Hacking Techniques Which You Need To Know

Hacking is an illegal activity that is usually done by people who are less liable to get something from the intended victim information without the consent of the victim. Unless the White Hat Hackers who are paid to test and report on the vulnerability of a system.
If you are a beginner or want to be a hacker, should you need to understand the types of attacks Hacking is usually done by the penetration tester! The following 9 Hacking Techniques That Must You Go:
1. DNN (Dot Net Nuke)
DNN is a method that is also called Portal Hacking.
2. SQL Injection
The most common and most dangerous. This is a code injection technique that exploits a security vulnerability in computer software. Occurs at the level of database applications (such as queries).
3. JavaScript Injection
Javascript Injection is a facility that we can insert their own JavaScript code into the website, either by inserting a code into the address bar or by finding an XSS (Cross-Site Scripting) vulnerabilities in websites. Commonly used in spoofing as well.
4. Spoofing Attack
A spoofing attack is a situation where one person or program successfully masquerades as another by falsifying data and thereby gain an illegitimate advantage.
5. Phishing
Phishing is a way of trying to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
6. Cross-Site Scripting
Cross-site Scripting (XSS) is an attack technique that involves the attacker code to the user’s browser instance.
7. Man In The Middle Attack
It is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other through personal connections, when in fact the entire conversation is controlled by the attacker.
8. DNS Poisoning
It is a security or compromises the integrity of data in the Domain Name System (DNS). Compromise occurs when the data introduced into the database cache DNS name server that does not come from an authoritative source DNS.
9. DOS Attack
It is an attempt to make a computer resource unavailable to be accessed by other users.