Hi, guys in this post I am sharing how the hackers get our passwords?? what are the method they use??
I will explain how to protect your self from each one of the treats in an upcoming post
Our all online accounts including our Google account, Even banking accounts are just protected with username and password.
Thank you for reading...
checkout the best online skill learning platform Pluralsight with 7000+ courses from industry level trained teachers Sign-up now with 50% offer
I will explain how to protect your self from each one of the treats in an upcoming post
Okay let's get started
The password contains the just finite number of characters, numbers, symbols only, if someone knows or find out your password then they can get full privileges of your account authentication
One way to keep your self-secure is by knowing how do hackers hack password and what all methods and software’s they generally use. By knowing how hackers can get into your account, you will be in better situation to understand what are the possible ways you can lose your account information and passwords & you can protect yourself from getting hacked next time.
How do Hackers get Passwords?
There are some common technique which hackers use to hack passwords
1: Phishing pages:
2: Keyloggers
3: RAT
4: Trojan Horses like malware
5: Password Guessing
5: Forget your password
6: Wifi packet Traffic Monitoring
7: Brute Force Attacks
Phishing web pages:
Phishing attacks over the years have become more sophisticated.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
The attacker sends the duplicate website looks same as a legitimate site on your Email. For example A fake bank website. Facebook, Google PayPal website like this.
When you log in with your username and password that both your credential sent out the hackers database server.
Even the victim has no aware his identity is gone to the e-intruders.
Keyloggers:
This is one of the basic tool used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all the keystrokes you type. A log is created and then it is sent to the Hacker. Most famous keylogger is the Ardamax Keylogger. It can be customized so that it cannot be shown in “Processes” (Windows Task Manager).
RAT:
RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC, without your knowledge. He can see what is going on the screen, what you are currently doing, which sites you surf. It also has the built-in functionality of keylogger.
Hacker can do anything on your computer, and all this without your knowledge.
Like Reverse TCP, creating Backdoors in out system
Trojan Horses like malware:
Now, these are the most common type of malware. Trojans spread through unofficial free software downloading sites mostly. When you download from Cracked software from untrusted sites it may be patched and even the original trial programs are trojans. This means you will get the software for free. But your computer will be affected with a trojan horse.
It will give an unauthorized access to the hacker
On the 90% of cracked games, software tampered with keyloggers, malicious payloads even some has RAT also.
Password Guessing:
it is nontechnical but efficient, We can fix the vulnerabilities in our systems, but we cant fix the vulnerabilities on the human when we apply the correct social engineering skills. we can get the important credentials of that victim.
In 70% of the Intenet users assign the same password to all our online account or any little changes.
if you get any one of the account passwords we can try that credential with all other accounts.
Even most of the users use the phone number as our password.
Forget your password:
It is a trending one of Nowadays. Mostly all the Internet accounts have a forgot your password option, when you choose that it will send the 6 digit Numbers to the mobile Number. If we have that victim mobile in our hand we can do easily change the any one of the Account passwords
Wifi packet Traffic Monitoring:
It can be done by any one of the packet capturing tool, An example Wireshark.
Wireshark is the free and open source network packet analyzer, it is used for analyzing the network packet.
We can sniff all unencrypted packets transmitted on the wifi networks. But most of the websites are used the SSL Encrypted connection (HTTPS) so the Wireshark cant decrypt the packets without the decryption key.
But Most of the users use the same password type for all other important accounts. so if you get any one of the HTTP account passwords we can try all other accounts.
Brute Force Attacks:
Brute force it just a straightforward approach, the hacker makes a word file. the word file consists of millions of passwords,
We can get the word files from most data breached logs from the dark web. An Example yahoo Dropbox, data breach attacks.
We can use the automated program to try all passwords.
But Nowadays this method is not worked online because the program server detects the continuous login requests from the same IP address. it will block that IP address in a short time, or it going to the captcha Test(Human or robot)
Thank you for reading...
checkout the best online skill learning platform Pluralsight with 7000+ courses from industry level trained teachers Sign-up now with 50% offer
Comments
Post a Comment