Sunday, August 18, 2013

Basics of Ethical h@cking | How to h@ck an email account

Basics of Ethical h@cking | How to h@ck an email account


Basics of Ethical hacking | How to hack an email account
Hey Readers ! In this post I am discussing the very basic ways about how to h@ck an email accounthow to h@ck hotmail password, gmail accounts, facebook accounts and Prevention against these attacks.
Many beginners ask me question how to hck facebook accounts orhow to hck hotmail password or that .
But before learning the actual procedure you should know about different types of attacks, their working and prevention against these h@cking attacks.

1) Phishing :
>The first and very basic way of h@cking an email account is Phishing. Phishing is basically creating fake web pages to steal victim’s important information like email,passwords,phone no,etc.
DRAWBACK :
>Users nowadays are aware of these type of attacks and one cant be easily tricked using this attack . You need some social engineering to trick someone.
Prevention :
>Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
>Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
Even if somehow you entered your credentials in a phisher, Immediately Change your password .
2) Keylogging :
>This is really good way of H@cking an Email account. In this type of attack H@cker simply sends an infected filehaving keylogger in it to victim. If the victim executes that file on his pc , whatever he types will be mailed/uploaded to H@cker’s server. The advantage of this attack is that the victim won’t know that H@cker is getting every Bit of data he is typing. Another big advantage is that H@cker will get passwords of all the accounts used on that PC.
DRAWBACK :
>Keyloggers are often detected by good antivirus. H@cker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
3) Trojans/backdoors :
>This is a advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server ie Trojan on the victim’s PC opens a backdoor and now the H@cker can do whatever he wants with the victim’s PC.
DRAWBACK : 
>Trojans are often detected by good antivirus . H@cker must find a way to save it from antivirus.
Prevention :
>Execute the file only if you trust the sender.
>Use good antivirus and update it regularly .
4)Session hijacking:-
>It consists of stealing session cookies. In this type of attack an attacker can steal victim ‘s session cookies and can login as the victim . Another way of stealing cookies is sniffing on the lan network using some softwares like Cain and able, wireshark ,etc.
DRAWBACK :
>If user is logged out then attacker is also logged out and the session is lost.
Prevention :
>Never open untrusted links.
Keep Visiting How to h@ck to learn more about how to h@ck an email account.
This post is for educational purpose only, do not use it for illegal h@cking an email account.

0 comments:

Post a Comment