SlideShare a Scribd company logo
Common Hacking Tactics
Types Of Tactics
Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a
network for known weaknesses. Hackers also commonly use port
scanners. These check to see which ports on a specified computer are
"open" or available to access the computer, and sometimes will detect
what program or service is listening on that port, and its version
number.
Spoofing attack (Phishing)
A spoofing attack involves one program, system, or website
successfully masquerading as another by falsifying data and thereby
being treated as a trusted system by a user or another program. The
purpose of this is usually to fool programs, systems, or users into
revealing confidential information, such as user names and passwords,
to the attacker.
 
Password cracking
Password cracking is the process of recovering passwords from
data that has been stored in or transmitted by a computer
system. A common approach is to repeatedly try guesses for the
password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can
be used to capture passwords and other data in transit over the
network.
Social engineering
A common practice for hackers who use this technique, is to contact
the system administrator and play the role of a user who cannot get
access to his or her system. Hackers who use this technique have to be
quite savvy and choose the words they use carefully, in order to trick
the system administrator into giving them information.
Key loggers
A key logger is a tool designed to record ('log') every keystroke on an
affected machine for later retrieval. Its purpose is usually to allow the
user of this tool to gain access to confidential information typed on the
affected machine, such as a user's password or other private data.
Trojan horses
A Trojan horse is a program which seems to be doing one thing,
but is actually doing another. A trojan horse can be used to set
up a back door in a computer system such that the intruder can
gain access later
Viruses
A virus is a self-replicating program that spreads by inserting
copies of itself into other executable code or documents.
Therefore, a computer virus behaves in a way similar to
a biological virus, which spreads by inserting itself into living
cells.
Password cracking
Password cracking is the process of recovering passwords from
data that has been stored in or transmitted by a computer
system. A common approach is to repeatedly try guesses for the
password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can
be used to capture passwords and other data in transit over the
network.

More Related Content

What's hot

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rajan Chhangani
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
Hackers
HackersHackers
Hackers
guesta04f59b
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
HACKING
HACKINGHACKING
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
Gunjan Panara
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
 

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Hackers
HackersHackers
Hackers
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
HACKING
HACKINGHACKING
HACKING
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 

Viewers also liked

ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
Matt Ford
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
fuckubitches
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
Sam Bowne
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
Rajashree Praharaj
 
Network scanning
Network scanningNetwork scanning
Network scanning
oceanofwebs
 
Port scanning
Port scanningPort scanning
Port scanning
Hemanth Pasumarthi
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
Viruses
VirusesViruses
Viruses
KerOro SUn
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 

Viewers also liked (15)

ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Port scanning
Port scanningPort scanning
Port scanning
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Viruses
VirusesViruses
Viruses
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Common hacking tactics

Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
ZyrellLalaguna
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
Unit 7
Unit 7Unit 7
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Hacking
HackingHacking
Hacking
blues_mfi
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
Chaitali Patel
 
Mitppt
MitpptMitppt
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro MagazinePentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
cyberprosocial
 
Definition
DefinitionDefinition
Definition
Maruf Hasan
 

Similar to Common hacking tactics (20)

Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Unit 7
Unit 7Unit 7
Unit 7
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Mitppt
MitpptMitppt
Mitppt
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro MagazinePentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
 
Definition
DefinitionDefinition
Definition
 

Common hacking tactics

  • 3. Vulnerability scanner A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. Spoofing attack (Phishing) A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.  
  • 4. Password cracking Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
  • 5. Social engineering A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. Key loggers A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data.
  • 6. Trojan horses A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later Viruses A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
  • 7. Password cracking Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.