0% found this document useful (0 votes)
209 views11 pages

Every Thing U Need To Start Up On HACKING!!! Must Read: Categories Hack Related

The document provides an introduction to hacking for beginners. It recommends downloading the Backtrack Linux distribution, which contains tools useful for hacking. It also recommends learning HTML, Python, and other programming languages. The document then describes different types of hackers (black hat, white hat, gray hat) and basic hacking techniques like netbios hacking, password cracking, and remote access using tools like netcat. It provides definitions for common hacking terms and describes various attacks like DoS, SQL injection, and social engineering.

Uploaded by

Vijay Pradhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
209 views11 pages

Every Thing U Need To Start Up On HACKING!!! Must Read: Categories Hack Related

The document provides an introduction to hacking for beginners. It recommends downloading the Backtrack Linux distribution, which contains tools useful for hacking. It also recommends learning HTML, Python, and other programming languages. The document then describes different types of hackers (black hat, white hat, gray hat) and basic hacking techniques like netbios hacking, password cracking, and remote access using tools like netcat. It provides definitions for common hacking terms and describes various attacks like DoS, SQL injection, and social engineering.

Uploaded by

Vijay Pradhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

EVERYTHINGUNEEDTOSTARTUPON HACKING!!!

Mustread
Categories>HackRelated Page1 13

m0ksh
Seniorfounder 11posts

0permalink

HeyGuys ,ThisTutorialismadebymeanditsforeverybeginnerhere,thiswill helpthemtostarthacking.thebestoperatingsystemusedforhackingisLinux,youcan downloadaveryusefullinuxdistributionfromherehttp://www.backtracklinux.org/it

containseverythingahackerneeds.

Hereswhatyoushoulddo: 1readlotsoftutorials(especiallyonhackforums) 2practicethetutorialsyoulearned 3learnHTML(ithelpsahackeralot)http://www.w3schools.com/ 4learnaprogramminglanguage(startwithpythonorvisualbasic) Checkthisthreadbybignoob: http://www.hackforums.net/showthread.php?tid=207223 LaterlearnmoreadvancedprogramminglanguageslikeC++ InthisGuide: 1TypesofHackers 2NetbiosHacking 3Definitionofsometerms 4BasicCommandPrompt(cmd)commands 5Toolsthatyoushouldhave

6Usefulthreads TypesOfHackers: 1TheBlackHat(alsoknownascrackers)theyattackcomputersystemsforprofitorfunor forothercauses,theydistributevirusesworms 2TheWhiteHat(EthicalHacker)theyarecomputersecurityexpertsspecializedin penetrationtesting,usuallytheyarehiredbycompaniestoprotecttheirsystems. 3TheGrayHat(combinationbetweentheblackandthewhitehat,youcantknowonwhat sidetheyare) NetBiosHacking(NetworkBasicInput/OutputSystem)itsthemostsimpleandeasy wayforhackingremotecomputers,itcanbeusedforreadingorwritingtoaremote computerorcanbeusedfordenialofserviceattack.Firstyouneedaportscannerlike angryiphttp://www.angryip.org/scanarangeofIPs(netbiossessionrunsonport139)lets assumethatyoufoundanIP192.168.0.140firstyouneedtogetsomeinformation(goto Runandtypecmd)nowinthecommandprompttypenbtstata(IP)inthiscasenbtstata 192.168.0.140youllgetsomethinglikethis

Ifwefindthehexcode<20>thatmeansfilesharingisenabled.Nexttypeinthecmdnet view\\192.168.0.140Youllgetalistofsharedresourcesoranerror(accessisdenied)If

yougetalistoftheshareddrivesorfolders(assumingthatyouhavefoundtheC:driveis shared)TypeinthecmdnetuseK:\\192.168.0.140\C: K:representsthedrivethatwillbecreatedonyourcomputer,thatwhenyouaccessityou canviewtheC:driveofthevictimNowletsgoback,ifyougetaccessisdenied(wehave tobeloggedin),onwindows95/98andWindowsMEwecancrackthepasswordusing PQWAK(ofcoursethisisold,butsomepeoplestillusetheseversionsonWindows) downloadPQWAK2Here: http://www.mediafire.com/file/w0tqgzcdtdo/pqwak2.zip aftercrackingthepasswordyoucanloginandcontinue:netuseK:\\(IP)\(Sharename) password:*****\user:***** inothercaseswhenyoucantusePQWAK,wecanjustuseanullsessionaccessto gatherinformationaboutamachine.Using:netuse\\(IP)\ipc$/user: HeresaTutorialbyh4ckingURLife: http://www.hackforums.net/showthread.php?tid=173385 Definitionofsometerms:(somedefinitionsaretakenfromwikipedia.organd whatis.com) DNS:(DomainNameSystem)adatabasesystemthattranslatesdomainnamestoip addresses,soinsteadoftypingtheipaddressofhackforumsinourbrowserwetype http://www.hackforums.netandtheDNSredirectsustotheipoftheserver.Hackerscan spooftheDNSacommonsoftwareusedisCain&Abel,forexamplewhenausertypes http://www.google.comhegetsthepagehttp://www.yahoo.com,andalsoitcanbeused forphishing.

TrojanHorse:aTrojanisdesignedtoallowaremoteaccessbyahackertoatarget computer(itscomposedfromtwopartstheserverandtheclient)theserverisinstalledon thevictimsmachine,andtheclientisusedbythehackertoconnecttotheserver. Thingsthatcanbeperformedbyahackeronatargetcomputer: 1datatheft 2installationofasoftware 3downloadingoruploadingfiles 4keylogging 5viewingscreenshotsAndmore Keylogger:(keystrokelogging)akeyloggerisasoftwareusedforloggingkeystrokesand savingthemtoatextfileorsendingthemtoanemailaddress,itrunsinthebackgroundin astealthmannersothevictimwontnoticewhatshappening. YoucanuseagreatkeyloggerfoundhereonHFwhichisAlbertinoKeylogger. http://www.hackforums.net/showthread.php?tid=219628 KeyloggingTutorial: http://www.hackforums.net/showthread.php?tid=29821 Bruteforceattack:isamethodusedtocrackencrypteddatasuchaspasswordsby tryingallpossiblecombinationsofcharacters,bruteforcingtakesalongtimeand sometimescantcrackthepassword.

Dictionaryattack:isamethodusedtocrackapasswordorakeythattriesallthewords inadictionary,thedifferencebetweenadictionaryattackandabruteforceattackisthatit usesapredefinedlistofwords. RAT:(RemoteAdministrationTool,RemoteAccessTrojan)aRATisamalwarethat includesaBackdoorforadministrativecontroloverthetargetcomputer,givestheattacker almostfullcontrolovertheinfectedcomputer,infectedcomputersarecalledzombies. Botnet:(RobotNetwork,ZombieArmy)botnetsarenetworksofinfectedcomputers controlledbytheattackerusedsendspamandviruses. Crypter:ACrypterisaprogramsthatmakesotherprogramsUDorFUDbyencrypting them.(UDmeansundetectablebyantivirusprograms,andFUDmeansfullyundetectable) Binder:ABinderisaprogramthatmakesotherprogramsUDorFUDbybindingthem withanotherfile. Backdoor:isameansofaccesstoacomputerthatbypassessecuritymechanism,Iother wordsabackdoorisamethodofbypassingnormalauthenticationorsecuringremote access,abackdoorcanbeaformofaninstalledprogramoramodificationtoanexisting program. Worm:awormisaselfreplicatingvirusthatdoesnotalterfiles,butresidesinactive memoryandduplicateitself,sometimesawormsjobistotakeadvantageofabackdoor createdbyanearlierattack. Vulnerability:(securityHole)avulnerabilityisaweaknessinthesystem,itsalso classifiedasasecurityrisk. Exploit:anexploitisanattackonacomputersystemthattakesadvantageofa vulnerability,thetermexploitreferstotheactofsuccessfullymakinganattack. Agreattoolusedforexploitingvulnerabilitiesismetasploithttp://www.metasploit.com/

Proxy:aproxyserverisaserverthatactsasanintermediaryforrequestsfromclients seekingresourcesfromotherserver,heretheclientsIPisnotshown,insteadtheIP addressoftheproxyserverisshown,hackersuseproxiestoprotectthemselvesandhide theirIPaddress. FindyourIPandTraceotherIPsHere:http://www.ipadress.com/ DoSAttack:(DenialOfServiceAttack)aDoSattackisanattempttomakeacomputer resourceunavailabletoitsintentedusers,onecommonmethodofattackinvolves saturatingthetargetmachinewithexternalcommunicationrequests. FindthedifferencebetweenDosandDDosHere: http://www.hackforums.net/showthread.php?tid=64591 Phishing:phishingisafraudprocessofattemptingtoacquiresensitiveinformationlike usernamesandpasswordsorcreditcarddetails,itconsistsofmakingawebsitethat looksliketherealwebsitethatvictimsuse,andsendingfakeemailstothemtotrickthem, sotheyentertheirsensitiveinformationonyourfakewebsitewhichareloggedinalogfile ontheserver. SQLinjection:isacodeinjectiontechniquethatexploitsasecurityvulnerabilityoccurring inthedatabaselayerofanapplication. SQLinjectiontutorials: http://www.hackforums.net/showthread.php?tid=50356 http://www.hackforums.net/showthread.php?tid=45621 Socialengineering:istheactofmanipulatingpeopleintorevealinginformationor trickingthevictimtoperformingactionsthatarebeneficialtotheuser.

AgreatguidebySolid: http://www.hackforums.net/showthread.php?tid=67193 SomeCommandpromptcommandsthatyoushouldknow: cd:changethedirectoryLateryoulldownloadtoolsthatdoesnthaveagraphicaluse interfaceGUI,andwhenyouclickonthemthecmdopensandthencloses,forexample hydra.Exampletogoandrunhydrabruteforcerwhichisonthedesktopinthefolderhydra: Cddesktop\hydraHydra.exe ping(IP/Host):checkstoseeifahostisalive Example:Ping192.168.0.1 Or Pinghttp://www.google.com Tracert(host):tracesahostandfindstheIPofthehost Example:Tracerthttp://www.google.com ipconfig:displaysthecurrentipaddressofyourcomputerandtheDNSserver Attrib:hidesfilestypeattrib/?forhelpExample(hideafolderABCinthedriveC:) Attrib+s+hC:\ABC

ToshowitagainAttrbshC:\ABC Shutdowns:shutsdownyourpc Shutdownr:restartsyourpc Shutdownl:logoff Shutdowna:abortshutdown,sometimesanerrorhappensandyougetawindows tellingyouthatyourpcwillshutdownorrestartinfewseconds,youcantypethistoabort theshutdown,youcantypeitinRun. Netstat:youcanseeyourconnectionstoremotecomputers,typenetstatntoviewthe ipsinsteadofhosts. Youcanfindallcommandbytypinghelpinthecmd.Andtogethelpforaeachcommand typeaterit/?Exampleattrib/? HelpfulToolsForEveryHacker: Cain&Abel:http://www.oxid.it/cain.html IPscanner:http://www.angryip.org/ Portscanner:http://www.nmap.org/ Vulnerabilityscanner:

http://www.nessus.org/ ResourceHacker:usedtoviewandmodifywindowsexecutablesources http://www.soft32.com/download_3568.html http://www.softpedia.com/get/Programming...cker.shtml MacMakeup:changethemacofyourinterfaces http://www.gorlani.com/publicprj/macmake...makeup.asp http://www.softpedia.com/get/NetworkToo...keup.shtml Wireshark:knownbeforeasetherealaverygoodsniffer: http://www.wireshark.org/ PasswordRecoveryTools: http://www.nirsoft.net/ Downloadallwindowspasswordrecoverytools http://www.nirsoft.net/packages/passrec.zip SIWGetdetailedsysteminformationhardwareandsoftware: http://www.gtopala.com/siwdownload.html DownloadSysinternalsToolslikeprocessexplorerandfilemonitorandregistry

monitor: http://technet.microsoft.com/enus/sysin...42062.aspx MetasploitFramework: http://www.metasploit.com/framework/download/ OfflineNTPasswordandRegistryeditor: http://pogostick.net/~pnh/ntpasswd/ Brutus(bruteforcer): http://www.hoobie.net/brutus/brutusdownload.html Hydra(bruteforcer): http://hydra.hellug.gr/download.html Crackedregistryeditor(youcanedittheregistryevenifitsdisabled): http://www.mediafire.com/file/u30jy1ym4o...editor.rar reply quote 01March201005:34PM

You might also like