For the past few days, I have been talking about hacking. Now, this article will provide you information about the types of hacking. But before that, it is important for you to learn what hacking means. Instances that is associated with the word “hacking” must have left you pretty bad impression about it. But As I explained it in my first article about hacking, your impression about hacking might have changed. Hacking is a hobby or a profession of working with computers. It can also be associated with breaking into computers, and/or gaining access to computers, websites, or systems. I have already discussed the types of hackers in my previous articles, now we’ll go on to the types of hacking. There are actually six types of hacking: website hacking, e-mail hacking, network hacking, password hacking,online banking hacking, and computer hacking.
Website Hacking
Website hacking is a way to break or circumvent into the password protected sections of a website. There are two types of website hacking:
- Break the password protected sections.
- You can deform or modify a website.
In website hacking, the hacker collapses the information, and makes changes in the infomation. E-mail Hacking All email communications on the internet are possible by two protocols: 1. SMTP port-25 (simple Mail Transfer Protocol) 2. POP port-110 (Post Office Protocol) E-mail tracing is the path that is taken by an email while travelling from the sender to the receiver. It is further explained in the diagram below:
The most effective way in tracing an email is to analyze its email headers. Just view the full header of a received email. A typical email header looks like this:
From Barr Thu Jan 3 05:33:26 2008
X-Apparently-To: prasannasherekar@yahoo.co.in via 203.104.16.34; Thu, 03 Jan 2008 05:25:38 +0530
X-YahooFilteredBulk: 189.160.34.89
X-Originating-IP: [189.160.34.89]
Return-Path: <atiles@destatis.de>
Authentication-Results: mta113.mail.in.yahoo.com from=destatis.de; domainkeys=neutral (no sig)
Received: from 189.160.34.89 (HELO dsl-189-160-34-89.prod-infinitum.com.mx) (189.160.34.89) by mta113.mail.in.yahoo.com with SMTP; Thu, 03 Jan 2008 05:25:38 +0530
Received: from dvapa ([141.203.33.92]) by dsl-189-160-34-89.prod-infinitum.com.mx with Microsoft SMTPSVC(6.0.3790.0); Wed, 2 Jan 2008 18:03:26 -0600
Message-ID: <477C264E.3000604@destatis.de>
Date: Wed, 2 Jan 2008 18:03:26 -0600
From: “Barr” <atiles@destatis.de> Add to Address Book
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: prasannasherekar@yahoo.co.in
Subject: angel rubberneck
Content-Type: multipart/related; boundary=”————030604060204000701040304″
Content-Length: 16433
The email header above gives us the following information about its origin and path:
The sender’s email address: atiles@destatis.de
The source IP address: 141.203.33.92
The source mail server: dsl-189-160-34-89.prod-infinitum.com.mx
The email client: Thunderbird 2.0.0.6
The source IP address: 141.203.33.92
The source mail server: dsl-189-160-34-89.prod-infinitum.com.mx
The email client: Thunderbird 2.0.0.6
Network Hacking
Network hacking means gathering information about the domain by using tools like Ping, Netstat, Telnet, Tracert, etc.
Ping is a part if Internet Control Message Protocol (ICMP) which is used to troubleshoot TCP/IP networks. Basically, it is just a command that allows you to check if the host is alive or not. Here’s how to ping a particular host: Go to the command prompt. You can just click start > run > then type cmd
For Further Reading,
0 comments:
Post a Comment
Your comments Will Be now Do-follow.
Comment Here.