How to hack a network password and how to prevent it.
How to hack a network password and how to prevent it.
The content of the article, taking into account the law on the protection of information rights, in no way encourages the reader to use the methods discussed to hack someone else's page and is of an informative, warning nature.
Hacking a network password
The victims of password hackers are owners of pages in social networks, owners of e-mail, ICQ, etc. That is, almost everyone can unwittingly «share» their personal information if someone uses a program for hacking a network password. Of course, these are not the most dangerous crimes in the field of information security, unlike the theft of secret company information. To obtain a secret combination that leaves the password for your page, several basic methods are used:
— selecting a special program for hacking;
— creating a phantom site similar to a social network;
— creation of special malware (for example, some types of Trojan programs) in order to obtain confidential information.
These are universal hacking methods that are used to obtain passwords both in social networks and in the mailbox. As for social networks, — the threat to the security of your information in the vast majority of cases comes from a user who is your friend or good acquaintance. Often, friends are trusted with password information, which can then fall into the hands of an intruder. Unfortunately, hacking a network passwordcarried out by «good friends» themselves, as sad statistics say. A common method of hacking a password in a social network is based on the use of a «cookie» file. To do this, you only need to take advantage of the temporary absence of a potential victim who has recklessly left their page open on the network. Then the attacker goes to the cookies, opens the file with the details in the social network and saves it to his storage device.
Hackers often use such a method as creating a copy of a page of a particular social network. Well-known computer attacks are used. In this case, by clicking on a false link, the victim actually gives his password, entering it during authorization. In addition, the Internet is replete with Trojan programs that are easily downloaded by intruders. For example, the Trojan pinch program, which allows you to obtain information about the user's password after he «falls» for an infected program. Before downloading the Trojan program, you must first disable the antivirus installed on your computer.
Hacking an account password
There are also a large number of programs with which it is possible to hacking an account password of the Windows operating system. This may be a completely legal operation to restore forgotten and lost passwords, but it is this loophole that is tempting for an intruder. The process of hacking an account passwordoccurs by loading from a special media. Of course, it is necessary that the computer has a CD or FDD drive, the ability to boot from external devices. Another hacking method, for which, for example, the SAMInside program is used, requires access to the running system to extract the necessary data from the system files, then, for some time, decryption of passwords is carried out. There are also many other programs for similar purposes: Admin Password Hack based on the Linux operating system. After loading, for further questions it is enough to press the Enter key. Account names in Russian are displayed as encoded information. After selecting an account, you can set a new password or reset the existing one by specifying the symbol «*» instead of the password.
Hacking a mailbox password
Very often, the owners of an electronic mailbox themselves reveal the secret of their passwords, this happens simply and trivially: to hack a mailbox passwordthe user is sent a letter asking to provide a password for sending some important information to him, as a rule, this happens after registration and a simple visit to some unfamiliar site. There can be only one piece of advice here: do not trust your password or login to the pseudo-administration of some resource where you are registered. And do not follow active links in the letter if you do not trust its sender. When hacking a mailbox password, special programs are also used, which include password brute-forcers. This program operates by trying a dictionary and attempting to authorize on the mail server.
The program tries all possible combinations until the correct password is found. True, this can take a lot of time. At present, it is advisable to use such programs if part of the password is already known, since most protections prevent the brute-forcer from acting.