Facebook
Name
Email
Phone
Message

Hacking 101: Understanding How Hackers Gain Access to Passwords

Hacking 101

In order to protect your identity it is important to first understand how a person can break into your computer and steal your files. Once you understand the common methods a hacker uses to acquire your password it is easier to protect yourself. A hacker has three common methods that they can use to hack a computer and find the password or account information.

  1. Brute Force or Dictionary Repetition Hacking
  2. Social Engineering or Phishing
  3. Administrator Back Door

Brute Force or Dictionary

When a hacker wants to find your password he uses brute force hacking methods. This method attacks a person’s computer using dictionary software that will recombine English dictionary words with thousands of different variables or combinations.

When the hacker runs the dictionary hacking program, it starts off with the letter “a” and varying different combinations. Afterwards, it moves to full words to try to break the password. The program is capable of making 50 different attempts to crack your password each minute. After several hours or days the program is finally able to crack your password.

Social Engineering or Phishing Attacks

Social engineering or phishing is today’s way of getting a person to divulge their password. A hacker will try to use different methods and personal contact to learn your password. Some hackers have gone as far as interviewing shoppers in front of markets. A person stands in front of a store and when shoppers leave tries to get them to take their survey.

Other ways a hacker can obtain your password is by phone. They will call your phone posing as a bank representative to verify your home phone number and account number. The third way is through emails, deception or masquerading as an authority. This involves luring their victims to a website that mirrors a legitimate website. There the unsuspected victim will enter their account number and user password.

Administrator Back Doors

The hacker gains access to a company’s network through an administrator account. Once inside the hacker has access to the company’s user accounts and passwords. Most operating systems have a hidden back door that only the network administrator knows about. However, today hackers have found a way to penetrate these hidden back doors. Once inside, they go to work and start harvesting the administrator’s accounts, user accounts, and client accounts. Furthermore, they retrieve all the passwords from the system.


In Conclusion

It is important to understand the methods a hacker uses to gain access to your computer, password, and important information. The more you understand about their methods the easier it will be to defend yourself. Therefore, you must pay attention to anyone calling you on the phone or asking you to take a survey. Furthermore, your password is your first line of defense against a hacker. That is why it is so important to create a secure password that is hard to break.


Image: pixabay.com

Recommended Posts | Network Management

Protecting Your Organization Using Cyber Security
1440

5 Steps for Protecting Your Organization Using Cyber Security

Massive attacks on companies such as, Yahoo, Target, Michaels had a significant impact on the IT security industry. Prior to these massive attacks and brand-crushing incidents, terms like 'data breach' and 'hackers' had not yet appeared in the mainstream media ...
Network Management with SNMP
1593

The Basics of Network Management with SNMP

SNMP is a popular protocol for the management of networks, used for gathering and configuring information from network devices, such as hubs, printers, servers, switches, and routers on an IP network, or any device which is network-capable. SNMP agents, managed devices and network management systems ...
IT Disaster Recovery Plan for Your Business
1134

Do You Need a IT Disaster Recovery Plan for Your Business?

Large to small-sized businesses use information technology. Employees rely on electronic mail, VOIP, and EDI to transmit orders, payments and data from one company to another. Your company’s many servers’ processes and stores large amounts of critical data needed to run your business daily ...
Faster WI-Fi Devices
2106

Faster WI-Fi Devices are Causing Network Problems

BYOD wireless devices are putting a strain on enterprises wireless networks. iPhone 6 and other devices are now enabled with 802.11ac WI-Fi standard. The new wireless mobile devices have three times faster speeds than previous generations. However, performance are draining wireless network bandwidth ...