Page 1 of 1
How many attacks does hacking include ?_?
Posted: Tue Jun 16, 2009 2:54 am
by Judgment
Till now I have known DoS, DDos, brute force attack.
There are more can you people name them? It will be a big help.
-Judgment
Posted: Tue Jun 16, 2009 3:25 am
by Zaffron
Sooo good job, you know 1 type of attack so far. Oh, google is your friend on looking for attack types. It would also be helpful to learn how to defend against crackers so you can reverse engineer the defense methods into attack methods.
Posted: Wed Jun 17, 2009 9:19 am
by Liidian
Zaffron wrote:Sooo good job, you know 1 type of attack so far. Oh, google is your friend on looking for attack types. It would also be helpful to learn how to defend against crackers so you can reverse engineer the defense methods into attack methods.
Defend against crackers? call me when you find a real and good one.
a reply
Posted: Mon Jun 29, 2009 7:14 pm
by koolpop0
dos -denial of service
ddos -distributed denial of service
brute force- a password cracking method that uses all possible passwords
thats those you know
dictionary attack- uses passwords from a dictionary
ftp bounce attack- uses a exploit in a ftp server to request access to ports indirectly.
packet sniffing- it captures packets in a network which can hold passwords and other incriminating information
port scanning - it attempts to connect to ports such as 21 (ftp) 23 (telnet) 80 (http)
sql injection - injects code into a login or such to exploit shit (i use backtrack 3 http sql sidebar for this)
spoofing - it involves one program, website, etc and it falsifys data to become a trusted system/person
rootkit - it hides itself on a computer saying its another program when its not so that its real owners have no idea its there.
malicious
trojan horse - says its one program but it does something usually malicious
virus - it spreads it's self and replicates fucking up your computer
worm - it dosent need to have another program or document to spread slows computer networks
key loggers - it has to difrent kinds hardware and software
software- this puts its self in a process and captures every key that you type hard to read but useful for information gathering
hardware - undetectable and isnt able to be accessed remotely - it is put in the keyboards innards and when a certain key combination is pressed it shows what keys have been pressed.
Posted: Mon Jun 29, 2009 9:19 pm
by LarsH
Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
Posted: Tue Jun 30, 2009 8:55 pm
by koolpop0
LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
\
perhaps... but most people confuse them together maybe like this one up here
Posted: Thu Jul 02, 2009 7:35 pm
by PaRaDoX
koolpop0 wrote:LarsH wrote:Judgment: koolpop0: All those are cracker and skiddie techniques (attacks). There are no such thing as a hacker attack. Hacker skills include logic thinking problem solving and programming. Hacker skills gives the possibility to make new techniques to make things done. New techniques are developed all the time and it's hard to make a complete list.
\
perhaps... but most people confuse them together maybe like this one up here
I hope you take note that this is not a cracking site. Just checking.
But yea, hacking is more like fiddling around with sites / programs to your own ends, but not maliciously.