
A Bit of Hacking Techniques for Vulnerable Subdomain
Author(s) -
Maxwell Scale Uwadia Osagie,
Amenze Joy Osagie
Publication year - 2021
Publication title -
journal of advances in computing, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2795-2339
DOI - 10.37121/jaccit.v1.133
Subject(s) - hacker , computer science , vulnerability (computing) , computer security , phrase , key (lock) , simple (philosophy) , data access , database , artificial intelligence , philosophy , epistemology
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.