SlideShare a Scribd company logo
Common Hacking Tactics
Types Of Tactics
Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a
network for known weaknesses. Hackers also commonly use port
scanners. These check to see which ports on a specified computer are
"open" or available to access the computer, and sometimes will detect
what program or service is listening on that port, and its version
number.
Spoofing attack (Phishing)
A spoofing attack involves one program, system, or website
successfully masquerading as another by falsifying data and thereby
being treated as a trusted system by a user or another program. The
purpose of this is usually to fool programs, systems, or users into
revealing confidential information, such as user names and passwords,
to the attacker.
 
Password cracking
Password cracking is the process of recovering passwords from
data that has been stored in or transmitted by a computer
system. A common approach is to repeatedly try guesses for the
password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can
be used to capture passwords and other data in transit over the
network.
Social engineering
A common practice for hackers who use this technique, is to contact
the system administrator and play the role of a user who cannot get
access to his or her system. Hackers who use this technique have to be
quite savvy and choose the words they use carefully, in order to trick
the system administrator into giving them information.
Key loggers
A key logger is a tool designed to record ('log') every keystroke on an
affected machine for later retrieval. Its purpose is usually to allow the
user of this tool to gain access to confidential information typed on the
affected machine, such as a user's password or other private data.
Trojan horses
A Trojan horse is a program which seems to be doing one thing,
but is actually doing another. A trojan horse can be used to set
up a back door in a computer system such that the intruder can
gain access later
Viruses
A virus is a self-replicating program that spreads by inserting
copies of itself into other executable code or documents.
Therefore, a computer virus behaves in a way similar to
a biological virus, which spreads by inserting itself into living
cells.
Password cracking
Password cracking is the process of recovering passwords from
data that has been stored in or transmitted by a computer
system. A common approach is to repeatedly try guesses for the
password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can
be used to capture passwords and other data in transit over the
network.

More Related Content

DOCX
Final report ethical hacking
PPTX
Introduction Ethical hacking by eslam hussein
PPTX
Hacking ppt
PPTX
Computer Hacking by Rudy
PPTX
Hacking and Anti Hacking
PPT
basic knowhow hacking
PPTX
hacking and its types
PPTX
Black hat hackers
Final report ethical hacking
Introduction Ethical hacking by eslam hussein
Hacking ppt
Computer Hacking by Rudy
Hacking and Anti Hacking
basic knowhow hacking
hacking and its types
Black hat hackers

What's hot (20)

PPTX
Ethical Hacking
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPT
Hackers
DOCX
Final report ethical hacking
PPTX
Hacking ppt
PPTX
ethical hacking
DOCX
Ethical Hacking
PDF
Report on Hacking
PPTX
Windows Hacking
PPTX
hacking presentation slide
PPTX
PPTX
Types of Hacker
PPT
Ethical Hacking and Network Security
PPTX
Ethical hacking - Good Aspect of Hacking
PPT
Introduction To Ethical Hacking
PPT
TYPES OF HACKING
PPT
Ethical hacking
PPTX
Ethical hacking ppt
PPTX
Ethical Hacking - Explained
PPTX
Cybercrime (Computer Hacking)
Ethical Hacking
Basic of Ethical Hacking and Penetration Testing - 1st Module
Hackers
Final report ethical hacking
Hacking ppt
ethical hacking
Ethical Hacking
Report on Hacking
Windows Hacking
hacking presentation slide
Types of Hacker
Ethical Hacking and Network Security
Ethical hacking - Good Aspect of Hacking
Introduction To Ethical Hacking
TYPES OF HACKING
Ethical hacking
Ethical hacking ppt
Ethical Hacking - Explained
Cybercrime (Computer Hacking)

Viewers also liked (15)

PDF
ethical-hacking-guide
PDF
Malicious software
PPT
the best hacking ppt
PPT
The Trojan Horse (Computing)
PPT
Lecture 12 malicious software
PDF
Ch 3: Network and Computer Attacks
PPT
Computer Virus
PPTX
Sniffer ppt
PPTX
Network scanning
PPT
Port scanning
PPT
Trojan Horse Presentation
PPT
E commerce security
PDF
Viruses
PPTX
virus powerpoint
PPTX
Ethical hacking presentation
ethical-hacking-guide
Malicious software
the best hacking ppt
The Trojan Horse (Computing)
Lecture 12 malicious software
Ch 3: Network and Computer Attacks
Computer Virus
Sniffer ppt
Network scanning
Port scanning
Trojan Horse Presentation
E commerce security
Viruses
virus powerpoint
Ethical hacking presentation

Similar to Common hacking tactics (20)

PPTX
Basics of hacking
PPTX
Protection from hacking attacks
PPT
Ethical Hacking
PPT
Cyber security and detailed informat.ppt
PPTX
Dhams hacking
PPTX
hacking basics
PPTX
Ethical hacking ppt
PPT
Types of attack -Part3 (Malware Part -2)
PPTX
Introduction to Ethical Hacking (Basics)
PPTX
Internet security powerpoint
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
PPT
Hacking
PDF
Chapter 2 konsep dasar keamanan
PPTX
Internet security powerpoint
PPTX
Learn Hacking With Gflixacademy
PPTX
Ppt on cyber security
PDF
Network security
PPTX
GE9a- Living in the IT Era: Internet Threats.pptx
PPT
Complete notes security
Basics of hacking
Protection from hacking attacks
Ethical Hacking
Cyber security and detailed informat.ppt
Dhams hacking
hacking basics
Ethical hacking ppt
Types of attack -Part3 (Malware Part -2)
Introduction to Ethical Hacking (Basics)
Internet security powerpoint
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
Hacking
Chapter 2 konsep dasar keamanan
Internet security powerpoint
Learn Hacking With Gflixacademy
Ppt on cyber security
Network security
GE9a- Living in the IT Era: Internet Threats.pptx
Complete notes security

Common hacking tactics

  • 3. Vulnerability scanner A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. Spoofing attack (Phishing) A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.  
  • 4. Password cracking Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
  • 5. Social engineering A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. Key loggers A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data.
  • 6. Trojan horses A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later Viruses A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
  • 7. Password cracking Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.