Well here is a variety of tricks and tips a hacker hacked a website:
WARNING: banned for evil because evil by evil and going to hell sir said uztad
HTTPD Hack Attacks
HTTPD buffer overflow can occur because the hacker adds errors on the port used for web traffic by entering the lot carackter and strings to find a suitable overflow. When a place for overflow is found, a hacker would insert a string that will be a command that can be executed. Buffer-overflow can give hackers access to the command prompt.
TCP / IP Sequence Stealing Hack
Passive Listening Port and Packet
Interception TCP / IP Sequence Stealing, Passive Listening Port and Packet Interception runs to gather sensitive information to access the network
Port Scanning Hack
Through port scanning a hacker can see the function and how to survive a system from a variety of ports. A atacker can gain access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP strings in open to the public, which means that information can be extracted for use in remote command attack.
Selective insertions Hack Program
Selective Program insertions are done when a hacker attack put destroyer programs, such as viruses, worms and trojans (maybe you already know this term well?) On the target system. The destroyer programs often also called malware.
Protocols for transport of data from the Internet-is back -tulang TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host.
Command Processing Remote Hack Attacks
Trusted Relationship between two or more hosts provide facilities for exchanging information and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to power networks in one and the other system (the network).
hackers will attack the servers that are members of the trusted system. Just as latency to a proxy server, when access is received, a hacker would have the ability to execute commands and access the data available to other users.
Proxy Server Hack Attacks
One of the functions of proxy servers is to speed up response time by bringing the process of multiple hosts on a trusted network. In most cases, each host has the power to read and write (read / write) which means that what can I do in my system I'll be able to also do in your system and vice versa.
Password Hack Attacks
Password is a common thing if we talk about security. Sometimes a user does not care about the number of pins they have, such as online transaction in the cafe, even transact online at home is also very dangerous if not equipped with security software such as SSL and PGP. Password is one procedure that is very difficult to attack, a hacker might have a lot of tools (technically and in social life) just to open something that is protected by a password.
Fragmented Packet Hack Attacks
Internet data transmitted via TCP / IP can be further divided into packages that contain only the contents of the first package of information the main part (head) of TCP. Some firewalls will allow for the processing of packets that do not contain information on the source address on the packet first, this will result in some type of system to crash. For example, the NT server would crash if the packages were broken up (fragmented packet) enough information to rewrite the first packet of a protocol
Flooding & Broadcasting Hack
A hacker could menguarangi speed networks and hosts that are in it are significant in a way continue to request / demand for the information of servers that can handle classic attacks Denial of Service (Dos), send a request to the named port of excessive flooding, sometimes it is also called spraying. When a request is sent to flood all stations in the network's attack dinamakn broadcasting. The purpose of this attack are the same two that make network resource that provides information to become weak and eventually gave up.
Flooding attack in a manner dependent on two factors: the size and / or volume (size and / or volume).
FTP Hack Attack
One of the attacks made on the File Transfer Protocol is a buffer overflow attack caused by malformed command. destination FTP server to attack this average is to get a command shell or to perform a Denial of Service. Denial Of Service attacks can eventually lead to a user or hacker to retrieve the resource in the network without authorization, while the command shell can make a hacker gets access to the server system and data files that a hacker could eventually make anonymous root-acces having the right full to the system network even attacked.
An example is a popular FTP server in the UNIX family of WU-FTPD who know or mensniff information residing in the system.
IP Spoofing Hack
IP Spoofing is also known as the Source Address Spoofing, namely forgery hacker's IP address so that the target considers the hacker's IP address is the IP address of the host in the network instead of from the outside network. Suppose the hacker's IP address has type A 66.25.xx.xx when hackers to attack this type of network that attacked it will assume the hacker's IP is part of the IP networknya 192.xx.xx.xx eg type C.
I hope this article can help