Top:

Security Hacking Techniques


These are only a few of the methods which are/can be used to break down secure systems:

  1. Accidental: Due to an unpredictable software bug which causes a security hole and/or possibly leaks out confidential information.

  2. Perpetraited: A pre-planned attack using a security hole or certain technique to gain unauthorized access.

    • Passive Attack: Gaining unauthorized access without altering the system status. (Only monitoring.)

    • Active Attack: Purposefully modifying certain system parameters to gain unauthorized access.

  3. Transmitted: Retrieving transmitted information via an unauthorized user.

  4. Analysis: Data Cryptanalysis, Data Decryption

  5. IP Spoofing: Posing false identity as an authorized user to gain unauthorized access.

  6. Packet Replay: Replaying a valid entry method by a valid user for unauthorized access.

  7. Data Modification: Modifying or changing data/packet information without detection.

  8. DOS (Denial of Service): Temporarily stopping one or more services to interrupt communications.

  9. Exploit Weakness: Purposefully attach devices at their weak points or via security holes to gain unauthorized access.

(Here too... the list just goes on and on, but the above are the more common techniques used!)


Key to the Security Mystery Top