The ways to compromise by hacker

Compromise: Three most common ways to compromise a device

Introduction

In this post, you will learn the three most common ways to compromise a device and also I will share the ways to compromise OS and web applications.

The three ways to compromise?

I have mentioned the three most common ways to compromise but this ideology will change according to the attack method. All these attacks are done by the red team. So, If you would like to be a pentester or hacker. Then you must read the post.

Here I would like to mention the core points to compromise one could customize according to needs!!!

The three ways to compromise devices
  1. Deploy the payloads
  2. Compromises the operations system
  3. Compromises the web-based system

Also Read: What is SQL attack

Deploy the payload – compromise

When I say to deploy the payload, which means the information of the target is already gathered. Once the information is gathered the attacker can do exploit using Nessus or Metasploit. As I said before which is best suited for the environment and the place one could go with that tool.

Anyone who could find vulnerability using Nikto, once the vulnerability is found should do deep research about the vulnerability in the NDV and also the CVE and even the DB-exploit.

Compromising the operating system – Deploy the payload – compromise

This is the second way of compromising, this method is very effective because we are compromising the os. This means the target full control will be in the attacker’s hand even the attacker could do a backdoor attack once successful succeed the OS.

There are three ways to compromises OS they are;

  1. Kon boot
  2. Hiren’s boot cd
  3. Linux live cd’s

Also Read: What is Hiren’s boot cd

Compromising web-based system

This section has fewer ways to compromise and the ways are too traditional and let me mention the four ways to compromise a web-based system. When I say web-based system it includes the cloud also.

  1. SQL injection
  2. Cross-site scripting
  3. DDoS attacks
  4. Broken Authentication

Conculusion

Finally, I have already written a blog post on the ways to compromise and I have provided the inbound link also just click and learn.


Also Read: What is on-boot?

Also Read: How does IoT involve in cyberattacks

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site

 

Scroll to Top