For example A fake bank website. Facebook, Google PayPal website like this.

When you log in with your username and password that both your credential sent out the hackers database server.
Even the victim has no aware his identity is gone to the e-intruders.



Keyloggers:


This is one of the basic tool used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all the keystrokes you type. A log is created and then it is sent to the Hacker. Most famous keylogger is the Ardamax Keylogger. It can be customized so that it cannot be shown in “Processes” (Windows Task Manager).


 RAT:

RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC, without your knowledge. He can see what is going on the screen, what you are currently doing, which sites you surf. It also has the built-in functionality of keylogger.
Hacker can do anything on your computer, and all this without your knowledge.
Like Reverse TCP, creating Backdoors in out system


Trojan Horses like malware:


Now, these are the most common type of malware. Trojans spread through unofficial free software downloading sites mostly.  When you download from Cracked software from untrusted sites it may be patched and even the original trial programs are trojans. This means you will get the software for free. But your computer will be affected with a trojan horse.
It will give an unauthorized access to the hacker

On the 90% of cracked games, software tampered with keyloggers, malicious payloads even some has RAT also.


Password Guessing:

it is nontechnical but efficient, We can fix the vulnerabilities in our systems, but we cant fix the vulnerabilities on the human when we apply the correct social engineering skills. we can get the important credentials of that victim.
In 70% of the Intenet users assign the same password to all our online account or any little changes.
if you get any one of the account passwords we can try that credential with all other accounts.
Even most of the users use the phone number as our password.


Forget your password:

It is a trending one of Nowadays. Mostly all the Internet accounts have a forgot your password option, when you choose that it will send the 6 digit Numbers to the mobile Number. If we have that victim mobile in our hand we can do easily change the any one of the  Account passwords 


Wifi packet Traffic Monitoring:

 It can be done by any one of the packet capturing tool, An example Wireshark.
Wireshark is the free and open source network packet analyzer, it is used for analyzing the network packet.

We can sniff all unencrypted packets transmitted on the wifi networks. But most of the websites are used the SSL Encrypted connection (HTTPS) so the Wireshark cant decrypt the packets without the decryption key.

But Most of the users use the same password type for all other important accounts. so if you get any one of the HTTP account passwords we can try all other accounts.


Brute Force Attacks:

Brute force it just a straightforward approach, the hacker makes a word file. the word file consists of millions of passwords,
We can get the word files from most data breached logs from the dark web. An Example yahoo Dropbox, data breach attacks.

We can use the automated program to try all passwords. 
But Nowadays this method is not worked online because the program server detects the continuous login requests from the same IP address. it will block that IP address in a short time, or it going to the captcha Test(Human or robot)

Thank you for reading...

checkout the best online skill learning platform Pluralsight with 7000+ courses from industry level trained teachers Sign-up now with 50% offer

Comments

Popular posts from this blog

#1 Build your first chatbot using Python and AIML

In the series of post, I am going to build own chatbot using python and AIML  How to build a Chatbot: In this series, we gonna develop our chatbot as a simplest as possible using python and the AIML is brain Chatbot using python and AIML what is AIML: AIML stands for Artificial Intelligence Markup language It looks like XML files, developed by Dr. Richard S. Wallace during 1995-2000,  It is a set of tags and patterned structure, constructed by question and answers It makes our chatbot brain as simple as possible python: Everybody knows what is python language, it's one of the popular programmings in time it has multiple packages available in their packages repository both internally and externally As on the list, AIML package also available is python. You can easily install the packages using python pip(python package manager), or any other ways. The package helps to read and learn the AIML files into python and return the appropriate response 

Deploy Flask app on Heroku with example guide

Deploying a python flask app has many ways to do, and there is a lot of platforms available Here I am going to show how to deploy a python flask application on Heroku in a free plan Let's Get started I assume You already developed your flask application in your local environment, have a Heroku account, and have some basic knowledge of working with git and Command-line Interface. Else If you are new Python Flask, Checkout the amazing course from Pluralsight called Introduction to the Flask Microframework  by Reindert-Jan Ekker Signup-now with 50% offer why Heroku? Heroku Free account provides 550 free dyno hours and free domain Example: https://app_name.herokuapp.com.  Learn more at  Heroku Free Dyno Hours Heroku Provide some option to Deploy App:  First one is deployed your app by linking your GitHub repository with your Heroku Account Another one is using the Heroku Command-line Interface (Heroku CLI) by pushing the application on Heroku git ser

Get Started With the Windows Subsystem for Linux

You may already know the power of Linux, and its features make the best place for programmers and developers  If you're not going to install the Linux operating system but you want to use the Linux offered features in windows this post maybe yours. You can get the pure Linux experience natively in windows machine  through the windows subsystem Linux   (WSL) here the Steps to install and configure Linux subsystem in windows  That feature has been available from Windows 10 2016 First, you want to go to  Control Panel\Programs\Programs and Features now you can see an option like "Turn windows features on or off" on your left side  open that option, Now you want to check the Windows subsystem for Linux' checkbox  After you check that option restart your system  Okay now you want to search "bash" from the start menu, Open that   It shows the message like no distribution installed    Let's install the Linux distribution