Till now I have known DoS, DDos, brute force attack.
There are more can you people name them? It will be a big help.
-Judgment
How many attacks does hacking include ?_?
Defend against crackers? call me when you find a real and good one.Zaffron wrote:Sooo good job, you know 1 type of attack so far. Oh, google is your friend on looking for attack types. It would also be helpful to learn how to defend against crackers so you can reverse engineer the defense methods into attack methods.
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
System Zero could also be confirmed with one word "Hacker's"
- koolpop0
- Posts: 259
- Joined: Thu Sep 20, 2007 11:03 pm
- Location: In the binary of this system
- Contact:
a reply
dos -denial of service
ddos -distributed denial of service
brute force- a password cracking method that uses all possible passwords
thats those you know
dictionary attack- uses passwords from a dictionary
ftp bounce attack- uses a exploit in a ftp server to request access to ports indirectly.
packet sniffing- it captures packets in a network which can hold passwords and other incriminating information
port scanning - it attempts to connect to ports such as 21 (ftp) 23 (telnet) 80 (http)
sql injection - injects code into a login or such to exploit shit (i use backtrack 3 http sql sidebar for this)
spoofing - it involves one program, website, etc and it falsifys data to become a trusted system/person
rootkit - it hides itself on a computer saying its another program when its not so that its real owners have no idea its there.
malicious
trojan horse - says its one program but it does something usually malicious
virus - it spreads it's self and replicates fucking up your computer
worm - it dosent need to have another program or document to spread slows computer networks
key loggers - it has to difrent kinds hardware and software
software- this puts its self in a process and captures every key that you type hard to read but useful for information gathering
hardware - undetectable and isnt able to be accessed remotely - it is put in the keyboards innards and when a certain key combination is pressed it shows what keys have been pressed.
ddos -distributed denial of service
brute force- a password cracking method that uses all possible passwords
thats those you know
dictionary attack- uses passwords from a dictionary
ftp bounce attack- uses a exploit in a ftp server to request access to ports indirectly.
packet sniffing- it captures packets in a network which can hold passwords and other incriminating information
port scanning - it attempts to connect to ports such as 21 (ftp) 23 (telnet) 80 (http)
sql injection - injects code into a login or such to exploit shit (i use backtrack 3 http sql sidebar for this)
spoofing - it involves one program, website, etc and it falsifys data to become a trusted system/person
rootkit - it hides itself on a computer saying its another program when its not so that its real owners have no idea its there.
malicious
trojan horse - says its one program but it does something usually malicious
virus - it spreads it's self and replicates fucking up your computer
worm - it dosent need to have another program or document to spread slows computer networks
key loggers - it has to difrent kinds hardware and software
software- this puts its self in a process and captures every key that you type hard to read but useful for information gathering
hardware - undetectable and isnt able to be accessed remotely - it is put in the keyboards innards and when a certain key combination is pressed it shows what keys have been pressed.
Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
- koolpop0
- Posts: 259
- Joined: Thu Sep 20, 2007 11:03 pm
- Location: In the binary of this system
- Contact:
\LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
perhaps... but most people confuse them together maybe like this one up here
- PaRaDoX
- Posts: 708
- Joined: Fri Aug 22, 2008 5:52 am
- Location: In your fridge, waiting to pop out and scare you.
I hope you take note that this is not a cracking site. Just checking.koolpop0 wrote:\LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
perhaps... but most people confuse them together maybe like this one up here
But yea, hacking is more like fiddling around with sites / programs to your own ends, but not maliciously.

~You are a glitch in my reasoning.