Monday 26 November 2012

How Hacking Works

The reality, however, is that hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars damages as well as credited with the development of the world wide web and founding of major Tech companies.
Stop it...


Now...here is the stuff how hacking is done :

1. Cross-Site scripting.

The most common and popular technique of hacking is this cross-site scripting. It is also known as XSS. It is very easy way of hacking therefore it is a big threat to the website security system. There is a security loophole on  a website that is hard to detect and stop, making the website vulnerable to the attacks of malicious hackers. This type of hacking can be carried out in different ways DOM-based, stored or reflected. The hackers infects a legitimate web page with his malicious programs side script.  When a user visits  this web page the script is downloaded to his browser and executed.

2. SQL Injection

This process involves entering SQL code into web forms, eg. login fields or into the browser address field, to access and manipulate the database behind the site, system or application. Whenever you enter any text in the username and password fields, the data you input is typically inserted into an SQL command. This command have now send your password and username to the hacker sitting and waiting for the reply.

3. Theft of FTP passwords


This type of hacking takes advantage of the fact that many of the poorly protected PCs in the world happen to belong to the webmasters whose website login information is stored on their personal computers. The thief search the victim's PC  for FTP login passwords and relay them to a remote computer.

No comments:

Post a Comment

Twitter Bird Gadget