Vulnerability scanner
Vulnerability scanner is a tool to quickly check the known vulnerabilities of computers on the network. Hackers usually use port scanners. They check which ports on a given computer are "open" or available for accessing the computer, and sometimes they detect the program or service listening to the port and its version number. Firewalls prevent intruders from invading computers by restricting access to ports and machines, but they can still be bypassed. )
Reverse engineering
Reverse engineering is also terrible, and hackers may try to find vulnerabilities manually. A common method is to search for possible vulnerabilities in computer system code, then test it, and sometimes reverse engineer the software without providing code.
Violent attack
Password guessing. When used to check all short passwords, this method is very fast, but for longer passwords, other methods (such as dictionary attack) are used, because violent search takes time.
Password cracking
Password cracking is the process of recovering passwords from data stored or transmitted by computer systems. Common methods include repeatedly trying to guess passwords, manually trying common passwords, repeatedly trying to use passwords in dictionaries or text files with many passwords.
Network packet eavesdropping software
A packet sniffer is a captured packet that can be used to capture passwords and other application data during network transmission.
Deception attack (phishing)
Deception attacks involve a program, system or website that successfully masquerades as another program, system or website by forging data, thus being regarded as a trusted system by users or other programs-usually deceiving programs, systems or users to reveal confidential information, such as user names and passwords.