Basically, there are 2 kinds of hacks:
Exploit hacks:
hacking something by exploiting its vulnerability.
By sending high loads to an un-coded site for example to see if it crashes it and so on
Social hacks:
hacking an online account or something like that via Facebook for example.
Social Hacking is mostly done by sending ‘friend’ requests or by phishing emails to get the login credentials that permit entrance to the system or account.
Hackers don’t need any special knowledge.
They are just constantly looking for available computer vulnerabilities.
The first step to hacker attack is finding and understanding all open ports present on the system.
They can do that by installing intruder software and simply sniffing data on the wire.
The attacker can find and exploit the known weaknesses of applications.
That’s why all developers must use secure coding practices and security scanners.
Since the application is most important, it should be considered first by all organizations to improve or to enhance the security of their computer.
In order to hack a computer, you need to know some of the basics about it. Obviously, computers don’t come equipped with a manual or a guide. Here are some tips:
Get a list of cookies.
List of cookies that the site uses. Each type of site bank has its own list of cookies. For example, the most popular site banks recognize the following list of cookies:
• Google Analytics Cookies
• Google (DoubleClick) Cookies
• Yahoo! (Adserver) Cookies
• Adobe (E-tag) Cookies
• Common Domain Cookies
• Flash Cookies
• Silverlight (ASLS) Cookies
• Java Applet Cookies