Secret Security Attacks - Hacking: Tapping into the Matrix: Step by Step Guide on How to Hack, including Tips, Secrets, Steps, and Hidden Traps! (2014)

Hacking: Tapping into the Matrix: Step by Step Guide on How to Hack, including Tips, Secrets, Steps, and Hidden Traps! (2014)

Chapter 3. Secret Security Attacks

Now, there are also various types of security attacks that you can do—and you’ll be able to try them out in the next few chapters. For now, it is time for you to learn about them first!

1. Trojan Horse. This is one of the most common types of hacks that could easily be transferred from flash drives, disks, and even programs that are downloaded on computers.

2. DoS. Denial of Service means a person would no longer be able to access certain files or programs in his computer.

3. Logic Bomb. This is one of the most dangerous types of security attacks because it works like a heart attack: It stays dormant until it is triggered, whether by dates, or certain actions done on the computer.

4. Worm. Worms make copies of themselves, and are easily spread through emails.

5. Virus. Viruses attach themselves to executable files—and destroy a computer little by little.

6. DNS Poisoning. When DNS Information is falsified, it means that the DNS is being poisoned. Traffic is diverted, and when servers do not receive replies, bogus information is given—which ruins the whole system itself.

7. Server Spoofing. As the name suggests, this spoofs servers just to get client authentication, especially while the server owner is trying to log in. The hacker could then get the server owner’s username and password as he is trying to log in.

8. Session Hijacking. As a hacker, you can watch an ongoing session on an open network, and then once you get the information you need, you can then work on disabling the system. This can even work for two legitimate systems in just one session!

9. Gaining Access through Source Routing. You can also break through networks that are less secure just by gaining information from the said network.

10. IP Spoofing. Another dangerous hacking method, IP Spoofing is done so that the person being attacked would think that he’s getting information from a legitimate source—even if it just came from a dummy.

11. Teardrop. This happens by sending a normal packet that contains a fragmented, virus-laden packet in it. It’s not often noticed right away because it’s smaller than real packets—and could easily be hidden. It can overflow systems, and the user might find it hard to buffer the overflow.

12. Smurf. A smurf is the term given to a ping request to a certain address that would then overload the user’s computer system.

13. Ping of Death. This was quite popular before 1996, and was used as a means to crash datagrams and IP devices for good.

14. Ping Broadcast. This is sent to various hosts of local networks that would allow the server owner to get a ping reply to the system that was stacked, and the reply he’ll get would destroy the whole system.

Now, when you hack a system, you’d be able to make use of most of these at once—and if you’re ready to put to test what you have learned, turn to the next chapters and find out how!