Different way of E-mail hacking:Tech Tricks - Kanjoos tech

Breaking

Kanjoos Tech provides unique tech information,DIY,Tech News & many more.Your one stop tech destination.

Tuesday 25 April 2017

Different way of E-mail hacking:Tech Tricks


Password cracking: The password cracking is done through different types of technique like dictionary effect, brute force, hashing etc. 




Dictionary Effect: It uses the file which contains words which are mostly used in the password or dictionary words. Then try each word to crack the password. thats why do not use easy guessable password, sequence of words or number, dictionary words like username123, 7643210, iloveyou, 11112222, abcd1234, similarity, business etc. So always use strong password of lower and capital letters, numbers and special character.

Brute force: In this technique, the all alpha numeric keys combination is used to crack the password. So if your password is strong then it takes long time to crack the password. Many secured websites, have a limited try like bank websites. So if you have strong password then there this technique is failed.So always recommended used strong password.

Guessing the security question:The security question is most important and useful if you forgot your account password. They help to recover your password. But they can be used in hack purpose. If you put the easy guessable answer and any people know you very well, they can guess your answer. Your account easily be hacked. So do not share security question with anyone and not enter easy answer which can be guessed easily by others like best friend, family, lovers, pet names etc.

Phishing: It is a technique of obtaining personal information, bank account detail, email id and password etc. in a deceptive way. The fake email is send to the recipient and looks like the email is legitimate. There is link in the email. When you click on link, then fake web page (bank account, personal details etc.) opened. When you enter the details (usernames, passwords, and credit card details etc.) then that detail is send to whoever sent an phished mail.

Social engineering: Attacker tried to gain the confidence of the victim then deceive him/her to reveal the information. This information is used for hacking purpose. For example, one day you receive a call from tech. expert that the company mail server is crashed and for restoring all your corporate server mails. You have to tell him your password. For gaining the confidence, he told your office details and you have read on the license agreement that we will never ask for it, but it was written by the legal department, they do not know that this situation is occurs lol. If you do not take any instant action, All your email is lost.

keylogger: key logger is a small program which is sent through email attachment. When you download and open the attachment then it is automatically installed in your computer. It takes the screen shot and records each keystrokes then these information is sent to whoever developed this program.

Spoofing: The spoofing refers to tracking or deceiving computer system and users. For example DNS (Domain Name System) Spoofing: DNS is responsible for resolving Internet names into their real IP addresses. When user request the URL then he/she redirects to bogus or fraud website. But in address bar of browser real address you type. So the DNS is spoofed or compromised.

Password stole: How many of users store the password in their browser? I think mostly all did. So it is extremely dangerous, there is many software or small program develop or created by hacker which is used to steal the saved password from the victim browser. These type of software or small program is may be installed through email, pasting the malicious script, non- trustable software, by USB device etc.Tabnabbing: It is latest phishing technique. How many of you open many tabs at same time? I think almost all did. You open a browser, login to your email. In the other tab, you open Facebook and start chatting after sometime you check your email again but the popup show please login to continue or the login page shown. You think that may be session is expired. Then you enter your login detail (to fake page) and continue. You do not even notice the URL of login fake page. When you enter the detail that detail goes to the hacker and you redirects the original link where you already login to your account. So when you login any account be careful and aware first saw the address bar. If you use Firefox then install no script add-ons that stop auto refreshing webpage and offers specific countermeasures against security exploits.

Stay Updated with Kanjoos Tech

Debi prasad ratha


No comments:

Post a Comment

Thanks!