System Hacking and Sniffing
System Hacking and Sniffing
in Ethical Hacking?
System hacking is the process of exploiting vulnerabilities in
electronic systems for the purpose of gaining unauthorized access
to those systems. Hackers use a variety of techniques and methods
to access electronic systems, including phishing, social engineering,
and password guessing.
Steps:
1. Reconnaissance: The first step in this type of Hacking is collecting information
regarding the System’s infrastructure, working, system’s network. This step is
very important as after this step the Hacker knows what attack to perform and
how to gain access without leaving a trace.
2. Scanning: This step involves scanning the target System, which includes:
3. Gaining Access: This is the phase in which the hacker breaks into the system
and gains unauthorized access to the System/Network and then elevates his
privileges to that of Administrator or SuperUser so he can play with the System
files that a normal/Guest user is unable to access.
4. Maintaining the Access: After the Hacker enters the System he tries to
maintain the connection with it in the background until he accomplishes the goal
with which he entered it.
SQL Injection
SQL injection is a technique used to extract user data by injecting
web page inputs as statements through SQL commands. Basically,
malicious users can use these instructions to manipulate the
application’s web server.
Sniffing
What Is Sniffing?
In the above figure, it can be seen that attack captures the victim’s
session ID to gain access to the server by using some packet
sniffers
Cross Site Scripting(XSS Attack)
Attacker can also capture victim’s Session ID using XSS attack by
using javascript. If an attacker sends a crafted link to the victim
with the malicious JavaScript, when the victim clicks on the link, the
JavaScript will run and complete the instructions made by the
attacker.