- Social Engineering.
- Exploiting the vulnerabilities in security.
- Keyloggers and browser monitoring.
Social Engineering
Social
engineering is a collection of techniques used to manipulate people into
performing action or divulging information. While similer to a confidence
tricks or simple fraude, the term typically applies to trickey for information
gathering or computer system access and in most cases the attacker never comes
face-to-face with the victim.
Social
engineering is considered a revolutionary art amoung the hacker community, it
has proven to be an intresting tool that can be exploited by anyone. All social
engineering attackes are based on flaws in human as congnitive biases.Some of
these attackes are :
- Pretexting.
- Phishing.
- IVR/Phone Phishing.
- Trojan horse.
- Road apple
Security Vulnerability
Vulnerabilities are seccurity flaws or holes through which
hackers can infiltrate.these holes can provide the hacker access to mailbox
even the permission of the user.sometimes the administrator is negligent in
patching the vulnerability in security. The hacker makes use of the
vulnerability at this point and steals confidential data without the consent of
the user.
Keyloggers
A keyloggers is a type os survellance software or spyware
that has the capability to record every keystroke you make to a log
file,usually encrypted. A keyllogers recoreder can record instant
messages,e-mail and any information you type at any time using your
keyboard.The log file created by the key loggers can then be sent specified
receiver.