Hackerslist.co — How Hacking leads to cyber crime

Hackerslist.co
2 min readJul 29, 2020

Hackerslist.co explained that a cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems.

Hackerslist.co — How Hacking leads to cyber crime

Most common cyber attack types:

  1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
  • TCP SYN flood attack
  • Teardrop attack
  • Smurf attack
  • Ping of death attack
  • Botnets

2. Man-in-the-middle (MitM) attack

  • Session hijacking
  • IP Spoofing
  • Replay

3. Phishing and spear phishing attacks

Hackerslist.co to reduce the risk of being phished, you can use these techniques:

  • Critical thinking — don’t accept that an email is the real deal just because you’re busy or stressed or you have 150 other unread messages in your inbox. Stop for a minute and analyze the email.
  • Hovering over the links — Move your mouse over the link, but do not click it! Just let your mouse cursor over the link and see where would actually take you. Apply critical thinking to decipher the URL.
  • Analyzing email headers — Email headers define how an email got to your address. The “Reply-to” and “Return-Path” parameters should lead to the same domain as is stated in the email.
  • Sandboxing — You can test email content in a sandbox environment, logging activity from opening the attachment or clicking the links inside the email.

4. Drive-by attack

5. Password attack

Hackerslist.co last approach can be done in either a random or systematic manner:

  • Brute-force password guessing means using a random approach by trying different passwords and hoping that one work some logic can be applied by trying passwords related to the person’s name, job title, hobbies or similar items.
  • In a dictionary attack, a dictionary of common passwords is used to attempt to gain access to a user’s computer and network. One approach is to copy an encrypted file that contains the passwords, apply the same encryption to a dictionary of commonly used passwords, and compare the results.

6. SQL injection attack

7. Cross-site scripting (XSS) attack

8. Eavesdropping attack

Eavesdropping can be passive or active:

  • Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
  • Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.

9. Birthday attack

10. Malware attack

Here are some of the most common types of malware:

  • Macro viruses
  • File infectors
  • System or boot-record infectors
  • Polymorphic viruses
  • Stealth viruses
  • Trojans
  • Logic bombs
  • Worms
  • Droppers
  • Ransomware
  • Adware
  • Spyware

--

--

Hackerslist.co

Hackerslist.co provide product specific experts to configure systems that reduce cyber threats.