You are on page 1of 3

Cybercirme – such as hacking and identity theft

First we must know what is internet and how its work


For example we everyday enter web site with name
www.youtube.com(172.217.22.78)but do yo know how
we get information normal persons see this like a domain
but hackers see this like ip address all domain has ip
address
And when we enter website we are going to servers and
they say ip address, the name of this system dns (Domain
Name System) and it send Ip address of web site and
web site get packets and send it. Web site has two sides
First is programing using html css and etc. The second
one is for programing servers and using python and etc,
We have attack method with DDos (Distributed Denial of
Service attack) hackers get ip of web site and send them
all ot of packet. And server cant take it . Server normaly
can take million but no trillion. Server go down. And it
cant give your results. But you can say why it take
hackers questions but not my because normal persons
use Dns but they directly send packets to server. You
cant hack every web site with this method. Becouse
giants like Youtube have a lot of servers. The second
hacking method is Changing web site.For this they get
unauthorized access to server. They change domain, for
example: the web site loanding KapitalBank. But hackers
change dns and it loading hacker page which like original
and they get information about cards. For hacking card
you don’t nee be hacker in modern cards have NFC (Near
Field Communication) modul you can go to supermarket
and if you forget your password of card you cant shoping
to 50 manats and don’t enter password. But is very
dangerous because someone get techonolgy like in
supermarkets they can get 50 manats easly. And we see
in film the hackers hack security cameras how they do it
for these situation they use programs which detect all
user of internet in place and he/she found ip address of
camera. Easiest method of is trying local passwords some
times people don’t change local passwords it like admin
admin. If we go to camera shop they say if any one want
bruteforce camera it take 100 years it right but hackers
don’t need use bruteforce. They open ip address of
camera and add some code in code after this camera
things it get password and open access to camera.
Also we see in films they do blackout. How they are
doing this they are buying or making microscheme and
put this into enumerator. And when they want they turn
on microscheme and lights go out. But you will say we
see in films they open car locks how ? I will say easily
they are buying microscheme which can repeate same
signal, Or they are using method with name of long
hand. This method you can do with all cars but not
everytime. For this you must find car with owner owner
locking doors.And going to house. The first theft enable
device and going after owner. Second Theft is staying
with car and also enable device. The first device connect
to owner key after send signal to second device with 3G
He/she take signal and car opened for turn on the engine
they repeat procces and going to mechanic. Hacker use
imagination for hacking. Never listen to sellers.

You might also like