Skip to main content

Basics of Ethical hacking | How to hack an email account

NETWORK TECH WORLD

 Basics of Ethical hacking | How to hack an email account

Hey Readers ! In this post I am discussing the very basic ways about how to hack an email account, how to hack hotmail password, gmail accounts, facebook accounts and Prevention against these attacks.
Many beginners ask me question how to hack facebook accounts or how to hack hotmail password or that .
But before learning the actual procedure you should know about different types of attacks, their working and prevention against these hacking attacks.

1) Phishing :
>The first and very basic way of hacking an email account is Phishing. Phishing is basically creating fake web pages to steal victim’s important information like email,passwords,phone no,etc.
DRAWBACK :
>Users nowadays are aware of these type of attacks and one cant be easily tricked using this attack . You need some social engineering to trick someone.
Prevention :
>Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
>Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
Even if somehow you entered your credentials in a phisher, Immediately Change your password .
2) Keylogging :
>This is really good way of Hacking an Email account. In this type of attack Hacker simply sends an infected file having keylogger in it to victim. If the victim executes that file on his pc , whatever he types will be mailed/uploaded to Hacker’s server. The advantage of this attack is that the victim won’t know that Hacker is getting every Bit of data he is typing. Another big advantage is that Hacker will get passwords of all the accounts used on that PC.
DRAWBACK :
>Keyloggers are often detected by good antivirus. Hacker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
3) Trojans/backdoors :
>This is a advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server ie Trojan on the victim’s PC opens a backdoor and now the Hacker can do whatever he wants with the victim’s PC.
DRAWBACK : 
>Trojans are often detected by good antivirus . Hacker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
4)Session hijacking:-
>It consists of stealing session cookies. In this type of attack an attacker can steal victim ‘s session cookies and can login as the victim . Another way of stealing cookies is sniffing on the lan network using some softwares like Cain and able, wireshark ,etc.
DRAWBACK :
>If user is logged out then attacker is also logged out and the session is lost.
Prevention :
>Never open untrusted links.

Comments

Popular posts from this blog

Removing Norton Anti-virus 2004, How to remove the Registry Enteries

NETWORK TECH WORLD  Found this on the Norton Web site. I finally got fed up with Norton 2004 AV and switched to Avast. Had lots of problems removing Norton, lots of stuff left over in the registry. After a few Google searches, I found this. http://service1.symantec.com/SUPPORT/nav.nsf/docid/2004020909040706?Open&src=&docid=2001092114452606&nsf=nav.nsf&view=df0a595864594c86852567ac0063608c&dtype=&prod=&ver=&osv=&osv_lvl= FYI, this is from the Symantec.com Site, so I am guessing it is nice and safe If you scroll down to the "Removal instructions" the first option is "To remove Norton AntiVirus from the registry" Click on the Plus sign and you can down load the removal tool (it is a .reg file that removes all the keys for Norton.) Direct Link for the file: ftp://ftp.symantec.com/misc/consumer/nav/nav2004xp_reg_removal.reg After I got done, Avast started working right and my system seemed to be running alot...

An Introduction into TeleScan

NETWORK TECH WORLD  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  %%%                                                  %%%              tm %%%  %%%   %%%%%%% %%%%%%% %%%           %%%%%  %%%%%      %%%      %%%%%%    %%%  %%%                   %%%          %%%    %%%   %      %%%    %%%  %%%   %%%  %%%     %%%   %%%%%%% %%%     %%%   %%%%  %%%       %%% %%%   %%%  %%%   %%%  %%%     %%%   %%%     %%%             %%% %%%   %  %%%   %%% ...

Ten Keyboard Shortcuts Everyone Should Know

NETWORK TECH WORLD  Ten Keyboard Shortcuts Everyone Should Know Using keyboard shortcuts is the easiest way to save you time and effort when you need to access commonly used symbols or processes. Indeed, navigating through shortcuts will keep your internet browsing fast and sharp. You can use shortcuts to inserts symbols instead of spending hours searching the internet for them and subsequently continuously copying and pasting them throughout your work. Some of the most used symbols in business are available in a three key combo. Pressing and holding Ctrl and Alt  and adding a letter to the combination will serve up the symbol. If you add C, you’ll deliver a ©. R, returns ®. T displays ™.  E shows € and the L creates a numbered list 1) 2). Lost Symbols © Ctrl Alt C ® Ctrl Alt R ™ Ctrl Alt T € Ctrl Alt E 3) Ctrl Alt L There’s a great little time saver if you’re working on many documents, across different programs at the same time. Ins...