How many attacks does hacking include ?_?

Discussion about hacker.org's server
Post Reply
Judgment
Posts: 4
Joined: Sat Jun 13, 2009 8:29 am

How many attacks does hacking include ?_?

Post by Judgment »

Till now I have known DoS, DDos, brute force attack.
There are more can you people name them? It will be a big help.


-Judgment
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

Sooo good job, you know 1 type of attack so far. Oh, google is your friend on looking for attack types. It would also be helpful to learn how to defend against crackers so you can reverse engineer the defense methods into attack methods.
Liidian
Posts: 202
Joined: Fri Jun 05, 2009 10:49 pm
Location: Guess

Post by Liidian »

Zaffron wrote:Sooo good job, you know 1 type of attack so far. Oh, google is your friend on looking for attack types. It would also be helpful to learn how to defend against crackers so you can reverse engineer the defense methods into attack methods.
Defend against crackers? call me when you find a real and good one.
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
User avatar
koolpop0
Posts: 259
Joined: Thu Sep 20, 2007 11:03 pm
Location: In the binary of this system
Contact:

a reply

Post by koolpop0 »

dos -denial of service

ddos -distributed denial of service

brute force- a password cracking method that uses all possible passwords

thats those you know

dictionary attack- uses passwords from a dictionary

ftp bounce attack- uses a exploit in a ftp server to request access to ports indirectly.

packet sniffing- it captures packets in a network which can hold passwords and other incriminating information

port scanning - it attempts to connect to ports such as 21 (ftp) 23 (telnet) 80 (http)

sql injection - injects code into a login or such to exploit shit (i use backtrack 3 http sql sidebar for this)

spoofing - it involves one program, website, etc and it falsifys data to become a trusted system/person

rootkit - it hides itself on a computer saying its another program when its not so that its real owners have no idea its there.
malicious

trojan horse - says its one program but it does something usually malicious

virus - it spreads it's self and replicates fucking up your computer

worm - it dosent need to have another program or document to spread slows computer networks

key loggers - it has to difrent kinds hardware and software

software- this puts its self in a process and captures every key that you type hard to read but useful for information gathering

hardware - undetectable and isnt able to be accessed remotely - it is put in the keyboards innards and when a certain key combination is pressed it shows what keys have been pressed.
User avatar
LarsH
Posts: 29
Joined: Sun Feb 15, 2009 4:47 pm

Post by LarsH »

Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
User avatar
koolpop0
Posts: 259
Joined: Thu Sep 20, 2007 11:03 pm
Location: In the binary of this system
Contact:

Post by koolpop0 »

LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
\



perhaps... but most people confuse them together maybe like this one up here
User avatar
PaRaDoX
Posts: 708
Joined: Fri Aug 22, 2008 5:52 am
Location: In your fridge, waiting to pop out and scare you.

Post by PaRaDoX »

koolpop0 wrote:
LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
\



perhaps... but most people confuse them together maybe like this one up here
I hope you take note that this is not a cracking site. Just checking.

But yea, hacking is more like fiddling around with sites / programs to your own ends, but not maliciously.
Image

~You are a glitch in my reasoning.
Post Reply