In this post, I’ll explain 5 most common hacking techniques that are being used by the cybercriminal. using a simple hack, a hacker can gain an unauthorized access to your sensitive information like user id and passwords which may be harmful to you. So my purpose for writing this post is to keep my visitors aware of being a Victim of these types of attacks. So some of the most common methods of attacks are listed below.

1. Phishing

Its one of the most common attacking method that attackers use. Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link. Combined with social engineering, it becomes one of the most commonly used and deadliest attack vectors.

Once the victim tries to login or enters some data, the hacker gets that private information of the target victim using the trojan running on the fake site. Phishing via iCloud and Gmail account was the attack route taken by hackers who targeted the “Fappening” leak, which involved numerous Hollywood female celebrities.

Also read: Hack Facebook account using Phishing attack

2. Keylogger

Its a type of attack in which Every keystroke made by the Victim is captured by the attacker. This keystroke may be user id or password of the Victim. In some cases, this attack may be very harmful because once the attacker has captured your user id or password, then they misuse of that.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards. So, whenever you’re operating a computer in public setting, try to take extra caution.

Also read: Create WiFi jammer in Kali Linux

3. Denial of Service (DoS/DDoS)

A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real-time and finally crashes down. This popular technique, the attacker floods the targeted machine with tons of requests to overwhelm the resources, which, in turn, restrict the actual requests from being fulfilled.

4. Virus, Trojan, Malware etc.

Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker. They can also lock your files, serve fraud advertisement, divert traffic, sniff your data, or spread on all the computer connected to your network.

Also Read: Free SSL certificate for your Website

5. Session Hijacking or Cookie sniffing

It’s also one of the most Dangerous attacks in which attacker can sniff your cookies or hijack the session. by Hijacking your session, the attacker can log in to your account without having the credential. It’s a method by which to gain unauthorized access to information or services in a computer system.


Rajesh Ranjan

I'm a tech enthusiast currently pursuing B.Tech in Computer Science & Engineering. trying to make things as simple as possible


Leave a Reply