World Hacker

World Hacker
Hack part 5



what is Zero-day attack ?


what was Zero-day attack?


One of the most common terms you will hear, a zero-day attack or zero-day exploit is simply the use of a previously undiscovered flaw in an application.


One of the most common terms you will hear, zero-day attack or zero-day exploit is simply the use of a flaw that has not previously been found in the app.


or operating system that can be exploited to gain access to or control system resources.


operating systems that can be exploited to gain access to or control system resources.


The term zero-day references to the fact that it is the day on which the attack or exploit was first identified.


The term zero-day refers to the fact that it is the day on which an attack or exploit is first identified.


_________________________


What is DNS hijacking


What is DNS hijacking?


DNS hijacking is a process in which an individual redirects queries to a domain name server (DNS).


DNS hijacking is the process by which an individual redirects a query to a domain name server (DNS).


It may be accommodated through the use of malicious software or unauthorized modification of a server.


This can be done through the use of malicious software or unauthorized server modifications.


Once the individual has control of the DNS, they can direct others who access it to a web page that looks the same, but contains extra content such as advertisements.


Once individuals have control over DNS, they can direct others who access it to web pages that look the same, but contain additional content such as ads.


They may also direct users to pages containing malware or a third-party search engine.


They can also redirect users to pages that contain malware or third-party search engines.


_________________________


What is ISP hijacking ?


What is ISP hijacking?


DNS hijacking is also done by some Internet service providers, such as Comcast, so that they can link users to their own search pages,


DNS hijacking is also carried out by some Internet service providers, such as Comcast, so that they can link users to their own search pages,


when they visit a web page that no longer exists.


when they visit a webpage that no longer exists.


Many claim this is to improve the users experience; however, this can also be another great source of extra revenue since they control the site and get paid off any advertising clicks.


Many claim this is to improve the user experience; however, it can also be a source of additional revenue as they control the site and get paid from every click of an ad.


Currently, there are no laws against an ISP doing this to its users.


Currently, there is no law prohibiting ISPs from doing this to their users.


_________________________


What is Packet injection


Packet injection (also known as forging packets or spoofing packets) is a computer networking term that references to the process of interfering with an established network connection,


Injection packets (also known as forging packets or spoofing packets) are computer networking terms that refer to the process of interfering with an established network connection,


by means of constructing packets to appear as if they are part of the normal communication stream.


by building packages to appear as if they are part of a normal flow of communication.


The packet injection process allows an unknown third party to disrupt or intercept packets from the concerned parties that are communicating, which can lead to degradation or blockage of users' ability to utilise certain network services or protocols.


The packet injection process allows an unknown third party to interrupt or intercept packets from the consenting parties communicating, which can lead to degradation or blockage of the user's ability to utilize certain network services


Packet injection is commonly used in man-in-the-middle attacks and denial-of-service attacks.


Package injection is commonly used in man-in-the-middle attacks and denial-of-service attacks.


_________________________


What is Clickjacking Attacks


What is Clickjacking


Clickjacking, also called a UI Redress Attack, is when a hacker uses multiple opaque layers to trick a user into clicking the top layer without them knowing.


Clickjacking, also called UI Redress Attack, is when a hacker uses multiple opaque layers to trick users into clicking on the top layer without them noticing.


This the attacker is “hijacking” clicks that are not meant for the actual page, but for a page where the attacker wants you to be.


So an attacker is "piracy" a click that is not meant for the actual page, but for the page where the attacker wants you to be.


For example, using a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password for their bank account, but are actually typing into an invisible frame controlled by the attacker.


For example, using a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe that they are typing the password for their bank account, but it actually types into an invisible frame controlled by the attacker.


_________________________


What is DNS Cache Poisoning ?


What is DNS Cache Poisoning?


DNS Cache Poisoning involves old cache data that you might think you no longer have on your computer, but is actually “toxic”.


DNS Cache poisoning involves old cache data that you might think is no longer on your computer, but is actually "toxic".


Also known as DNS spoofing, hackers can identify vulnerabilities in a domain name system, which allows them to convert traffic from legit servers to a fake website and/or server.


Also known as DNS Spoofing, hackers can identify vulnerabilities in the domain name system, allowing them to redirect traffic from legitimate servers to fake websites and/or servers.


This form of attack can spread and replicate itself from one DNS server to another DNS, “poisoning” everything in it’s path.


This form of attack can spread and replicate itself from one DNS server to another, "poisoning" everything in its path.


In fact, in 2010, a DNS poisoning attack completely compromised the Great Firewall of China (GFC) temporarily and censored certain content in the United States until the problem was fixed.


In fact, in 2010, DNS poisoning attacks completely compromised the Great Firewall of China (GFC) temporarily and censored certain content in the United States until the problem was resolved.


_________________________


16 May 2020


~Take note of some unknown terms ,make sure understand the meaning of his~