A Bit of Hacking Techniques for Vulnerable Subdomain

  • M. S. U. Osagie Benson Idahosa University, Benin City
  • A. J. Osagie
Keywords: Application, Data, Domain, Hacking, Networks, Vulnerability


Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.


Download data is not yet available.


M. S. U. Osagie, K. O. Obahiagbon, and O. J. Amenze, “5PEN Technology: A new dawn in homogeneous and heterogeneous computing,” arXiv preprint, 2018; arXiv:1804.10651

M. S. U. Osagie & A. J. Osagie, “Internet penetration forecast and threats mitigation for Nigeria,” Benin Journal of Advances in Computer Science, vol. 4. no. 1, pp. 20-29, 2019.

M. S. U. Osagie, O. Enagbonma, & A. I. Inyang, “The historical perspective of botnet tools,” 2019, arXiv preprint arXiv:1904.00948.

M. S. U. Osagie, O. Glory, O. B. Obehi, I. A. John, E. J. Osarenkhoe, A. A. Shirley, et al. “Tendency of ICT usage among adolescent in Oredo local government primary schools, Benin City, Edo State-Nigeria,” Asian Journal of Probability and Statistics, vol. 5, no. 2, pp. 1-10, 2019.

M. S. U. Osagie, K. O. Obahiagbon, A. I. Inyang, & J. A. Osagie, “Digitalized responsive logical interface application,” 2018, arXiv preprint arXiv:1805.05846

M. Curtin, Introduction to Network Security, LaTeX2HTML translator Version 97.1, Leeds, UK, 1997.

M. S. U. Osagie, D. E. Ajayi, O. Okoye, E. O. Faith, E. Anwuli, E. Osian, et al. “The role of information and communication technology (ICT) in the academic performance of the University of Benin Post Graduate Students,” Asian Journal of Probability and Statistics, vol. 5, no. 2, pp. 1-9, 2019.

M. S. U. Osagie & A. J. Osagie, “The architectural dynamics of encapsulated botnet detection (EDM),” 2019, arXiv preprint arXiv:1904.07145

M. Uma, & G. Padmavathi, “A survey on various cyber-attacks and their classification,” IJ Network Security, vol. 15, no. 5, pp. 390-396, 2013.

M. Jouini, L. B. A. Rabai, & A. B. Aissa, “Classification of security threats in information systems,” Procedia Computer Science, vol. 32, pp. 489-496, 2014.

J. R. Vacca, (Ed.) Network and System Security. Second Edition, Elsevier, USA, 2014.

T. T. Brooks, C. Caicedo, & J. S. Park, “Security vulnerability analysis in virtualized computing environments,” International Journal of Intelligent Computing Research, vol. 3, no. (1/2), pp. 277-291, 2012.

T. Singleton, “The five top cybercrimes,” American Institute of CPAs, Durhan, North Carolina, 2013.

R. K. Goutam, & D. K. Verma, “Top five cyber frauds,” International Journal of Computer Applications, vol. 119, no. 7, pp. 22-25, 2015.

M. S. U. Osagie, C. I. Okoye, & A. J. Osagie, “Mitigating botnet attack using encapsulated detection mechanism (EDM),” 2018, arXiv preprint arXiv:1806.06275

S. McClure, J. Scambray, & G. Kurtz, “Hacking exposed: network security secrets and solutions,” Sixth Edition, Corel VENTURA™ Publisher, California, USA, 2009.

B. Schneier, “Hacking the business climate for network security,” Computer, vol. 37, no. 4, pp. 87-89, 2004.

S. Konyeha, “Evaluating hacking and cyber-security issues in Nigeria,” Benin Journal of Advances in Computer Science, vol. 4, no. 1, pp. 39-47, 2019.

K. Coffey, R. Smith, L. Maglaras, & H. Janicke, “Vulnerability analysis of network scanning on SCADA systems,” Security and Communication Networks Journal, vol. 2018, doi.org/10.1155/2018/3794603

R. J. Barnett, & B. Irwin, “Towards a taxonomy of network scanning techniques,” In Proceedings of the 2008 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries: Riding the Wave of Technology, pp. 1-7. October 2008, https://doi.org/10.1145/1456659.1456660

B. Wippich, “Detecting and preventing unauthorized outbound traffic,” White Paper, SANS Institute-Infosec Reading Room, Boston, USA, 2007.

How to Cite
Osagie, M. S. U., & Osagie, A. J. (2021). A Bit of Hacking Techniques for Vulnerable Subdomain. Journal of Advances in Computing, Communications and Information Technology, 1, 1-7. https://doi.org/10.37121/jaccit.v1.133
Review Article