Summary

This document provides a general overview of hacking techniques. It covers various types of hacking or cyberattacks, including DoS, DDoS attacks, and SQL injection. It also describes methods of anonymity and potential dangers. The document likely serves as educational material.

Full Transcript

Hacking Most attacks are conducted public Wi Fi as through the hackers like to stay anonymous there is lot...

Hacking Most attacks are conducted public Wi Fi as through the hackers like to stay anonymous there is lot that of data going through a makes public Wi Fi's unsafe so it's easy for hackers to still work their stay anonymous through game BaicTemlogy Three kinds hackers white Grey Black of DoS attack Denial Service of just you nests until the server cannot acceptany more 9 1 1428,59 vesdrops the other requests makingthe site in accessible DDoS attack multiple people it's harder as there is a lot devices connections of prep required as there are multiple making simultaneous requests to a certain server need a good config of your firewallyouneed a physical firewall youneed to infectmultipledevices makethemFUDfullyundetectable You willalso IE iiitsimamn PdforUSB orthroughemail makethemyourSLAVE use the infecteddevicescomputers to conduct allsorts activity of User will not haveanyidea as everything will behappeningin the background used a Ifyouhave Rootkit the user CANNOTseethat even in the task manager a toolinstalled on aOS avery dangerous thathidesrunningprocesses tool Fishing Attack someonesendsyou a linkimageURLthattakesyouto a legit lookingpagethatalso says that it'ssecurealsohas the properdomainname it'sactually from a privateDMSserver credentials once youlogin thehacker willhaveknow all your login you can't do anything about it SGLInjections simplypass SQLqueriestoHTTPrequests If notformatted correctlybyPHPcode on the serverside can present a serious oblem p Also one the primary considerations of of all webdevelopers VPNs Virtual PrivateNetwork way to anonymize yourself server requestdisplaysVPN's IP address nottheoriginalone Proxies lessreliable wayofstayinganonymous but make using sockssproxies a common practice somewhere so 1 1h hey pay a proxy you have a digitalfootprint youcan Tor free open source faster than proxies usescertaindevices on internetfortheirpacketsfortheirinternet connection togothrough willremain100 anonymous99.1 thetime can access darkandhiddenweb of Vps Virtual Private Servers can be viewed as a security layer Key Loggers can beused to steal credentials extract information mmmmm DDed You know You should bevery careful from where you download yourtools i.e key loggers remote administration tools root kits and so on NEVER download binary file that is NOT open an uncompiled source because you never know what's in it NEVER run it on your computer What's gonna happen is your device will getinfected by the same toollogger deploy or attack that YOU will perform iiriiiiimie.im

Use Quizgecko on...
Browser
Browser