Hello dear friends, I hope you are well. In this article, I would like to introduce you to the various methods that hackers use to hack websites. I hope you enjoy it.

Do you use the Internet? Suppose you use it, you must have encountered news such as theft of information by hackers and disruption of services and websites. Here are some website hacking techniques that hackers often use.

1 - Social Engineering ( Phishing, Baiting )
Phishing is a method in which an attacker fakes the original website and then leads the victim to use this fake website. After the victim enters the site, he enters his credentials such as username and password on this fake site, all the details are sent to the attacker. This method can be used to obtain payment information such as credit card or personal information such as login information to important accounts and websites.

Another type of social engineering is the "bait and switch" attack. In this way, attackers buy advertising sites on reputable and popular websites and offer seemingly legitimate ads. After launching the ads, users just click on it to enter a website that is full of malware. This malware is installed on the victim system and then the attacker gains access to the victim system.

2- Denial of Service (DDoS) Attacks
Distributed Denial of Service (DDoS) attacks are mainly used to disable websites by attacking their servers. With the help of zombie or botnet systems, attackers infect the servers of the desired website with many requests. These requests will take the servers out of service and you will no longer be able to view the website. In several cases, the attack was also used to steal user information by blocking user forms. The DDoS attack on GitHub in 2020 is a great example of the severity of these attacks.

3- Code injection attacks
Code injection is a general term used for attacks that involve injecting malicious code into websites and systems. Whenever the website input data is inappropriate and the input is not filtered by the site, it becomes vulnerable to code injection attacks.

These attacks are possible when the input or output data is not properly verified. When an attacker can inject his code into the system, it can compromise the integrity and security of the system. Because the system is already infected and therefore vulnerable, these attacks can be used as a way for future attacks.

 4- SQL injection attack


This attack mainly exploits vulnerabilities in a website's SQL libraries or databases. If a website is vulnerable and user inputs are not filtered, hackers can obtain information and data from the database using simple SQL codes. These simple codes trick the system into considering them as legitimate requests and then accessing its database

5- Cross-site scripting attacks (XSS)
Also known as Cross-Site Scripting attacks, in this type of attack, hackers inject malicious code into a legitimate website. When a visitor enters the website and uses his credentials, all the data is stored on the website that the attacker can access at any time. These attacks can be used effectively to steal user and private information.

There are two types of XSS attacks, stored XSS attacks and reflected XSS attacks. In the first attack, the infected script is stored on the server forever. And the attacker can recover it at any time. In the second or reflected attacks, the scripts are invoked via web servers as alerts or search results. Because this makes the request valid, their website is processed and infected.

6- Exploiting plugin vulnerabilities

If you use WordPress, you should be familiar with plugins (Magento and Drupal, plugins and modules, respectively). Plugins are considered to be the most vulnerable parts of a website. Any obsolete or insecure third-party plugin can be used by attackers to take control of your website or destroy it altogether. The best way to stay safe is to always use plugins from reputable sources and always keep your plugins up to date.


7- Brute Force attacks
In this method, attackers try several combinations of passwords or lists of Harrow passwords on an account until one of the combinations matches. This method is simple to implement but requires a lot of computing power to implement. The stronger your password, the harder it is to get it using Brute Force. Sometimes attackers also use dictionary-type password attacks to speed up the process.


8- DNS Spoofing Attacks DNS fraudulent attacks, attackers can force victims to log on to a fraudulent website. This is done by changing the IP addresses stored on the DNS server to an address that leads to the attacker's website. DNS poisoning is the process by which a local DNS server performs with an infected server. Once the victim is on the fake website, the attacker can infect the victim's system with malware and use other website hacking techniques to do more harm

9- Cookie theft
This attack can effectively steal all your important information. During meetings between you and the website, sites store a large number of cookies on your system. These cookies contain a lot of sensitive information such as your login credentials such as passwords or even your payment data. If attackers gain access to these cookies, they can steal all of this information just by obtaining your cookie or use it to impersonate you online, and cookie theft is possible through xss attacks.

𝙒𝙚𝙡𝙡, 𝙩𝙝𝙚 𝙖𝙗𝙤𝙫𝙚 𝙢𝙚𝙩𝙝𝙤𝙙𝙨 𝙖𝙧𝙚 𝙩𝙝𝙚 𝙢𝙤𝙨𝙩 𝙘𝙤𝙢𝙢𝙤𝙣 𝙖𝙩𝙩𝙖𝙘𝙠𝙨 𝙛𝙤𝙧 𝙝𝙖𝙘𝙠𝙞𝙣𝙜 𝙬𝙚𝙗𝙨𝙞𝙩𝙚𝙨 𝙖𝙣𝙙 𝙝𝙖𝙘𝙠𝙚𝙧𝙨 𝙪𝙨𝙚 𝙩𝙝𝙚 𝙨𝙖𝙢𝙚 𝙢𝙚𝙩𝙝𝙤𝙙𝙨 𝙩𝙤 𝙝𝙖𝙘𝙠, 𝙩𝙝𝙞𝙨 𝙖𝙧𝙩𝙞𝙘𝙡𝙚 𝙞𝙨 𝙤𝙫𝙚𝙧 𝙖𝙣𝙙 𝙄 𝙝𝙤𝙥𝙚 𝙮𝙤𝙪𝙧 𝙞𝙣𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣 𝙝𝙖𝙨 𝙗𝙚𝙚𝙣 𝙖𝙙𝙙𝙚𝙙 𝙞𝙣 𝙩𝙝𝙞𝙨 𝙧𝙚𝙜𝙖𝙧𝙙. 𝙂𝙤𝙤𝙙 𝙡𝙪𝙘𝙠. 🙂