TGGS Computer Science

๐Ÿ•ต๏ธโ€โ™‚๏ธ Common Hacking Techniques

Hackers do not always use complicated code. Often, they trick people or secretly interfere with data ๐Ÿ’ก.

This slideshow explains three common hacking ideas you need to understand in Year 8.

๐ŸŽญ Social Engineering

Social engineering is when a hacker tricks a person into giving away information.

For example they may phone the main reception of a business pretending to be from IT.

  • They may use a phoney story such as they need to check password strengths.
  • They may ask the receptionist to give their username and password
  • If it is a busy day, the receptionist might not give this much thought

The hacker is not hacking the computer โ€” they are hacking the person ๐Ÿง .

โš ๏ธ Why Social Engineering Works

  • People want to be helpful ๐Ÿค
  • Messages can look official ๐Ÿข
  • Attackers create panic or urgency โฐ

This can lead to passwords or personal details being shared ๐Ÿ”‘.

๐Ÿ“ก Man-in-the-Middle Attacks

A man-in-the-middle attack happens when a hacker secretly places themselves between a user and the internet.

The hacker can see or change data without the user knowing ๐Ÿ‘€.

๐Ÿ“ถ Fake Wi-Fi Hotspots - The most common MITM attack

A hacker may set up a fake Wi-Fi network in a public place like a McDonaldโ€™s ๐Ÿ”.

They might use their phone ๐Ÿ“ฑ and name the hotspot โ€œMcDonalds Free WiFiโ€.

๐Ÿ•ต๏ธ What Happens Next?

When someone connects, their data passes through the hackerโ€™s device.

The hacker is now in the middle and may:

  • Read messages
  • Steal passwords
  • See websites being visited

๐ŸŒ DNS Spoofing

DNS spoofing is when a user is secretly sent to a fake website instead of the real one ๐ŸŽญ.

This often happens after malware is installed on a device ๐Ÿฆ .

๐Ÿฆ  How Malware Causes DNS Spoofing

A user may click a bad link or download something unsafe โš ๏ธ.

Malware then changes how the device finds websites, sending the user to fake versions instead.

๐Ÿšจ Why DNS Spoofing Is Dangerous

The fake website may look real, but it is controlled by the hacker.

Any usernames, passwords, or bank details entered are sent straight to the attacker ๐Ÿ”‘๐Ÿ’ณ.

๐Ÿ›ก๏ธ Staying Safe

  • ๐Ÿ” Be careful which Wi-Fi you connect to
  • ๐Ÿ“ถ Avoid public Wi-Fi for logging in
  • ๐Ÿง  Stop and think before clicking links
  • ๐Ÿ”’ Check websites carefully

Most attacks succeed because people trust too quickly โš ๏ธ.