CYBER ATTACKS

#CYBER ATTACKS

 Cyber criminals have tons of techniques to hack into.This techniques are developing day by day more different and advanced .This techniques are unable to detect by normal computer user or those are unaware about the cyber security.


FOLLOWING ARE SOME CYBER ATTACKS THAT CYBER CRIMINALS MOSTLY USE:

  • PASSIVE ATTACK:   
          Passive attack is something which is done indirectly on the target .In passive attack attacker trying to get private information of user from the LOCAL network in which he/she using internet.
Passive attack having different flavours like monitoring of unprotected communication,decrypting weakly encrypted traffic,capturing passwords and important data.

  • ACTIVE ATTACK:                       
          Active attack is direct attack to the target.This attack trying to form direct communication with the target machine or user.In this attack attacker tries to bypass or break into the system using different techniques. This technique involves Virus,Trojan,Worm etc.
The DOS and DDOS attack is one of the example of active attack, in which the continues attack of unwanted data send to the target to intention to damage it.

  • PHISHING ATTACK:    
          Phishing attack is one of the most important and harmful attack in cyber history.For this attack their is no perfect solution.In this attack hacker sends the EMAIL to the target to click on it,and opens up the FAKE site which looks exactly same as REAL site.User type his login credentials on fake site and that will going to hackers.Then hacker will try that LOGIN credentials on real site to rob user.
FAKE LOGIN PAGE OF FACEBOOK!
    
    This attack is mostly done on BANKING SITES to fool user to enter his/her credentials.

  • SPOOF ATTACK:
          Spoofing attack means using real identity to get access into.In spoof attack, hacker tries to access the network/wifi IP address of the real user.After gaining the access into network attacker tries to get private information,delete/modify,reroute the data and lots invisible attacks.
Spoofing mainly having two types.IP spoofing and MAC id spoofing.

  • PASSWORD ATTACK:   

          In this attack attacker tries to crack or hack the password using different techniques.In this attack hacker can hack password protected files,PC/LAPTOP login password,network password,wifi password etc.
Security tips for windows password : GOTO  WINDOWS PASSWORD

There are three major types of password attacks: a Dictionary attack,a Brute-Force attack, a Hybrid attack.

  • BUFFER OVERFLOW:
          Overflow means data more than expected.This attack mostly done on login forms/pages to get access into. E.g. Their is a login form ask for password then hacker gives the password along with some malicious code which is not expected.I this attack hacker will get the Administrator access to the target.

  • EXPLOIT ATTACK:
         In this attack, the attacker knows of  a security problems within an operating system or a piece of software and leverages that knowledge by exploiting/hacking the vulnerability/weakness of target.
In this attack attacker need to know the complete information of target to decide the attack methodology.

  • SOCIAL ENGINEERING:  
          Social Engineering is an attack called HUMAN HACKING.In this attack the human interaction is most important factor.In this attack attacker tries to get information what he want from targeted person.Within that HUMAN BRAIN trying to get FOOLED by the attacker.Social Engineering is totally based on social awareness.
Some of the good Examples of the social engineering are:
  1. Fake call asking for bank details or ATM card number or job interview by offering some money.
  2. Phishing attack ,fooling human brain to enter password on fake site looks exactly same as real site.
  3. Most of the business meeting based on social engineering to get trust between two parties.

please SHARE and COMMENT this content if you like.And secure yourself from real time hacking world!!!!

Like our facebook page Secson_Cyber_Security 

Follow us on Instagram  SecsonCyberSecurity

-----------------------------------------------------------------------------------------------------------------------
For any query
Mail:
akshayjain5999@yahoo.com
Linked In:

--------------------------------------------------------------------------------------------------------------------------

Comments