Skip to main content

Things That Hackers Search For - 05

 For a moment, walk into the mind of criminal hackers. If you want to steal information or destroy The system, you know that you can get value from it.



1. Organizational design, filing, and registration

Malicious hackers usually perform online searches to find possible targets and are the best of them Candidates for attack are those organizations that provide detailed descriptions of devices Can access, including the type of software and hardware they install. Once the hacker knows Someone has access to possible vulnerabilities in the organization’s technical security, and they will get Thoughts about whom they should attack first.

Any hacker can obtain this very useful information through a simple online search. Through online mining, you can find all-SEC registrations, public tenders, publicly accessible documents, subscribers, etc. you can Even search for all the people involved in a particular organization, the time the website was published, and Webmasters are involved in creating network security for the organization. Having this knowledge can easily help The hacker is preparing for a large-scale online attack that may shut down the entire organization’s website and database.

2. Subscription and payment

Hackers are most likely to invade to make online payments or Buy. Because smartphones, emails, and online payment systems contain a lot of personal information Information, including credit cards and bank statements, hacking into these systems make it easy for everyone Criminal hackers realize identity theft.

3. Social media accounts

Although some people may say that a personal Facebook account may not have any value, it can Gaining access to social media accounts also enables hackers to access other personal details, such as Passwords, email, and mobile phone numbers.

4. Email

Email is the center of your personal information because it is the control point for all your information Password, online payment account, etc.

5. Password

Many attacks performed by hackers are aimed at predicting, snooping, or phishing to obtain user passwords. Once they Able to find a password, they are almost certain that the user can use them for different accounts Or use its variants for other logins.

6. Physical hardware

Information is most easily stolen when you can physically access devices such as smartphones or smartphones personal computers. You can use the registry, browser history or You can even save the password without using a code. At the same time, physical access to the device It also enables you to implant listening devices into their systems for phishing Additional information at any time in the future.

7. Target location

If the hacker has not found any loopholes in the system he wants to crack, then he will try to find is the location of the computer system. This will enable him to further study vulnerability through social interaction. Engineering, dumpster diving, and even gain physical access to target equipment.

Since all computers have a MAC address, and every device connected via the Internet has an IP Address, you can easily search every device in the world to find out its location. A sort of, On the other hand, the hacker knows how to hide his location so as not to be discovered when he launches An attack.




Comments