There’s something about hacking that is infinitely interesting to geeks, especially those who have either been impacted by a hack or have a slightly unhealthy obsession with Simulacra and Simulation (and The Matrix). Almost unexcitingly, however, a lot of the hacks that dominate the internet aren’t actually too sophisticated. You get some ‘hacks’ like DDOS attacks that are widespread and easy to protect against, but with very basic know-how, hackers can just use Google to find sites that are vulnerable to their chosen attacks and implement them relatively simply.
By knowing about the most common hacks, you’ll be better prepared to spot them and deal with them. Here’s a look at four of the most utilized ones.
Some domain name systems have certain vulnerabilities (it’s not worth getting into the intricacies of it here, but we have a DNS dependency that means attacks can be prevalent). Those vulnerabilities can basically be exploited to result in a hacker redirecting traf
The Most Common Simple Hacks
fic from your website to another one… that can look completely identical but just comes loaded with malware. It can be used to leverage the trust of a site’s brand to capture credit card info and other personal data. It’s also very, very hard to detect if you are a site visitor – you have to have faith in the website you are using.
A UI redress is a beautifully simple hack. It involves a hacker creating a spoofed user interface for a website, only for a short amount of time, and then capturing users that click certain elements of that UI, taking them to an unfamiliar website, and loading them up with malware. A UI redress is a kind of phishing in that it involves simply tricking people, but it can cause serious damage to a webmaster if a hacker can simply DNS Spoof you and make a copy of your site. The consequent impact will cause a website’s reputation to absolutely plummet.
An absolutely classic hacking technique; it’s insane that this still works as it has been around for so long. Some sites have an SQL database (pronounced Sequel, it’s a server database, simply put), which can be deceived with a simple line of code, which can crack open your site and give a hacker access to anything on your database.
Many skilled hackers can work their way backward and exploit other elements of a site after an SQL injection. Worst of all, vulnerabilities are insanely easy to find – there’s even a list called Google Dorks that helps hackers find vulnerable sites. If you’re a webmaster that uses SQL, you need to make sure you have this covered.