answersLogoWhite

0

Yes.. hackers hack into networks.

Why... for various reasons. They mightened like the owners of the network. If there's a server on the network, it will come in handy if they need any hardcore work done (breaking encryptions) if they want to launch an attack against another network or website. Steal employee data. Steal data in general. Steal bandwidth. Lots more reasons.

How... hundreds of ways. It could be a work / school network (thats how alot of hackers start out). If this is the case, then they have permissons.. just need to escalate those permissions. Keyloggers, sniffers, find a weakness in any web apps the server is hosting (if any), find a weakness in the server OS, social engineering, send remote access trojand to users on the network. If its a negihbours wireless network then its just a matter of cracking the WEP/WPA key.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What has the author Ali Jahangiri written?

Ali Jahangiri has written: 'Live hacking' -- subject(s): Computer networks, Computer hackers, Security measures, Computer security


Does Barracuda Networks provide security for home email programs?

It can offer security for your home computer. It can protect your computer and emails from hackers. Some people know how to scan into your router and hack into your computer.


What has the author Michael Calce written?

Michael Calce has written: 'Mafiaboy' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Investigation, Biography, Computer security, Security measures, Prevention


Difference between internet and computer networks?

internet is a collection of inter-related computers,where as computer networks is a collection of automated(independent) computers.


What has the author Kevin Beaver written?

Kevin Beaver has written: 'Hacking For Dummies' 'Hacking wireless networks for dummies' -- subject(s): Computer Technology, Nonfiction, OverDrive, Security measures, Wireless LANs 'Hacking for dummies' -- subject(s): Computer networks, Computer hackers, Security measures, Computer security


Who uses binary?

This is especially used by people who do specialized work with computers - computer hardware, programming, computer networks, etc., but also anything related to data communication.This is especially used by people who do specialized work with computers - computer hardware, programming, computer networks, etc., but also anything related to data communication.This is especially used by people who do specialized work with computers - computer hardware, programming, computer networks, etc., but also anything related to data communication.This is especially used by people who do specialized work with computers - computer hardware, programming, computer networks, etc., but also anything related to data communication.


What is the difference between hackers and cyber vandalism?

Hackers are individuals who use their technical skills to gain unauthorized access to computer systems or networks for various purposes, which can include cyber vandalism. Cyber vandalism specifically refers to the act of intentionally disrupting or damaging computer systems, networks, or data, often for malicious or destructive purposes. In essence, hackers can engage in cyber vandalism, but not all hackers necessarily do so.


What has the author Salvatore J Stolfo written?

Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention


What has the author Jonathan Littman written?

Jonathan Littman has written: 'The Watchman' -- subject(s): Biography, Computer crimes, Computer hackers, Computer security, Poulsen, Kevin,, Poulsen, Kevin, 1965- 'Crashing Augusta' -- subject(s): Sports, Athletes, Anecdotes 'The fugitive game' -- subject(s): Computer crimes, Computer hackers, Computer networks, Information superhighway, Internet, Investigation, Psychology, Security measures


What type of program is a backdoor?

They are computer viruses that let hackers and other viruses in to your computer undetected. They are computer viruses that let hackers and other viruses in to your computer undetected.


What has the author Marion Pester written?

V. C. Marney-Petix has written: 'Internetworking' -- subject(s): Computer input-output equipment, Computer networks, Wide area networks (Computer networks), Local area networks (Computer networks), Data transmission systems 'Networking and data communications' -- subject(s): Computer networks, Data transmission systems 'Mastering internetworking' -- subject(s): Computer networks, Wide area networks (Computer networks), Internetworking (Telecommunication), Local area networks (Computer networks) 'Bridges, routers, gateways!' -- subject(s): Equipment and supplies, Bridges (Computer networks), Local area networks (Computer networks), Routers (Computer networks), Wide area networks (Computer networks), Gateways (Computer networks), Internetworking (Telecommunication)


Can you sue computer hackers?

Yes.