How Computer Hacker Attack?
Computer Hacker: Obtain Access To gain access to the great system, the hacker has two approaches. The low tech method involves contacting employees to trick them into revealing their passwords. The hacker might call pretending to be part of the IT help staff, claiming that a security malfunction requires the employee to verify her password. A daring hacker might visit the offices in person to look for passwords employees have taped to their monitors. The second method is a brute force attack. The hacker used a hacking program to try to log onto the system with the usernames she’s acquired. When the system asks for a password, the program responds with a word from a list of likely passwords, such as opensesame or sexy. The program repeats the process until the list is exhausted, it chances upon the right password, or the host locks the user out for too many failed attempts. Computer Hacker: Escalate Privileges After the hacker has entered the system with user-level privileges, he looks