Many of you might have been victims of your email accounts being hacked, or your social media password not working. This maybe because your password might have been hacked by the Hackers.
One way to keep yourself secure by knowing how do hackers hack password and what all methods and software's they generally use. By knowing you will be in aware of the situation and understand what are the possible ways you can lose your account information and passwords.
Here are the some common technique which hackers uses to steal your passwords -
1. Well guess
More than 60% of people use the same username and password for all their accounts. Hackers run programs that enter stolen username and password details on tens of thousands of sites until one hits. Then they have access to your accounts and credentials. If you use the same username and password on all accounts, that can leave you extremely vulnerable.
2. Wi-Fi Traffic Monitoring Attacks
Have you ever connected to a public Wi-Fi and logged into any accounts? Then your password could've already been stolen. A common attack is Wi-Fi traffic monitoring, where a hacker uses a simple application that can easily be downloaded from the internet for free to watch all traffic on a public Wi-Fi network. Once you enter your username and password, the software notifies them and the hacker intercepts the information. It only takes a few more minutes to use a program like the one above to try other sites you may have used the same password and login combination on. Pretty soon, they've got access to a whole swath of your information and it's only a matter of time for them to get the rest.
Keylogger resides in your system memory and runs at every startup. These keyloggers log all the keystrokes you type. A log is created and then it is sent to the Hacker. Most famous keylogger is the Ardamax Keylogger. It can be customized so that it cannot be shown in Processes.
4. Tab Nabbing
Where a hacker will send a login page of Gmail or Facebook and it will look exactly the same as real Facebook login page. Most of the time they use Social engineering skills like, they will send message saying "This person has posted your bad picture on Facebook, click here to check your photo", and once you click on the link, you will be taken to login page, as soon as you enter your password, it will be sent to hacker, and your page will reload to take you to the real page. Most of the time, victim don't even realize his password is gone.
RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC, without your knowledge. He can see what is going on the screen, what you are currently doing, which sites you surf. It also has the built-in functionality of keylogger. Hacker can copy files from your Hard disk to his computer, and all this without your knowledge. A good example of RAT is Poison Ivy. It can be customized to connect to your PC on a particular port number specified while creating the RAT.
6. Trojan Horses
These are the most common type of malwares. Trojans spread through warez sites mostly. All of you want free softwares. Beware though! When you download from warez sites, all the keygens and patches and even the original trial programs are trojaned. This means you will get the software for free. But your computer will be affected with a trojan horse. When you run the patch/keygen, you'll get the desired output, but in background, your system gets infected with the trojan. Turkojan is a famous Trojan horse. A trojan is much more superior to keyloggers and RATs. It provides much more functions, so that a Hacker has more access to your PC.
7. Brute Force Attacks
Most passwords are simple and can be guessed within a specific number of tries. 123456 is still the most common password on the planet. We've all had the experience of forgetting what password we used on an account and trying all of the passwords we have been using in the last few years; you know that if you try enough of them, eventually one will be right. Hackers use tools that can crack your password by simply entering different passwords over and over until it's cracked; these tools can easily be downloaded for free. Within 24 hours, most passwords are cracked and the hacker has access