16 types of Hacking Techniques Explained 2020

Bhat Aasim
2 min readDec 25, 2020

--

Hello Friends, Today I will tell you about various types of hacking techniques, and out of these, I will focus more on password hacking. There is no fixed classification of hacking, but I will tell you all the techniques that I remember. It is not possible to tell completely about all Hacking Techniques, so I will give you all the basic knowledge.

Hacking Technicques www.bhataasim.in

Common methods to hack Computer Terminals (Servers):

In this method, we either get control over the terminal (or server), to make it useless, or crash. These Hacking Techniques have been used for a long time, and are still used today:

1. Denial of Service (Dos Attack)

With a DoS attack, hackers can down the network without having internal access. DoS attacks control access routers and put bogus traffic on them (which can be e-mail or Transmission Control Protocol, TCP, packets).

2. Distributed DoSs

Distributed DoSs (DDoSs) are multiple DoS attacks made from multiple sources. It is very difficult to stop or block a DDoS attack, because multiple, changing, source IP addresses are used in it.

👉Don’t Miss: Top 5 Wireless Hacking Tools Mostly Used by Black Hat Hackers

3. Sniffing

Sniffing means interception / attack on TCP packets. This interception can be done with simple eavesdropping or some other sinister.

4. Spoofing

Spoofing means sending an illegitimate packet to a hacker that has an expected acknowledgment (ACK), and which the hacker can guess, predict, or obtain with the help of snooping.

5. SQL injection

SQL injection is a code injection Hacking Techniques that can control the security vulnerability of an application database layer. In this, normal SQL commands are used to access the database.

6. Viruses and Worms

Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Viruses and worms both try to shut down the network, which is done by bogus traffics.

👉Don’t Miss: Make Your Malicious Hacking Android App Be More Convincing Realistic.

7. Back Doors

Hackers can gain control over any network by accessing its back doors administrative shortcuts, configuration errors, deciphered passwords, and unsecured dial-ups. With the help of computerized searchers (bots) hackers can find the weakness of any network.

Isn’t it interesting? There is more to do now. So let’s now know how to hack email’s passwords:

want To Read More Then Visit Here 16 types of Hacking Techniques Explained 2020

--

--

Bhat Aasim
Bhat Aasim

Written by Bhat Aasim

0 Followers

I Love Technology

No responses yet