Skip to main content

Basics of Ethical hacking | How to hack an email account

NETWORK TECH WORLD

 Basics of Ethical hacking | How to hack an email account

Hey Readers ! In this post I am discussing the very basic ways about how to hack an email account, how to hack hotmail password, gmail accounts, facebook accounts and Prevention against these attacks.
Many beginners ask me question how to hack facebook accounts or how to hack hotmail password or that .
But before learning the actual procedure you should know about different types of attacks, their working and prevention against these hacking attacks.

1) Phishing :
>The first and very basic way of hacking an email account is Phishing. Phishing is basically creating fake web pages to steal victim’s important information like email,passwords,phone no,etc.
DRAWBACK :
>Users nowadays are aware of these type of attacks and one cant be easily tricked using this attack . You need some social engineering to trick someone.
Prevention :
>Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
>Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
Even if somehow you entered your credentials in a phisher, Immediately Change your password .
2) Keylogging :
>This is really good way of Hacking an Email account. In this type of attack Hacker simply sends an infected file having keylogger in it to victim. If the victim executes that file on his pc , whatever he types will be mailed/uploaded to Hacker’s server. The advantage of this attack is that the victim won’t know that Hacker is getting every Bit of data he is typing. Another big advantage is that Hacker will get passwords of all the accounts used on that PC.
DRAWBACK :
>Keyloggers are often detected by good antivirus. Hacker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
3) Trojans/backdoors :
>This is a advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server ie Trojan on the victim’s PC opens a backdoor and now the Hacker can do whatever he wants with the victim’s PC.
DRAWBACK : 
>Trojans are often detected by good antivirus . Hacker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
4)Session hijacking:-
>It consists of stealing session cookies. In this type of attack an attacker can steal victim ‘s session cookies and can login as the victim . Another way of stealing cookies is sniffing on the lan network using some softwares like Cain and able, wireshark ,etc.
DRAWBACK :
>If user is logged out then attacker is also logged out and the session is lost.
Prevention :
>Never open untrusted links.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Google Tricks

AA few things you might want to try with Google: Hand type the following prefixes and note their utility: link:url Shows other pages with links to that url. related:url same as "what's related" on serps. site:domain restricts search results to the given domain. allinurl: shows only pages with all terms in the url. inurl: like allinurl, but only for the next query word. allintitle: shows only results with terms in title. intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page. cache:url will show the Google version of the passed url. info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box. spell: will spell check your query and search for it. stocks: will lookup the search query in a stock index. filetype: will ...

Network Protocols

NETWORK TECH WORLD A network protocol is a set of rules and standards that define how devices on a network should communicate with each other. Network protocols govern everything from the type of cable that is used to connect devices to the way in which data is transmitted between them. There are many different types of network protocols, each of which serves a specific purpose. Some common examples include: TCP (Transmission Control Protocol): This is a connection-oriented protocol that is responsible for breaking up data into packets, transmitting the packets over the network, and reassembling the packets at the destination. TCP is a reliable protocol that ensures that all packets are delivered to their destination. IP (Internet Protocol): This is a connectionless protocol that is responsible for routing packets between devices on a network. IP is an unreliable protocol that does not guarantee that packets will be delivered to their destination. HTTP (Hypertext Transfer Protocol): Th...