(8)
Malware
A key logger or screen scraper can be installed by
malware software program which records everything you type or take screen shots
during a login process and then forwards a copy of the file to hacker.
(9)
Offline
Cracking
Its hack through third party application which is
provide access to system servers and those all-important user password hash
files. The password cracker identify the hash-algorithm that was used to hash
the password without alerting the target system or individual user.
(10)
Shoulder
Surfing
Shoulder surfing is using direct observation
techniques, such as looking over someone’s shoulder, to get information.
Shoulder surfing is an effective way to get
information in crowded places because it’s relatively easy to stand next to
someone and watch as they fill out a form, enter a PIN number at an ATM machine
or use a calling card at a public pay
phone.
If you like this post, kindly share your valuable comments