Friday, 30 December 2011

Common techniques that describes "How Hackers Hack(Exploits) a website" ?.. .

Do you know How Hackers Hack(Exploits)a website?, see some interesting facts about hackers paranormal (Ghost) Activities. Hackers are with tons of mechanisms attack, they decide the one most appropriate to vulnerability. Its organized plan to exploit.

Hacking Web Sites includes the type of attacks given under:
Learn hosting server details and its operating system: The hacker first examines the details of the server, which he is going to hack, first most important is the operating system on it, and its type. By using port scan, detects all available ports to attack.
Analysis the website: The hacker analyses the website for possible loopholes which are possible to exploit. Loopholes are like online feedback or inquiry forms which generally uses GET and POST variables, can be easily used by hackers. He also checks authentication method used on web pages for any probability of accessing the web server. A good hacker will always walk through nearly every interactive part on a website to achieve right of entry to the server. The hacker also goes throughout the developed script to test for any development glitches which are easy to exploit.
Existence of input validation: It consists of the validation which is used by many websites to decide whether particular information is secure and validated. Unsafe info is discarded. Negligence in input validation is a major way in for hackers.
Build up the attack: After investigative the entire situation, from the server to the website, and separating all the loopholes, the hacker builds the attack.
Website hacking Tricks used by hackers
There are so many techniques of hacking used by hackers, following are couple of them explained in details.
SQL injection: The hacker executes on SQL queries to the database on the database server through Website. Either SQL commands are executed in the feedback, contact us form fields or queries are inserted into expected parameters.
Cross-site scripting: Inserting malicious info to dynamic pages. Websites with static pages can control user interface as they are read-only. With CSS vulnerability hacker can then transmit the user’s private data to another server.
Directory traversal attacks: the ../ (dot dot slash) attack.The Web site is controlled to allow right to use files on the server. For example, suppose the value includes the path of a specific file. Placing ../ at the start of the parameter value makes the application to right of entry in the parent directory. On a series of ../ gives the root directory can be entry.
Authentication attacks: The hacker looks for legitimate authentication for entry from a Web site to server.
Directory listing: examine the website’s complete directory arrangement; the hackers look for out hidden directories, which could have administrative information, finding valuable input for attacks.


  1. This comment has been removed by the author.

  2. i want to gtu(gujraat technological university) server and website hacking