Facebook

banner image

THE BASIC TECHNIQUES OF THE HACKERS

PIRATTING A COMPUTER - THE BASIC TECHNIQUES OF THE HACKERS
How to Hack a Computer:
How to hack a computer or how to hack a PC,

questions that often come to mind we, computer enthusiasts ...

Before we begin, let's make things clear, this article will aim for

educations and will not incite you to any case to commit crimes / crimes, if we publish this article,

it's only for prevention purposes so you can be aware of the techniques

basic hackers and to guard against them.

There are several tools / flaws so that hackers come to their goal, we will

explain the most common techniques ...

Before you start reading the full article, be sure to read our articles:

Hack a Wifi connection
Hack a webcam
Hack an email address
Hacking a VPS server
To hack a Facebook account
Hacking an internet site
Hacking security cameras
Hacking a Windows session
And hack a cell phone.


Techniques using Hacking software:
Remote Access Trojan - Remote Administration Tool:

RAT'S (not rodents), RATs (Remote Access Trojans), are tools widely used by

newbies (beginners) who only seek to penetrate a few victims, thanks to its Administration Tool

remotely, it will create a file SERVER.exe that will send to its victim (which will be previously detected

by the basic anti-virus, we will come for the undetection thereafter ...).

Thanks to the control panel (Client.exe), it will be able to take control of the targeted computer, on which

the victim has launched the application (server.exe), it will install on his computer, adding a

registry key that will allow it to start each time the computer will be launched.

The Pirate will be able to have fun with his victim, recover his passwords, consult his webcam, listen

his microphone and many other functions ...

An example of a tool that allows this use, which basically was not planned for this (DarkComet):

Darkcomet RAT

Look at the screenshots we put on our DarkCometRAT page.

Malekal will explain in more detail how the Administration Tools works at Distances:

What is a RAT or TROJAN?
Keyloggers:

It's a bit like Remote Administration Tool, except this time to hack a

targeted computer, the hacker will, create through his client.exe or by hand, a logger of

strikes that it will later also send to the victim, it will launch the keylogger and it will be added

a key in the registry to start later.

See on Kaspersky's website the exact definition:

Keylogger or keylogger what is it?

Botnets (network of zombie computers):

A formidable army of zombie PCs, which will allow the hacker to hack a computer,

but not just one, hundreds, even thousands, once the computers are in control like a

Remote Administration Tool, (except that a botnet runs rather on a dedicated server), it can put

K.O a website or a target for a long time thanks to the DDOS / SYN attacks that he will launch

thanks to infected computers!

Definition of Botnet

Exploits / Security breaches:

Unfortunately, security flaws are found in some software or applications,

of type Backdoor for example, it will be able to allow the Hacker to inject a file, an .exe by

example to send his Remote Administration Tool and take control of the target later,

that's why you have to constantly update your Windows / OS,

as well as its software and applications.

What is an Exploit?

With these few basic techniques, you know how to make a hacker to hack a computer,

be sure to update your applications, operating system, do not search for software

cracked, very often it's the open door so you can even be a victim!

We strongly recommend that you read our article to protect yourself as much as posibble



Image result for hackers

please read over articals part












THE BASIC TECHNIQUES OF THE HACKERS THE BASIC TECHNIQUES OF THE HACKERS Reviewed by It will contain everything on September 20, 2019 Rating: 5

No comments:

Powered by Blogger.