Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:
1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.
Most trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete control over target computer.
Netbus, Girlfriend, sub7, Beast, Back Orifice are some of the popular trojans.
2) Keylogger :- Keyloggers are the tools which enable attacker to record all the keystrokes made by victim and send it's logs secretly to the attackers e-mail address which is previously set by attacker.
Almost all the Trojans have keylogging function.
Use of latest updated antirus-firewall, detect the presence of trojan and remove it permanently.
3) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting network problems.
The Ethernet based sniffer works with network interface card (NIC) to capture interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.
Privacy Attacks By Hackers
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment