Posts

Showing posts from July, 2023

Password Hacking !!

  Password Cracking It is one of the most enjoyable hacks. The password cracking may not have a burning desire to hack the password of everyone. The actual password of the user is not stored in the well-designed password-based authentication system. Due to this, the hacker can easily access to user's account on the system. Types of Password Cracking ·        Non electronic: It doesn’t require technical knowledge. §   Social Engineering §   Shoulder Surfing §   Keyboard Sniffing §   Dumpster Diving ·        Active Online: An active attack is a network exploit in which a hacker attempts to make changes to data on the target. §   Dictionary attack §   Brute-Force attack §   Rule Based attack ·        Passive Online: A network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. ·  ...

All about Keyloggers!!

  A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Consider it as a threat because… Keyloggers are often used as a spyware tool by cybercriminals to steal personally identifiable information (PII), login credentials and sensitive enterprise data. Keylogger tools for windows ·        All in One ·        Elite ·        Spytector Keylogger tools for MacOS ·        sentryPC ·        FlexiSPY ·        REFOG Keylogger Keylogger tool for Linux - Logkeys Types of keyloggers 1.    Hardware Keylogger ·        It is a physical device that is used for capturing keystrokes ·        For hardware keylogger one must hav...

What is Steganography?

Image
It is the technique of hiding secret data within an ordinary, non-secret file or message in order to avoid detection; the secret data is then extracted at its destination. ·        Technical steganography ·        Linguistic steganography Types of steganography ·        Text : It includes hiding data within the text files ·        Image : It can hiding the information by taking the cover object as image is defined as image steganography. In image steganography, pixel intensities are used to conceal the data ·        Audio : Audio Steganography is the technology of embedding information in an audio channel ·        Video : In this method, video (set of pictures) can be used as carrier for hiding the information ·        Network Protocol : It includes hiding the info...