Hello Dear Readers. Wellcome back . Friends aaj mai aap ko Hacking ki kuch Best techniques ke bare me btaunga . Friends maine aapko pichhli post me btaya tha Hacking kya hoti or Hackers kya hote hai? Agar aap ne meri pichhli post ko nhi pdha hai , to use jarur padhe . What is Hacking aap iss link par bhi click karke padh sakte hai. Hacking ek realty ban chuki hai. hme isse bachhna bhi chaheye.
To chaliye suru karte hai. Sbhi techniqus ko explain karte hai.
To chaliye suru karte hai. Sbhi techniqus ko explain karte hai.
Best Hacking techniques
- Footprinting:- Friends Footprinting ka relationship Hacking se hai. Kya hota hai isme ? jaise man lijiye jo Hacker hote hai. Website hack karte hai, System hack karte hai , Network hack karte hai . ye jo chize hack karte hai. ye puri planning hoti hai. matlb in chizo ko hack karne se pehle ek radneeti bnayi jati hai, ki kaise kiya jayega , ki kya kiya jayega? Even ye log group bnakr bhi Hack karte hai. Jaise koi system hai , uska control ek se jyada jgah me hai. matlb ek desh me hai or dusre desh me bhi hai. To ye hackers do desh se milkar bhi karte hai. Isme puri Research ki jati hai. ki jisko hum hack kar rhe hai , Wo kon log hai , kya wo koi Government Organisation kyuki kisi Government Organisation ko hack karna or kisi Private company ko hack karna dono bahut badi cheze hai. To iske liye puri Information Gather ki jati hai. Wo party kon hai? , Kyu Hum hack kar rhe hai. iski kya wjah ho sakti hai. uski system ki kya weakness hai . Iski puri list bnayi jati hai. To ye sb achanak se nhi hota hai. Agar koi bade attack ko anjam dena hota hackers ko to wo sabse pehle planning karte hai. Uss planning ko Information Gathering kehte hai. Iss techniq me jaise Website ka owner kon hai, Ye Domain kab liya gya tha . ye kis server par hosted hai. ye kiske name par liya gya tha. ye sari chizo ko gather karna he Footprinting kehlata hai.
- Phishing Attack:- Dosto ye Phising attack kya hota hai? Phishing attack me jo bhi person aap ko hack karna chahta hai ya jo bhi Hacker hai, Jani mani Website ki clone bnata hai. jaise man lijiye Facebook ek website hai. Jaha par aap apna username , password dalte hai, login karte hai.to Hacker kya karta hai , Waisa he same page bnata hai. matlb ki Facebook ki tarah he dikhne wala ek nakli page bnata hai. Jaise man lijiye facebook hai to wo apne page ka name rakh dega Fakebook. wo page ab aapko bhejega , aapko kisi tarah fasayega . wo ye bhi bol sakta hai apna facebook account ko update karo . bs aap uske fake page par jaise he login karenge waise he aapka username , password Hacker ke email par pahuch jayega. ye jo techniq hai jo Hacking ki suruwat karte hai wo log use karte hai. or ye illegal hai. Isse bachne ke liye aap kisi bhi aise website par na jaye jo aapki personal information mang rhi ho. aap sabse pehle apne address bar ko check kare kahi aisa to nhi facebook.com ki jgah fakebook likha ho . Dosto yahi hai Phishing attack. I hope aapke smajh me gya hoga.
- Brute Force Attack:- Frnds Ab bat karta hu Brute Force attack ke bare me . Brute Force Attack , Password crack karne ki ek Hacking techniq hai. Iss techniq me Bahut sare password cobination lgatar try kiye jate hai. Jaise koi Hacker hota hai wo bahut sare password try karta hai. har ek second par ek password try karta hai aur Aise he written trail method se ek password aisa bhi hota jo uska password hota hai. wo password match kar jata hai aur website crack ho jati hai. Iss techniq ko use karne ke liye Programs hote hai. Isme jo bahut sare password ki list bnayi jati hai use Word List kehte hai. Brute Force attack lagbhag Discenery Attack se same hota hai. Discenery attack me wahi word use kiye jate hai Discenery me milte hai. Lekin Brute Force Attack me Number, Symbol, Letter sb mix karke try kiye jate hai.
- SQL Injection:- Friends Sql Injection ka relation Website hacking se hai. SQL injection website hack karne ki ek techniq hai. Friends aapko malum hoga Kisi bhi Website ke 2 Part hote hai. ek HTML file hoti hai . jaha par aap coding karke bnate hai wo server me store hoti hai , Dusra part Database ka hota hai jaha par website ka database table ke forms me store hota hai. Jo hacker hote hai wo Database ko target karte hai. kyuki database me puri website ka Administration ka password hota hai. Hacker jis website ko hack karna chahta hai , wo sabse pehle check karta hai . website ke database me kahi koi loop hole hai, mai aapko basic he btane ka pras karunga. Hacker itne expert hote Agar website me koi bugs milta hai , to hacker aisi query dalte hai. aur username , Password wali table ko drop kar lete hai. website ko koi nuksan nhi huwa. kisi bhi website ko hack karne ke liye Username aur Password kafi hota hai.
- DDOS Attack:- DOS attack ka pura name Denial of Service hota hai. Isme kya hota hai? Jaise koi Service Provider hai. jo logo le liye Website bnata hai. wo un logo ke liye hai chahe wo online Shopping ho , Chahe wo bank ki website ho. Chahe wo aur kisi service ki ho, to wo unke users ke liye banti hai. Lekin iss attack me jo hacker hota hai , wo kya karta hai , Uss resources ko jis resource se wo Website bani hai. matlb jiss Server par website bani hai usko plugh kar deta hai Fack IP se . Mtlab ek server par kuch limits hoti hai , ki usme itne second me itne visiter aa sakte hai. Itne user usko surf kar sakte hai .Har Website ki Bandwith hoti hai. ki isme kitne users aa sakte hai . Kyuki wo user data lete hai. To data lene ki ya recive karne ki Server ki kuch limit hoti hai. Jo Hacker hote hai, wo iska fayda udhate hai, aur jo Fack users bnaye jate hai. wo real user nhi hote hai, wo Machine ke bane botnets hote hai. Unhi Fake users ki alag alag IP set ki jati hai. Fir wo attck karte hai un server ke website pr , Man lijiye ek website par 200 log 1 second me visit kar sakte hai, to Hacker 300 Ip bnakaer Us website par visit karwyega. to usse Hacker ko koi Fayda nhi hoga , Bs server down ho jayega . DOS Attack ki khas bat ye hai ki Isme keval ek he IP se Bahut sari request bheji jati hai. Aaj kal ke computer me DOS attack na ke brabar hota hai , kyuki Aaj kal ke computer me itni Security hoti ki agar kisi IP se kafi requset aarhi hai to Server Us IP ko block kar deta hai. Friends ab bat karte hai DDOS attack ke bare me . DDOs attack ka full name Distributic Denail Of Service hota hai. Iska bhi Kam Same DOS attack ki tarah hota hai , Bs Fark itna hota hai. DDOS attack ko perfom karne ke liye , Sabse pehle 1000, 10000 computer me Rat install karwaya jata hai. Jisse Un computer ko remote kiya ja sake . Uske bad un sbhi computer se se Jis bhi website par attack karna hai , us par wo 1000 Computer Requset karenge. wo bhi 1 second me . to kya hota itni request ek sath dekh kar Server Held Ho jata hai. Ya kam karna chod deta hai. aur Hacker , Server data ko chori kar leta hai. Iss attack ki khas bat ye hai. ki ye 1 second me Number of request bhejta hai. I hope aap ke smajh me agya hoga. agar fir bhi koi question hai to aap comment kar sakte hai.
- Social Engineering:- Frinds ab hum bat karte Social Engineering ke bare me , to dosto maine issi post par sabse pehle topic Phishing Attack ke bare me btaya hai. Phishing Attack social engineering ka ek Part hai. Social Engineering kai chezo se juda jo normly False hota hai. Koi bhi galat jariye se kisi user ko fasana aisi cheze Social Engineering me aati hai. Yaha par insani dimak par sb khela jata hai. Agar koi user aapke jal me fas gya , or koi cheze enter kar raha hai. to usko ye nhi malum hona chaheye ki wo kuch galat kar raha hai. Usko ye lagna cheheye ki wo normal chiz kar raha hai, wo apni Information kahi na kahi Hacker ko Provide kar raha hai. wo apni Information de raha hoga ya to jis organization me work karta hai. Kyuki yaha bat koi particular account ki nhi ho rhi hai. koi Organization bhi ho sakti hai.
- Keylogger:- Keylogger ek aise software hota hai, jo ki aapke key stroks ko udhati hai. Mtlab aap agar koi keyword type kar rhe hai. to keylogger kya kar raha hota hai, jo bhi pad rhi hoti keylogger uska sara record bnata hai ek text file ke andar, after some time agar aapne set kiya hai 1 month to wo automatic wo usko kisi Email par sms kr raha hota hai. kuck keylogger aise bhi hote hai , Agar aap apne computer par baithe hai to wo aapki image ko bhi le sakta hai. aap apne computer par kya kar rhe in sari chizo ka screen shot leta rehta hai. Agar aap kabhi koi crack software download karte hai to Keylogger unke sath bhi chala aata hai. Iss liye aap kabhi bhi crack software ko download na kare.
No comments:
Post a Comment