Attacking tools
There are several recurring tools of the trade used by computer criminals and security experts:
Trojan horse — These are programs designed so that they seem to do or be one thing, such as a legitimate software, but actually are or do another. They are not necessarily malicious programs. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. See also: Dialer.
Virus — A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see this article about computer viruses). Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
Worm — Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system and that it propagates itself through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.
Vulnerability scanner — A tool used to quickly check computers on a network for known weaknesses. Hackers also use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound.)
Sniffer — An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
Exploit — A prepared application that takes advantage of a known weakness.
Social engineering — Using manipulation skills in order to obtain some form of information. An example would be asking someone for their password or account possibly over a beer or by posing as someone else.
Root kit — A toolkit for hiding the fact that a computer's security has been compromised. Root kits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
2006-06-16 12:20:57
·
answer #1
·
answered by williegod 6
·
5⤊
0⤋
There are various ways you can possibly hack into someone system. It depends on how secure your system is. If your system provides remote access, a hacker can get into it. I'm not going to tell you to do it, but I would recommend that you make sure your system is locked down and you the network you are in is secured.
2006-06-16 19:22:21
·
answer #2
·
answered by Grasshopper 4
·
0⤊
0⤋
I'm no expert by any means, but I assume some "typical" ways are
-exploiting the fact that users will open anything so there's a virus or whatever attached to the email
-taking advantage of bugs in software, such as Windows, Outlook, etc. If there are security holes, they can use these to their advantage.
2006-06-16 19:17:26
·
answer #3
·
answered by Arbitrage 7
·
0⤊
0⤋
Read Williegod he has given you the best answer. To hack a computer they will use one of those ways. If you wanting to learn how to hack go to websites and start learning.
2006-06-16 20:59:56
·
answer #4
·
answered by dualmp 4
·
0⤊
0⤋
Hackers scan for ports or running services on a computer and if they find one, they can exploit it and get access to that computer.
2006-06-17 01:01:10
·
answer #5
·
answered by BKD 2
·
0⤊
0⤋
I don't know aether, but..... something has messed up my computer that I wish I knew how to get rid of. It's called 'Hot Bar' and it just showed up in my tool bars. I'm guessing it came out of an email that I opened that I shouldn't have, but how do you know?
2006-06-16 19:24:52
·
answer #6
·
answered by meimmoody 3
·
0⤊
0⤋
i have no idea but i too would like to know the answer to your question. was hacked a few weeks ago.
2006-06-16 19:17:01
·
answer #7
·
answered by mumtaz 6
·
0⤊
0⤋
Using spywares and viruses
2006-06-16 19:14:28
·
answer #8
·
answered by ♥Riley's Mom♥ 5
·
0⤊
0⤋