You can learn the following 6 hacking techniques to get free online hacking knowledge. In a previous post, namely how to become a hacker, I explained that one of the basic things that must be learned is hacking techniques/methods.
Actually not only 6, there are many techniques with other names. But because the way it works is almost similar, so I don’t list it.
By learning different techniques, you will have many options for hacking an account. If this method fails, then you can try another method.
Well, very useful is not it? So let’s learn from the meaning first.
Hacking Techniques
A hacking technique is a method or work step that is carried out by a (hacker) when hacking a target. Techniques can also be used as a guide for the next process.
Example:
In the yahoo cloning technique (hack fb) the first thing to do is look for a yahoo vuln account. Then create a new account with the yahoo vuln, etc. Well, this way we can already know what the next step is.
Here are 6 simple hacking techniques
1. Backdoor
In short, we will create a hidden entrance (back door) to a system by inserting a backdoor into the system.
This backdoor is a kind of program to gain access and can be controlled remotely.
This technique was also used in the film Hacker (2022). Where benjamin inserts the USB into the tablet belonging to intelligent cyber without his knowledge. Then he controlled the USB from an internet cafe to copy the zeus folder associated with his mother.
USB is what is called a backdoor or playload.
To make it we can use metasploit tools. For android users, I have made a tutorial on how to create a backdoor on the omcyber blog. And computer users might be able to try using Kali Linux for its creation.
Each playload has its own level, friends. My tutorial is a backdoor of a million people, so yes, it’s just a joke.
Maybe you can find a program for making a more sophisticated backdoor yourself.
Another similar technique is trojan and tracking (spy). Both will work after certain software is embedded in the victim’s device.

It’s just that if the trojan is in the form of a virus and tracking is in the form of spy applications such as smartphone logs, mspy, thruthspy, spyzie and others.
2. Bruteforce
This technique prioritizes luck. Because the way it works is guessing what password the victim is using.
Bruteforce is divided into 2 ways of working. First target 1 account to try with millions of passwords. And second targeting millions of accounts to try with 1 password.

Usage examples
For example, we want to hack a Facebook account with the username ‘omcyber’. Then we have to prepare a list of as many passwords as possible for that username.
Or we collect hundreds of facebook account usernames and then we crack with one password ‘doraemon123’.
To run this technique we need a program. Android users can take advantage of termux that has the bruteforce script installed.
Please just enter the termux category on the omcyber blog. There I have written several hacking methods using the bruteforce hack technique.
3. Phishing
Phishing is synonymous with deception that traps, just as people fishing using bait to get fish (fish are deceived because they eat bait that is attached to a hook).

The way it works is to attract the victim’s attention with attractive offers such as free gifts/services. Next, the victim must login to the account from the modified login page.
The form of phishing is usually web pages and forms. So you also have to know how to make a website or form if you want to run this technique.
The hallmark of phishing is the presence of attractive prizes or offers (make you curious) so that people who see them will want to click and follow how to get these gifts/offers. Then you will be directed to the account login page (fb, ig, twitter, etc.).
If the login page is filled with email and password, the login data will be sent directly to the phisher. So, you guys have to be careful too.
To learn, I have written several ways to create a phishing web. So you can better understand and also avoid this technique.
4. MITM (Man In The Middle Attak)
Do you often use public wifi? be careful because it is the medium used by hackers to perform the mitm technique. Only by providing a free connection, the data of the connected person can be known easily.
MITM must also be supported by a suitable program. Android tool that can be used is the ZANTI application. With this application we can see what sites are visited and the login data that has been entered.
The way MITM works is to provide a connection so that users can connect to the internet. Then we can see all their activities while browsing.
Why is it called MITM?
Because if you describe the position of the hacker is in the middle between the victim and the internet. The hacker here is the liaison (connection provider) between the two.

If you watch the movie “who am i” then how to use this technique will be clearly demonstrated. Where a connection provider is installed by Stephan near the computer to be hacked and Benjamin is in charge of connecting the computer to that connection.
-

network transmitter installation -

connect laptop with network transmitter
how cool isn’t it? So don’t give up and keep learning.
5. Social Engineering
This is an attempt to make a situation as expected or commonly called engineering. The goal, of course, is for other people to believe in the incident.
In the real world, just look at a SALES. Indirectly they have done social engineering to hack the brains of buyers. They will explain the product as if it is the best and a must-have.
Another example of “eat donuts for free” I quote from the movie “who im i”.

Max looks for the receipt for the donut purchase that was thrown in the trash and he finds the receipt with the purchase of 8 donuts. Next he walked into the donut shop and confessed that he had bought 10 donuts but why only 8?
The officer checked and asked who was serving? Max pointed to where one of the maids came from. When the current clerk was about to approach the waiter, Max said “Hurry up, don’t let your boss fire you because of this little problem”. Because the officer was afraid, he immediately gave 2 donuts to max.
So it can be concluded that one of the things needed to do social engineering is courage and self-confidence.
Social engineering can also be the beginning of hacking techniques before other techniques are run. For example, to run a phishing technique, we also have to make an engineering that it is free and reliable.
6. Keylogger
This technique is also known as activity saver. Keyloggers are software, guys and are often found in public internet cafes (if anyone has one).
The way it works is quite simple, this software will save what the keyboard typed and what column and then save it. Then hackers can see the data.
It’s almost the same as a backdoor, except that the keylogger will work automatically without having to use commands.
Well, now we have learned some simple hacking techniques. Hopefully it can be useful and help you in realizing your desire to become a hacker.
Remember!! don’t use it carelessly, because there are laws that regulate hacking.
Until this is our discussion this time, don’t forget to share it. Thanks for reading.