Skip to main content

Credit Card and Website Password Theft (MITM)


Hey, it's me, Arshad Aman, back again. I had brought Back the Man In The Middle Post. I will not take care of the Google.

Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this


How Your Credit Card Can Be Hacked?



What is MAN IN THE MIDDLE ATTACK (MITM)?

ANS:- AS THE NAME TELL US IS THAT MAN IN THE MIDDLE THAT MEANS A MAN WHO IS IN THE MIDDLE. HERE This NOT MEANS MEDIATOR IT MEANS A HACKER WHO IS IN THE MIDDLE OF YOU AND YOUR SERVER AND TRYING TO HACK OR SPOOF YOU IDENTITY, PASSWORD, CREDIT CARD NUMBERS, ETC. He CAN CAPTURE ALL INFORMATION WHICH IS IN BETWEEN SERVER AND YOU.
HOW HACKER DO THAT ATTACK?

ANS:-THERE ARE VARIOUS APPLICATION AVAILABLE on INTERNET WHICH helps THEN TO DO THAT. 

LET US UNDERSTAND HOW IT WORKS:-IN INTERNET EVERY DATA AND INSTRUCTION TRANSMIT THROUGH A PROTOCOL KNOWN AS TRANSMISSION CONTROL PROTOCOL (TCP). The TCP ALLOWS THE DATA TO TRANSMIT THROUGH.TCP NOT ACTUALLY TRANSMIT THE DATA BUT IT TRANSMIT PACKETS WHICH IS THE SMALLER UNIT OF DATA AND ON REACHING THERE DESTINATION They AGAIN COMBINE TO FORM THE ORIGINAL DATA. WHICH MAY BE ANYTHING LIKE IMAGE FILE, AUDIO FILE, VIDEO FILE, TEXT FILE, ETC. 



TO KNOW MORE ABOUT PROTOCOLS CLICK HERE:-NETWORKING BASICS



So, HACKER USE SOME APPLICATION TO CAPTURE PACKETS AND IN THAT PACKETS THERE IS ALL YOUR INFORMATION.



SOME APPS:-

Wireshark(Windows AND LINUX)
ZENTI(FOR ANDROID)
AND OTHER SPOOFING APPS ARE ALSO AVAILABLE IN MARKET. THE BEST IS Wireshark AND I PERSONALLY USE IT.
 HOW TO PREVENT IT?
ANS:-THE BEST WAY USE ENCRYPTION SUCH THAT IF THE HACKER SPOOF THE DATA THEN HE WILL NEVER UNDERSTAND IT.

THE BEST IS ENCRYPTION IS PGP ENCRYPTION. I will RECOMMEND EVERYONE TO USE IT.



THE ANOTHER WAY IS TO USE STEGANOGRAPHY WHICH IS A METHOD OF HIDING A USEFUL DATA INSIDE AN UNUSEFUL DATA. BUT IT IS NOT MUCH SECURE AND HACKER CAN SEE IT BY DIFFERENT METHODS. BUT YOU CAN TRICK THE M.WE WILL DISCUSS THIS LATTER.



THIS IS ALL FOR POINT TO POINT CONNECTION BUT IF YOU ARE CONNECTING TO A SERVER THEN YOU CAN'T use THE METHOD THEN WHAT? Don't WORRY ABOUT IT I WILL TELL YOU WHAT TO DO.

IF YOU DON'T KNOW ABOUT POINT TO POINT NETWORK THEN GO HERE WHAT IS POINT TO POINT.



IF YOU ARE VISITING A WEBSITE IN A PUBLIC WIFI OR A WIFI IN WHICH OTHERS ARE ALSO CONNECTED OR FROM YOUR MOBILE HOTSPOT ANYONE IS CONNECTED MAKE SURE THAT THE WEBSITE HAS HTTPS INSTEAD OF HTTP BEFORE ENTERING ANY SENSITIVE INFORMATION LIKE BANK DETAILS.



Don't GO TO http://www.anything.com

GO TO https://www.anything.com


My Previous Posts:-

This is all for today. If you have any question, suggestion or you want that I should make a blog on your cyber topic then tell me in the comment section below. Hope you like this post.

Share It To Everyone By Clicking The Share Button. Hope You will do this for me.

Comments

Contact Form

Name

Email *

Message *

Popular posts from this blog

Social Engineering.What is it ?

Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this. Social Engineering? => The Process of tricking or a good plan to get your work done is known as Social Engineering. This is very useful in our day to day life and it will make your life very. Social Engineering is used by every person like Shopkeeper, Whole Seller, Large Companies, Hackers & Crackers. We Will does not discuss shopkeeper or whole sellers or companies. As this blog is on Cyber Security So What Will We Discuss about. Ya, We will discuss Hackers and crackers. I will not tell you How they use but Why they use as our Honorable Google does not allow it. So, Let's Begin it? Why Social Engineering? =>Suppose you had made a virus and you told your friend to use, will your friend use it. If yes comment me below. But in most case, they will never use that vi...

Zero Day Vulnerabilities| How to Be Safe?| Get Job with HUGE Salary.

Zero Day Vulnerabilities:- Hey, it's me, Arshad Aman, back again. Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this.

TOR | Dark WEB | You can Buy Spirit here......

Hey, it's me, Arshad Aman, back again.  Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this. This is a technical blog but in the title, you had seen that I am going to tell that you can buy spirit. Ya, you had seen it is true. Here I am going to tell that You can buy a spirit on the internet. Without wasting any time lets get started. Layers on the internet:- The website and anything that you are visiting is only 1% of the total internet. Ya, it is true only 1%. That is called the Surface Web which is available or indexed on google or any other search engine. The most of the internet is hidden and not accessible to the normal internet user.  After the Surface Web, The next to come is Deep Web. Deep Web:- This is basically a website which is not indexed in any search engines like google. You need a link to enter into. This...