Learn about the most extreme hacking in the world and the methods of that hacking


 Everyone's eyes sparkled when they heard about hacking. What a fun thing this hacking is. As much as it's fun, it's more about skills.

Basically, all the devices that have computer chips can be hacked. Today, millions of computers are connected online, and most of them are infected with Trojans or malware.

There is no specific method of hacking. No other device is completely secure. Any system can be hacked in different ways. Any system is built with the highest security in mind and protects it from various techniques of the past. And the job of hackers is to find all the new vulnerabilities and hack the system.

Below is a discussion of the hacking that has caught everyone's attention in the last few years. I hope many of them will be able to protect themselves with education.
Extreme Hack 1: ATM Hacking

The most horrible hacking is ATM machine or card hacking. These ATM machines basically run on conventional operating systems. So, it is not a very difficult task to hack. And ATM machines have some implementation of Java which is the most hacked software in the world. But ATMs can never be patched.

ATMs that run on operating systems can be easily hacked, such as Microsoft Windows. And even if the bank gives the default password and other information, they ask the users to change this information. But very few do this. For these reasons ATMs are hacked very frequently.

Barnaby Jack was an extraordinary ATM hacker who died in 2013. He surprised everyone by giving a lot of fake cash in a few minutes at 2 ATMs in a security conference. He used many tricks for this, but his main method was to hack a malware-infected device by inputting it into the ATM's USB port. And there is no security in the USB port of the ATM. Jack's software would connect the ATM to a network and then take full access to that ATM. Then he would fake cash in with the help of some commands.
Extreme Hack 2: Medical Device Hacking

Adequate action was taken by the authority against Jack's ATM hacking method after it became known. Jack Tan left ATM hacking and leaned towards medical device hacking. His job was to remotely give unauthorized and fatal shocks to pacemaker patients and push insulin remotely to diabetic patients.

All medical devices are used after 10 years or more of testing. This means that it is very easy for hackers to patch this device in such a long time.

Recently Wired published an article with the headline " How easy it is to hack hospital equipment ". The passwords for these devices are very hard coded and cannot be changed.

Medical devices are very easy to use and this is why these devices can be turned off at any time. Medical devices should be designed in such a way that they will continue even if the security system is closed. And this is the biggest fault. Too big. Due to the complex and custom passwords, their use is often difficult. At the same time, the signals exchanged on these devices are not encrypted or authentic.

And this is why hackers who can find the right port can read and change the data of the machine. And it does not interfere with the operation of the device. And that is why it is not understood.

Medical device hacking has come to the fore in the last few years. White hat hackers showed how to hack devices in Medicare at a popular hacking conference, and the FDA has started a lot of fuss about this vulnerability.

It doesn't matter if a skilled hacker kills a person by hacking a medical device, so we all need to be aware of this.
Extreme Hack 3: Card Skimming

The most terrible is the card schemer Ra. It can play all your money twelve at any time. Cards are very easy to hack. They input a USB device into any card reader machine such as an ATM, or at a gas pump, shopping mall payment terminal. And this device easily captures the information you type on your card.

Card skimming has been around for a long time and the easiest thing to do is to hack someone's debit or credit card. They place this schemer device in a place where you can't see it very easily. Many people also use Bluetooth connection for this purpose.

Scammers basically set up multiple devices in one area. And they live around it to capture information. With this information, they create a new kind of fake card. They then sell it to the public. The whole thing happens in about an hour.

‌ A man named Brian Krebs published a research paper on the latest skimming news and devices called " a victory of sorts against card-skimming technology ". In this method the police add a GPS device to the skimming device, and they can be located at the whim of any skimmer device.

However, skimmers now do more skimming through Bluetooth devices without going directly to work.
Extreme Hack 4: Wireless Card Hacking

If your credit or debit card is RFID or has a contactless mechanism, such as MasterCard, PayPal, Pepas, Express Pay, etc., then a hacker can easily steal your information.

‌ RFID transmission devices basically have no security. Your RFID transmitter can be easily hacked using low-voltage radio waves to extract information. Credit card magnetic strips are so insecure that its information can be retrieved with any magnetic stripe reader. These magnetic strip readers are very easy to buy online.

Your account can only be hacked if you go around an RFID reader. Currently the range of these devices has been greatly expanded. These can now work up to 1 km. So, it doesn't matter to a hacker to steal the credit card information of 1000 people in one place.

To avoid this you can buy an RFID-hack-defeating "shields" that won't cost you too much. Security experts believe that chip-enabled cards can prevent this hacking, and so chip-enabled card usage is increasing worldwide.
Extreme Hack 5: Bad USB
is a type of USB that, when inserted into your computer's USB port, automatically executes various commands and codes on your system. It can also take control of your PC.

And there is no defense against such hacking. By turning off all unauthorized access to your PC, of ​​course, you can stay safe from it. Again, there is no way to check whether the USB device that is being input to your PC is bad USB. You can also get it from a friend's device, and you can install it on another friend's PC without knowing it.

So, there is no way to protect it.
Extreme Hack 6: Stuxnet
Stuxnet  is a name that is reminiscent of one of the most horrific and most memorable cyber attacks in history. Stuxnet is by far the most advanced and complex malware program in the world. It does not use any bad USB. But it spreads through the USB key and it was formerly known as the USB Execution Method.

It came to public notice in 2010. Stuxnet knew in advance that a cyber attack could do more harm than a real attack. Stuxnet was a virus program created by the United States and Israel to thwart nuclear weapons in Iran. But neither Israel nor America knew it publicly.

It is unthinkable that anyone could break Iran's security system, especially its high security and nuclear security. But those who created Stuxnet infected the USB key of a foreign nuclear consultant who was working very closely on Iran's nuclear project.

It enters the PC with the USB key, attacks the reactor controller of the Windows operating system and automatically changes all the programmable logic there.

A source code review states that many teams of programmers had to work together for over a year or more to create this stocknet. StocksNet had such programs before, but quotas were not as terrible and complex code as StocksNet. Experts believe that this type of cyber war is just beginning. Later everything will be very cold-headed cyber wire.
Extreme Hack 6: Road Sign Hack

Road sign hacking is a legal crime and can put you in a lot of danger. But hacking these road signs is not a difficult task.

Some road sign hackers are officials or employees of the Department of Transport who do this for their work needs. But the truth is that the road sign manual can be found anywhere on the internet and its passwords are also very weak. Examples: "password," "Guest," "Public," and "DOTS." Any hacker can easily find the pattern or model of the road sign and download its manual.

Almost all road signs require physical access to a lock panel. Although the panels are unlocked in most cases. If a hacker gets physical access to it, he can easily use the console keyboard. The hacker can then reboot the system. With it he can reset all useful information and passwords. And the funny thing is that anyone can hack a road sign with admin access in this way.
Extreme Hack 6: The NSA's Order Book

The full meaning of the NSA is the National Security Agency, an intelligence unit of the US government that collects information from around the world and gives it to the US government for various purposes. An NSA official recently reported that the NSA has an order book that deals with various advanced hacking devices.

This is an advanced hacking method, the value of the Quantum on the Insert . Its job was to redirect a victim from one website to another. However, HTTPS, that is, the secure protocol, did not work. How many sites do you use? However, its use has increased a lot at present.

Along with other hacking tools, an NSA operative can order the following:

  • The Malicious Monitor cable, which costs 30, can monitor which PCs and what data is being transferred between computers.
  • BIOS and firmware hacking tools that can reform everything in an OS, change the OS and even install a new hard drive.
  • Device that can monitor any phone call by creating a fake cellphone network. It costs ০০ 40,000.
  • Malware that can attack any hard drive.
  • 602.11 Wireless Network Injection Tool
  • Keyboard is just a trapping device.

After reading the list of devices that NASA can order, you must have understood that everyone wants to know what other types of devices NSA can work with. And it is clear that as long as it is legal, the agency can do whatever it wants.
Extreme Hack 9: Cryptographic Attack

`A hacker by the name of Gary Kenworthy, who was originally a cryptography researcher, created a system that remotely monitors the radio frequency, electromagnetic radiation of all types of computing devices, and the security key of that system. You can see how to determine the security of a mobile by looking at the electromagnetic fluctuations in this headline called determine a mobile device's private key .

Although ‌ Gary Kenworthy earns a lot of money from this system by showing the way to security, it must be said that his attack has greatly reduced the security of any cryptographic device.
Extreme Hack 10: Car Hacking

Car companies are adding as much computing functionality to their manufactured cars as possible. And in this case, another way of hacking has been facilitated is to hack the system of that car. And hacking these computer systems is not a difficult task at all. Earlier, many hackers used wireless to figure out how to unlock a car.

Dr. Charlie Miller, who started her career hacking Apple devices and winning the ‌ Pwn2Own Hacking Contest many times, is one of the car hackers. In 2013, he and his co-researchers discovered how to control the brakes and steering of the 2010 Toyota Prius. They attacked the car's control unit and the onboard bus system. However, it does not work remotely.

 

They linked to the car's control system with a car's remote radio features.

Last year, two hackers, Miller and Valasek, said in a research paper against wireless remote hacks against 24 different cars that 24 cars in the world could be attacked remotely. These include the Cadillac Escalade, the Jeep Cherokee, and the Infiniti Q50. They leaked a car's remote radio features to the car's control system.

Now car companies are trying to develop security systems for these cars by hiring different hackers.

The above hacking is current or quite earlier. So think, what will be the future of hacking? Maybe there will come a time when war will mean cyber war. And cyber information will be the most valuable thing in the world.

So far today. See you again. Thanks everyone.

Post a Comment

أحدث أقدم