Breaking

Wednesday, 28 June 2017

How Hackers Hack Your Passwords.



Hello Guys,

Today I’ll be emphasizing on some ways Hackers do get/hack your passwords. I Myself, am a Hacker, so I’ll be able to list on the ways we get passwords to things like your social media accounts which requires passwords and some specific personal information only you know.

A lot of you might have been victims of hackers who take over your Gmail, Facebook, and other social media/email accounts. Some of you guys might have lost or been defrauded of money to hackers, after they hacked and took charge of your credit card information. Now most information hackers get about your personal online activities is by hacking your passwords.

A way of keeping ahead of hackers is by you knowing how hackers get into your account, how they hack your passwords and all methods and softwares/applications they generally use. By knowing these, you will be in a better situation to know and understand the possible ways in which you can loose your accounts information and passwords. Then you can know how to protect yourself from getting hacked/getting hacked next time.


               
HOW HACKERS HACK/GET YOUR PASSWORDS

Hackers do use some common ways/techniques in getting your passwords. Now I’ll list and also explain some of these techniques.
Let’s get started…..

1. PHISHING: This simply means where by a hacker create and send a fake login page of Facebook or Gmail and it will look exactly same as the real Facebook/Gmail login page. When they send you the links to this Facebook or Gmail login page and then you input your details in it inorder to login as requested by the page, if you login, they immediately get your username and passwords to the Facebook or Gmail account depending on the type and purpose of the phishing page which they sent to you.
This is not meant to be joked with. I have done this a number of times so don’t think its all made up. Be careful with the types of links you enter.

2. SOCIAL ENGINEERING: This is the most popular method hackers use for getting passwords. It simply means to con people into divulging their passwords. For example a hacker will send you a message saying “Someone has posted a bad picture of yours on Facebook, click on this link to see your picture”, and then when you click on that link, it will take you to a login page and as soon as you enter your username and password, and  click on login, your password and username will be sent to the hacker. Hackers do also use sexual posts to lure victims into divulging their accounts. This sounds stupid, but it happens most times and even those who are most cautious of people easily fall as victims.

3. KEYLOGGERS: Keylogger is one of the basic tools used in getting/hacking your passwords. Keylogger stay in your system memory and runs at every startup. Keyloggers log every keystrokes you type. A log is the created and then sent to the hacker. The most famous keylogger is   the Ardamax Keylogger.
    This keylogger can be customized so it doesn’t show up in Windows “Processes” and notify the victim.

To avoid keyloggers, the best solution is using an Online Virtual Keyboard when typing passwords for sensitive sites like your Bank account/Paypal account.

 4. RAT: RAT stands for (Remote Administration Tool). With RAT, a hacker can connect to your PC without your knowledge. He can monitor and see what’s going on, on the screen, what you are currently doing with your PC, which sites you surf, e.t.c. This also has the built-in functionality of keyloggers.
   
   With RAT, a hacker can copy files from your hard disk to his computer, and all this are without your knowledge. A very good example of RAT is Poison Ivy. It can be customized to connect to your PC on a specific port number specified when creating the RAT.

 5. SHOULDER SURFING: This is the act of stealing glances by looking over someone’s shoulder to see what the person is typing. This is also known as virtual hacking, an effective low-tech password hack that can be done by anybody. Anyone who has an interest in your passwords has to look over your shoulder to be able to note down the passwords. This can happen at an ATM stand, an airport or at a cyber café. You should always protect yourself by glancing around to be sure no one is stealing glances at you before you key-in your password.

 6. TROJANS: Trojans are the most common types of malwares. Trojans spread through Warez SitesTorrent Sitesor by clicking on risky links. Everybody wants free softwares right?. Be careful though when you download from warez sites or torrent sites. Probably all softwares, keygens and patches could contain Trojans. This means that you will get softwares for free, but your computer will be infected by a Trojan.


Hackers hack people’s passwords for so many reasons. Most cyber criminals just do it for money, while others do it for just showing or testing their skills, or to use your Email/Gmail accounts to send spam links to your contacts list or use your social media to chat with your friends or send spam application links.

The major problem comes when a hacker gets hold of your private and sensitive data. Then blackmailing starts.


There are also many other ways in which a hacker uses to get your passwords. A very good example is if you’re connected to the internet on a LAN, which uses the same router, a hacker can use any packet sniffer and base decoder to read all sensitive data being transmitted from your computer.

Now for you to beat those hackers, you should always avoid public Wi-Fi hotspots for banking, emails e.t.c. Login using HTTPS websites as they encrypt the traffic between you and the server, leaving the sniffers toothless. Glance over your shoulders, use a hard password, use password management software to manage your passwords. These little tips should help you stay safe from hackers if you apply them carefully.


                 Was this helpful to you? Why not show appreciation by posting a nice comment.

                 Are u confused in some things you read in this post? Your questions are highly welcomed and you would be replied by the admin.


                                   THANKS…...

No comments:

Post a Comment