Online Test Result

oDesk Certified Windows XP Expert oDesk Certified Firewall Concepts Expert oDesk Certified MS Word 2003 Expert

Exploit Attacks

This is another form of hacking. Mostly use for to hack a website or victim PC without send them any file. You can hack the victim PC without Knowing them. For exploit attack techniques many software are available. It basically regularly send the packets to the victim PC to establish a strong connection that is needed to access his/her PC. You can also say that you use SQL injection type thing. Take a look of the picture in which a exploit attacker used:






You see that in the window the Hacked PC is shown. You can also say this type of attacks is DDoser attacks.
It is like IP Booting. when regularly boot is send to Victim PC then its server slow down and it will be hacked by the Hacker. This type of Hacking also dangerous by using some techniques and tips you can save your PC from Exploit Attack. Some software like BT on linux is OS type. 

Newer Post Older Post

Leave a Reply

Related Posts Plugin for WordPress, Blogger...

Comments

Eagle Eye Productions. Powered by Blogger.