(4)
Guess
It methods involves guessing. Passwords such as computer, password, admin etc…. are
commonly used or set as default passwords. If they have not been changed or if
the user is careless when selecting passwords, then can be easily crack that
password.
(5)
Spidering
Many corporate passwords that contains their company
information. This information can be found in company website, social media
such as Facebook, twitter, etc…. Its gathers information from these sources to come up
with word lists. The word list is then used to perform dictionary and brute
force attacks
The bellow the table describe that gathering words
list
Gather Information
|
Meaning
|
1966
|
Founder birth year
|
Raghuvaran
|
Founder Name
|
Mega
|
Company first name
|
Cricket, chess & football
|
Founder happies
|
Ragu357
|
Fonder first name and 10th marks
|
Ragu19661601
|
Founder first name and birth date
|
(6)
Phishing
There’s an easy way to hack: ask the user for his or
her password. A phishing email leads the unsuspecting reader to a faked online
banking, payment or other site in order to login and put some terrible problem
with their security.
If we login that fake site, the hacker easy to get our
login information.
(7)
Social
Engineering
A favorite of the social engineer is to telephone an
office posing as an IT security tech guy and simply ask for the network
password
Another telephone a banking posing as bank manager and
that guy say you got million dollar prize, then simply ask your debit card pin
or account information.
If you like this post, Kindly share your valuable comments
No comments:
Post a Comment