110 likes | 305 Views
Hacking techniques. by John Schmidt, BYU-I Linux/Unix Society June 19, 2008. Hacking accounts. Password guessing Phishing for account/password information Man-in-the middle Trojan horse/virus OS/Browser security vuneribility Malware/spyware. Social Engineering. Social networking sites
E N D
Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008
Hacking accounts • Password guessing • Phishing for account/password information • Man-in-the middle • Trojan horse/virus • OS/Browser security vuneribility • Malware/spyware
Social Engineering • Social networking sites • Sholder surfing • Piggybacking • Dumpster diving • E-mail/chat contact
Spoofing • Masquerading e-mail addresses • Fake identification credentials • Spoofing data source • DomainKeys "service@PayPal.com" <phurchase_goods@realtyagent.com>Yahoo! DomainKeys has confirmed that this message was sent by gmail.com.
Phishing • ''Fishing'' for private information • Fake websites • Malicious Javascript/PHP • E-mails from banks, IRS, eBay or PayPal asking for account information • ''Fly-by-night'' internet commerce • Pleas from Nigerian Princes
Prevention • Use very complex passwords and never divulge them to anyone. • Use unique passwords for unique accounts, and change them often. • Use Linux or Unix (more secure). • Keep computer up to date. • Scan computer for viruses and spyware/malware often. • Clear browser cache. • Utilize the phishing tools in browsers to avoid suspect websites. • Use common sense.