sábado, 3 de septiembre de 2016

they used the hackers to steal passwords




they used the hackers to steal passwords


http://www.equilibriomovil.ga/In recent years, cybersecurity threats have multiplied and have become more sophisticated also. Behind the ransomware, Trojan horses and other types of malware there are organized criminal groups, often engineers and qualified technical personnel, looking for any vulnerability to economic benefit. Among all the factors that we must bear in mind to protect us, the password is the most relevant.


If you are a user of an application of banking online or if you have an account in Gmail, Yahoo, Facebook, or Twitter, you are a target for cybercriminals. Decrypt the password is the fastest way to get money from the victim or to hijack the computer and ask for a ransom. Know how is steal the passwords is important for be prevented and react in time before an attack.

Brute force


The brute force attack consists in trying to decipher a password by repeating, i.e., based on trial and error. The hackers tested combinations randomly combining names, letters and numbers, until dan with the correct pattern. Numbers, dates of birth, names of pets and names of actors and actresses are the most used by users passwords. Put is so difficult to those offenders with key alphanumeric of several digits.


Dictionary of hacking

This method could also be considered a brute force attack, but in this case, a software is responsible for automatically decrypt the password. It begins with lyrics simple such as "a", "AA" or "AAA" and it will progressively testing with more complex words. Such programs can be made up to 50 adventures by minutes in some cases and, according to a report, more than 50% of the stolen passwords were obtained


Spoofing identity or phishing


Phishing has become one of the tools most commonly used by hackers to steal user names and passwords. It consists of deceiving the victim so that it fills out a false form with your login credentials. For example, cyber crooks launch a clone of the homepage of a banking service online and the user, deceived, enter your user name and password without imagining that it is being observed. Phishing is the most effective method for confidential information related to credit cards.
http://www.equilibriomovil.ga/




The Spidering or spider web is a bot that automatically inspects web pages. One of its most common uses is to make a copy of all the sites to create systems of searches faster. This tool is also used by hackers, but the victims of this modus operandi tend to be large companies.

Methods to steal passwords
Keylogger attack


This procedure is similar to phishing or spoofing and, as a general rule, start with a malware infection. The victim download a malware on your computer when you click on a link or an email attachment. Once installed keylogger, this software records all activity on the Internet and sends this information (credentials included) to the servers of cybercriminals.


Rainbow table


This method requires a deep knowledge of computers and code. Rainbow is referred to a set of tables for calculating values hash where the keys are hidden. To access these tables allows hackers to reverse the hash function to decrypt the password in plain text. In other words, the Rainbow table allow to obtain the credentials of the victim in much less time than, for example, a brute force attack. The disadvantage is that it requires a lot of storage space, although this problem is usually not any obstacle for cybercriminals.

0 comentarios:

Publicar un comentario