Podcast Transcript (Approaches of Attackers)
Season: 1
Episode: 2
Episode Title: Approaches of Attackers (Hackers)
Episode Description: Technical news, Tech Awareness, Tips & Tricks, Tools
Episode Link: https://spotifyanchor-web.app.link/e/gCs1IxGMywb
Let's start this episode with 2 quotes
“If you want to win a person think like him”
“If you want to be rich think like rich act like rich”
Like the quote says if you want to be safe and secure from attackers then you must know his approaches and technics to defect them so let's dig deep into it
First, an attacker sets his target (Machine, Mobile, Person) and collects data as possible their name, IP, favourite items, DOB, email etc. From the open source, dark web or physical approach and from the collected data he tries to create a connection between himself and the target by means of any medium.
Then he uses some of the various methods such as
- Phishing Attack
- Ransomware Attack
- Malware Advertising
- Clickjacking
- Software Vulnerability
Phishing Attack:
It’s the most common attack where the attacker sends the mail with malicious code/scripts to collect the data or establish the connection between the client and the attacker.
In order to overcome this we have to avoid clicking any links or downloading any files from unknown emails or messages from anyone.
Ransomware Attack:
It’s a common attack used by the attackers to block the data/site/applications by DOS (Denial of service) by some methods like brute force, encryption etc. and demand a ransom amount from them in order to recover the data or service.
This can be avoided by using the firewall or any anti-virus and secure login methods like 2-factor authentication
Malware Advertising:
Everyone has come across this type if we have searched for any items or mentioned any favourite items on social media pages we could see the advertisement every time we access the internet platform. Attackers use this method to redirect you to their malware site where they could collect information like login details etc.
We could avoid this attack by using private browsing and using temporary information by not providing any personal information on social media etc.
Clickjacking:
It is similar to all the above attack the attacker makes us perform some action such as clicking, downloading etc. when opening a web page the attacker makes an attractive advertisement with a fake buttons if you click the button it executes the script or code which is loaded in the background of the buttons and provides the information or make a connection as said before. So never click any image or download anything from an unknown source
Software Vulnerability:
This attack only happens when we use an untrusted application like gbwhatsapp, Mod application, Cracked applications etc. Or outdated application version may lead to the data leaving or backdoor entry point to the attackers
So whenever download an application from trusted platforms like Play store, App store, Microsoft store etc
Comments
Post a Comment