1 00:00:00,150 --> 00:00:05,940 In this video, we're going to go over the common methods of hacking, so what are some of the most 2 00:00:05,940 --> 00:00:13,770 common methods that hackers are going to be using to take over information to gain access to networks? 3 00:00:14,280 --> 00:00:20,070 What are the different techniques that they use and essentially how they work so that you can become 4 00:00:20,070 --> 00:00:24,420 aware as to what you're going to be going up against, essentially. 5 00:00:24,750 --> 00:00:26,580 So let's go right ahead and jump in here. 6 00:00:27,000 --> 00:00:33,480 Some of the common methods of hacking here we have as a virus or Trojan, and this is essentially a 7 00:00:33,480 --> 00:00:36,290 virus within something that you download or install. 8 00:00:36,600 --> 00:00:42,960 I don't know if you've ever gone to any type of website that you perhaps had some kind of add on there 9 00:00:42,990 --> 00:00:45,210 or had, let's say, like on Yahoo! 10 00:00:45,210 --> 00:00:51,630 Dot com, they have a lot of those different ads within the actual news section and you click on them 11 00:00:51,810 --> 00:00:57,300 and a lot of them say, like, hey, you've won ten thousand dollars or you've won a prize or whatever. 12 00:00:57,300 --> 00:00:58,020 That may be. 13 00:00:58,320 --> 00:01:05,490 A lot of times if you click on those, they're actually unfortunately have some sort of malware or virus 14 00:01:05,490 --> 00:01:05,910 on there. 15 00:01:06,240 --> 00:01:10,800 And when you click it, you run the risk of actually clicking on there. 16 00:01:10,800 --> 00:01:15,480 And then it takes you to another screen and it says, hey, your system has been infected. 17 00:01:15,690 --> 00:01:22,530 You need to download this software, you need to buy X, Y, Z software, or else your system will be 18 00:01:22,530 --> 00:01:23,480 compromised, whatever. 19 00:01:23,640 --> 00:01:30,630 It's essentially where you have a virus type of company out there that is telling you that you have 20 00:01:30,660 --> 00:01:36,350 been compromised and you need to pay this money to download the software to actually take off the virus. 21 00:01:36,360 --> 00:01:40,440 But in reality, all they're trying to do is take your money and then phishing here. 22 00:01:40,440 --> 00:01:45,870 This is where websites are replicated to enter login information and password. 23 00:01:45,870 --> 00:01:46,100 Right. 24 00:01:46,110 --> 00:01:53,550 This is where information is actually gained to be able to take away access to different websites, 25 00:01:53,550 --> 00:01:54,810 different login areas. 26 00:01:55,260 --> 00:01:57,890 And then the next one here is eavesdropping. 27 00:01:58,200 --> 00:02:03,350 This is where a lot of times, you know, a lot of people think about the government and, you know, 28 00:02:03,360 --> 00:02:06,180 what they're supposedly are doing, I don't know. 29 00:02:06,180 --> 00:02:06,540 Right. 30 00:02:06,700 --> 00:02:09,540 I don't have the actual information precisely. 31 00:02:09,540 --> 00:02:14,760 But a lot of people say or think that they are being watched by Big Brother or whatever. 32 00:02:14,760 --> 00:02:15,780 That may be wrong. 33 00:02:16,140 --> 00:02:22,620 But there's a lot of hackers out there that are actually, you know, have the ability to monitor you 34 00:02:22,620 --> 00:02:27,750 without you knowing through video, audio, whatever that may be, through your specific device. 35 00:02:28,260 --> 00:02:35,910 And then fake WAPT, this is where you have fake wi fi and essentially get you to sign up to a network 36 00:02:35,910 --> 00:02:41,670 and get access to your data because it looks like you're signing on to a network. 37 00:02:41,670 --> 00:02:46,070 But in reality, it's a fake network, they're fake wi fi. 38 00:02:46,080 --> 00:02:50,730 And once you sign up, they're getting access to your data and then we have water hole attacks. 39 00:02:50,910 --> 00:02:53,550 And so this is more on location specific. 40 00:02:53,970 --> 00:02:56,190 And then we have the denial of service. 41 00:02:56,460 --> 00:03:00,000 This is where we're flooding traffic to crash a specific site. 42 00:03:00,270 --> 00:03:07,170 Let's say that you have like a WordPress website and for most WordPress websites, they have like the 43 00:03:07,170 --> 00:03:15,060 actual website dotcom, and then they have forgood WP and then Dash or Hyphen Admon. 44 00:03:15,060 --> 00:03:16,830 Right, WPE hyphen admin. 45 00:03:16,830 --> 00:03:23,430 And any time you go to the euro for that particular website that's hosted with WordPress, you're going 46 00:03:23,430 --> 00:03:25,950 to get to a login portal, right. 47 00:03:25,950 --> 00:03:26,730 Login page. 48 00:03:26,730 --> 00:03:35,250 And so what people can do is flood a bunch of traffic to crash your site so that you cannot get access 49 00:03:35,250 --> 00:03:37,110 to your website and actually log in. 50 00:03:37,500 --> 00:03:39,540 And then we have the key logger here. 51 00:03:39,540 --> 00:03:41,940 This is malware that tracks your keypad. 52 00:03:42,120 --> 00:03:48,870 What they can do with this is essentially install it and be able to track what you're pressing on your 53 00:03:49,050 --> 00:03:52,410 actual phone or your computer, your device. 54 00:03:52,710 --> 00:04:00,450 And let's say for if you're logging into a website, they can track what actual keypad numbers you're 55 00:04:00,450 --> 00:04:02,160 using, which, you know, letters. 56 00:04:02,160 --> 00:04:07,830 And so they can use that to gain privately secured information and then social engineering. 57 00:04:08,310 --> 00:04:16,860 And this is the psychological manipulation of people into performing various acts or divulging confidential 58 00:04:16,860 --> 00:04:17,550 information. 59 00:04:18,120 --> 00:04:25,800 Now, a good example of this one here is just think about when or if you've received a text message 60 00:04:25,800 --> 00:04:30,510 from somebody saying, hey, free ticket to a vacation or whatever, that may be. 61 00:04:30,510 --> 00:04:30,750 Right. 62 00:04:30,750 --> 00:04:35,220 You get a random text out of nowhere saying you've won a prize, you've won something. 63 00:04:35,550 --> 00:04:42,450 And then in return, they ask you, hey, all you need to do is give us your name, email and birthdate 64 00:04:42,450 --> 00:04:43,050 or whatever. 65 00:04:43,050 --> 00:04:43,410 Right. 66 00:04:43,770 --> 00:04:51,090 And then those individual hackers now have access to your information and they can use that to gain 67 00:04:51,090 --> 00:04:53,640 access to your phone, to your devices. 68 00:04:53,640 --> 00:04:53,830 Right. 69 00:04:53,850 --> 00:04:59,940 And so this is used a lot of times where people are just they're not. 70 00:04:59,990 --> 00:05:05,720 Thinking that people who are out there that are malicious and have malicious intent, unfortunately, 71 00:05:05,720 --> 00:05:12,950 that's where a lot of people get taken advantage of because they don't really think the worst or they 72 00:05:13,160 --> 00:05:17,640 think that it's just somebody, you know, reaching out to them that is actually letting them know that 73 00:05:17,640 --> 00:05:18,530 they've won something. 74 00:05:18,530 --> 00:05:18,740 Right. 75 00:05:18,760 --> 00:05:21,090 So this is a big factor here. 76 00:05:21,110 --> 00:05:24,060 This is how a lot of people get taken advantage of. 77 00:05:24,530 --> 00:05:31,130 And one of the biggest problems we have with malicious intent and hackers with this here, the social 78 00:05:31,130 --> 00:05:37,010 engineering taking advantage of people's natural inclination to be curious. 79 00:05:37,430 --> 00:05:42,980 And another simple example of this is if you're getting phone calls from like a government or a business, 80 00:05:42,980 --> 00:05:48,320 them acting like they're actually the government or a business when they're really not trying to get 81 00:05:48,320 --> 00:05:53,660 access to your information and then bait and switch, this is where you have fake ads that take you 82 00:05:53,660 --> 00:05:59,780 to a page with the virus, just like I was mentioning earlier as well, where, you know, you have 83 00:05:59,780 --> 00:06:06,380 some sort of Web page that you visit and it has an ad on there and it says you've won a trip to whatever 84 00:06:06,380 --> 00:06:12,920 or you've won a gift card for a thousand dollars or whatever, and then you click on it and boom, you 85 00:06:12,920 --> 00:06:16,490 go to a page that has some sort of virus on there, unfortunately. 86 00:06:17,270 --> 00:06:19,190 And then you have cookie theft here. 87 00:06:19,760 --> 00:06:24,370 This is where hackers will take cookies off your computer to act like it's you. 88 00:06:24,380 --> 00:06:30,920 Now, one of the biggest examples of this is where a lot of people, a lot of hackers, I would say 89 00:06:30,950 --> 00:06:39,380 that use this will typically do it in a malicious manner where they are taking over people's cookies 90 00:06:39,800 --> 00:06:45,170 because they're trying to get commission sales from a specific vendor. 91 00:06:45,200 --> 00:06:48,650 So, for example, with Amazon, Amazon has cookies. 92 00:06:48,950 --> 00:06:54,140 If you sign up for them as an affiliate, let's say you have some sort of blog out there or somebody 93 00:06:54,140 --> 00:06:57,260 has a blog or a website where they promote Amazon products. 94 00:06:57,260 --> 00:06:57,550 Right. 95 00:06:58,070 --> 00:07:00,410 And so somebody lands on the website there. 96 00:07:00,710 --> 00:07:04,250 They click on the Amazon product, they go to Amazon.com. 97 00:07:04,550 --> 00:07:07,550 They then get a cookie on their computer. 98 00:07:07,550 --> 00:07:07,900 Right. 99 00:07:08,030 --> 00:07:11,830 With Amazon's cookie there for, I think, 30 days. 100 00:07:11,840 --> 00:07:18,830 And so what people will do as far as these hackers is they'll steal those cookies and they'll move them 101 00:07:18,830 --> 00:07:22,480 over to their own Amazon affiliate account. 102 00:07:22,910 --> 00:07:29,960 And so now the original individual, that customer to Amazon, is no longer getting their commission 103 00:07:29,960 --> 00:07:33,820 because their cookies have been stolen by these hackers. 104 00:07:33,830 --> 00:07:40,010 And so now the hackers are getting the commissions instead of the actual initial Web page or website 105 00:07:40,010 --> 00:07:43,800 blog that actually brought the customer to Amazon. 106 00:07:43,850 --> 00:07:48,650 And so these are the most common methods of hacking that's going to be here for this one. 107 00:07:48,650 --> 00:07:49,940 And we'll see you on the next one.