Attacks on individual or corporate computer systems is done via the use of various techniques. It can be done through Denial of Service (DoS), smurfing and spoofing. The aim of the attackers is to harm your computer or interrupt the use of your computer. The most widely used method is called password cracking. When some cracks your passwords, they get unlimited access to the network.
Why Do Hackers Attack computers?
Attackers can be defined as those people who have malicious interest in other people’s networks or systems. Attackers have different motivations of attacking computers. Some of them do it due to curiosity. In this group, we have high school students who are after discovering how to use computer systems for their own benefits. The next one is to revenge. Some former employees who were laid off can attack a network to harm the company.
Cracking a password is not a hard job. No high technology tools are need to succeed in this cracking process. Some attackers do dumpster diving. This is a process of checking your garbage to find any information on your passwords.
Hackers have various techniques they use in order to gain control of your home computers. These are the methods I am going to focus on in this article.
The following tools are used to attack a system or network successfully.
We will start with the use of L0phtCrack. This is currently called LC4 method. The method gives the attacker permission to convert encrypted windows passwords and convert them into plain text. Normally these passwords are in symbols and cannot be read without the help of L0phtCrack and other softwares.
Use of Mobile Code
Hackers use packet sniffers to read information straight from information packets. These sniffers do that by moving over the network. Some of the common data they pick include passwords, your user names and other important information. Hackers then embark on an extensive attacks on systems across many networks. This is one of the favourite method used by intruders because no admin passwords are required to install this program in any computer.
People who use cable modem to access the internet are more exposed to packet sniffers because they use the same Local Area Network.
If the hacker installs the program on any one computer in the network, he/she can access any kind of data transmitted by all other computers connected to the network.
Using Trojan Horse Programs
This is a program which tricks you into installing unknown programs on your computer. Some people call it social engineering. The hackers can get access to the information on your computer without you knowing it. Once permission is granted to them, they can change the way your computer system works or just introduce a virus which can destroy your precious files.
Use of Remote Administration Programs
This is common on computers using windows. There are tools which facilitate intruders access to computers in a remote manner. These tools include: NetBus and SubSeven. These programs once installed in your computer, hackers can access your computer whenever they want.
Using Denial of Service Technique
This is a program which makes your computer to crash and hence make it impossible for you to use it. The common characteristic of this hack attack is that your computer becomes extremely busy processing data. The attackers can equally use your computer to attack other computers in the same manner.