You are on page 1of 11

EVERYTHINGUNEEDTOSTARTUPON HACKING!!!

Mustread
Categories>HackRelated Page1 13

m0ksh
Seniorfounder 11posts

0permalink

HeyGuys ,ThisTutorialismadebymeanditsforeverybeginnerhere,thiswill helpthemtostarthacking.thebestoperatingsystemusedforhackingisLinux,youcan downloadaveryusefullinuxdistributionfromherehttp://www.backtracklinux.org/it

containseverythingahackerneeds.

Hereswhatyoushoulddo: 1readlotsoftutorials(especiallyonhackforums) 2practicethetutorialsyoulearned 3learnHTML(ithelpsahackeralot)http://www.w3schools.com/ 4learnaprogramminglanguage(startwithpythonorvisualbasic) Checkthisthreadbybignoob: http://www.hackforums.net/showthread.php?tid=207223 LaterlearnmoreadvancedprogramminglanguageslikeC++ InthisGuide: 1TypesofHackers 2NetbiosHacking 3Definitionofsometerms 4BasicCommandPrompt(cmd)commands 5Toolsthatyoushouldhave

6Usefulthreads TypesOfHackers: 1TheBlackHat(alsoknownascrackers)theyattackcomputersystemsforprofitorfunor forothercauses,theydistributevirusesworms 2TheWhiteHat(EthicalHacker)theyarecomputersecurityexpertsspecializedin penetrationtesting,usuallytheyarehiredbycompaniestoprotecttheirsystems. 3TheGrayHat(combinationbetweentheblackandthewhitehat,youcantknowonwhat sidetheyare) NetBiosHacking(NetworkBasicInput/OutputSystem)itsthemostsimpleandeasy wayforhackingremotecomputers,itcanbeusedforreadingorwritingtoaremote computerorcanbeusedfordenialofserviceattack.Firstyouneedaportscannerlike angryiphttp://www.angryip.org/scanarangeofIPs(netbiossessionrunsonport139)lets assumethatyoufoundanIP192.168.0.140firstyouneedtogetsomeinformation(goto Runandtypecmd)nowinthecommandprompttypenbtstata(IP)inthiscasenbtstata 192.168.0.140youllgetsomethinglikethis

Ifwefindthehexcode<20>thatmeansfilesharingisenabled.Nexttypeinthecmdnet view\\192.168.0.140Youllgetalistofsharedresourcesoranerror(accessisdenied)If

yougetalistoftheshareddrivesorfolders(assumingthatyouhavefoundtheC:driveis shared)TypeinthecmdnetuseK:\\192.168.0.140\C: K:representsthedrivethatwillbecreatedonyourcomputer,thatwhenyouaccessityou canviewtheC:driveofthevictimNowletsgoback,ifyougetaccessisdenied(wehave tobeloggedin),onwindows95/98andWindowsMEwecancrackthepasswordusing PQWAK(ofcoursethisisold,butsomepeoplestillusetheseversionsonWindows) downloadPQWAK2Here: http://www.mediafire.com/file/w0tqgzcdtdo/pqwak2.zip aftercrackingthepasswordyoucanloginandcontinue:netuseK:\\(IP)\(Sharename) password:*****\user:***** inothercaseswhenyoucantusePQWAK,wecanjustuseanullsessionaccessto gatherinformationaboutamachine.Using:netuse\\(IP)\ipc$/user: HeresaTutorialbyh4ckingURLife: http://www.hackforums.net/showthread.php?tid=173385 Definitionofsometerms:(somedefinitionsaretakenfromwikipedia.organd whatis.com) DNS:(DomainNameSystem)adatabasesystemthattranslatesdomainnamestoip addresses,soinsteadoftypingtheipaddressofhackforumsinourbrowserwetype http://www.hackforums.netandtheDNSredirectsustotheipoftheserver.Hackerscan spooftheDNSacommonsoftwareusedisCain&Abel,forexamplewhenausertypes http://www.google.comhegetsthepagehttp://www.yahoo.com,andalsoitcanbeused forphishing.

TrojanHorse:aTrojanisdesignedtoallowaremoteaccessbyahackertoatarget computer(itscomposedfromtwopartstheserverandtheclient)theserverisinstalledon thevictimsmachine,andtheclientisusedbythehackertoconnecttotheserver. Thingsthatcanbeperformedbyahackeronatargetcomputer: 1datatheft 2installationofasoftware 3downloadingoruploadingfiles 4keylogging 5viewingscreenshotsAndmore Keylogger:(keystrokelogging)akeyloggerisasoftwareusedforloggingkeystrokesand savingthemtoatextfileorsendingthemtoanemailaddress,itrunsinthebackgroundin astealthmannersothevictimwontnoticewhatshappening. YoucanuseagreatkeyloggerfoundhereonHFwhichisAlbertinoKeylogger. http://www.hackforums.net/showthread.php?tid=219628 KeyloggingTutorial: http://www.hackforums.net/showthread.php?tid=29821 Bruteforceattack:isamethodusedtocrackencrypteddatasuchaspasswordsby tryingallpossiblecombinationsofcharacters,bruteforcingtakesalongtimeand sometimescantcrackthepassword.

Dictionaryattack:isamethodusedtocrackapasswordorakeythattriesallthewords inadictionary,thedifferencebetweenadictionaryattackandabruteforceattackisthatit usesapredefinedlistofwords. RAT:(RemoteAdministrationTool,RemoteAccessTrojan)aRATisamalwarethat includesaBackdoorforadministrativecontroloverthetargetcomputer,givestheattacker almostfullcontrolovertheinfectedcomputer,infectedcomputersarecalledzombies. Botnet:(RobotNetwork,ZombieArmy)botnetsarenetworksofinfectedcomputers controlledbytheattackerusedsendspamandviruses. Crypter:ACrypterisaprogramsthatmakesotherprogramsUDorFUDbyencrypting them.(UDmeansundetectablebyantivirusprograms,andFUDmeansfullyundetectable) Binder:ABinderisaprogramthatmakesotherprogramsUDorFUDbybindingthem withanotherfile. Backdoor:isameansofaccesstoacomputerthatbypassessecuritymechanism,Iother wordsabackdoorisamethodofbypassingnormalauthenticationorsecuringremote access,abackdoorcanbeaformofaninstalledprogramoramodificationtoanexisting program. Worm:awormisaselfreplicatingvirusthatdoesnotalterfiles,butresidesinactive memoryandduplicateitself,sometimesawormsjobistotakeadvantageofabackdoor createdbyanearlierattack. Vulnerability:(securityHole)avulnerabilityisaweaknessinthesystem,itsalso classifiedasasecurityrisk. Exploit:anexploitisanattackonacomputersystemthattakesadvantageofa vulnerability,thetermexploitreferstotheactofsuccessfullymakinganattack. Agreattoolusedforexploitingvulnerabilitiesismetasploithttp://www.metasploit.com/

Proxy:aproxyserverisaserverthatactsasanintermediaryforrequestsfromclients seekingresourcesfromotherserver,heretheclientsIPisnotshown,insteadtheIP addressoftheproxyserverisshown,hackersuseproxiestoprotectthemselvesandhide theirIPaddress. FindyourIPandTraceotherIPsHere:http://www.ipadress.com/ DoSAttack:(DenialOfServiceAttack)aDoSattackisanattempttomakeacomputer resourceunavailabletoitsintentedusers,onecommonmethodofattackinvolves saturatingthetargetmachinewithexternalcommunicationrequests. FindthedifferencebetweenDosandDDosHere: http://www.hackforums.net/showthread.php?tid=64591 Phishing:phishingisafraudprocessofattemptingtoacquiresensitiveinformationlike usernamesandpasswordsorcreditcarddetails,itconsistsofmakingawebsitethat looksliketherealwebsitethatvictimsuse,andsendingfakeemailstothemtotrickthem, sotheyentertheirsensitiveinformationonyourfakewebsitewhichareloggedinalogfile ontheserver. SQLinjection:isacodeinjectiontechniquethatexploitsasecurityvulnerabilityoccurring inthedatabaselayerofanapplication. SQLinjectiontutorials: http://www.hackforums.net/showthread.php?tid=50356 http://www.hackforums.net/showthread.php?tid=45621 Socialengineering:istheactofmanipulatingpeopleintorevealinginformationor trickingthevictimtoperformingactionsthatarebeneficialtotheuser.

AgreatguidebySolid: http://www.hackforums.net/showthread.php?tid=67193 SomeCommandpromptcommandsthatyoushouldknow: cd:changethedirectoryLateryoulldownloadtoolsthatdoesnthaveagraphicaluse interfaceGUI,andwhenyouclickonthemthecmdopensandthencloses,forexample hydra.Exampletogoandrunhydrabruteforcerwhichisonthedesktopinthefolderhydra: Cddesktop\hydraHydra.exe ping(IP/Host):checkstoseeifahostisalive Example:Ping192.168.0.1 Or Pinghttp://www.google.com Tracert(host):tracesahostandfindstheIPofthehost Example:Tracerthttp://www.google.com ipconfig:displaysthecurrentipaddressofyourcomputerandtheDNSserver Attrib:hidesfilestypeattrib/?forhelpExample(hideafolderABCinthedriveC:) Attrib+s+hC:\ABC

ToshowitagainAttrbshC:\ABC Shutdowns:shutsdownyourpc Shutdownr:restartsyourpc Shutdownl:logoff Shutdowna:abortshutdown,sometimesanerrorhappensandyougetawindows tellingyouthatyourpcwillshutdownorrestartinfewseconds,youcantypethistoabort theshutdown,youcantypeitinRun. Netstat:youcanseeyourconnectionstoremotecomputers,typenetstatntoviewthe ipsinsteadofhosts. Youcanfindallcommandbytypinghelpinthecmd.Andtogethelpforaeachcommand typeaterit/?Exampleattrib/? HelpfulToolsForEveryHacker: Cain&Abel:http://www.oxid.it/cain.html IPscanner:http://www.angryip.org/ Portscanner:http://www.nmap.org/ Vulnerabilityscanner:

http://www.nessus.org/ ResourceHacker:usedtoviewandmodifywindowsexecutablesources http://www.soft32.com/download_3568.html http://www.softpedia.com/get/Programming...cker.shtml MacMakeup:changethemacofyourinterfaces http://www.gorlani.com/publicprj/macmake...makeup.asp http://www.softpedia.com/get/NetworkToo...keup.shtml Wireshark:knownbeforeasetherealaverygoodsniffer: http://www.wireshark.org/ PasswordRecoveryTools: http://www.nirsoft.net/ Downloadallwindowspasswordrecoverytools http://www.nirsoft.net/packages/passrec.zip SIWGetdetailedsysteminformationhardwareandsoftware: http://www.gtopala.com/siwdownload.html DownloadSysinternalsToolslikeprocessexplorerandfilemonitorandregistry

monitor: http://technet.microsoft.com/enus/sysin...42062.aspx MetasploitFramework: http://www.metasploit.com/framework/download/ OfflineNTPasswordandRegistryeditor: http://pogostick.net/~pnh/ntpasswd/ Brutus(bruteforcer): http://www.hoobie.net/brutus/brutusdownload.html Hydra(bruteforcer): http://hydra.hellug.gr/download.html Crackedregistryeditor(youcanedittheregistryevenifitsdisabled): http://www.mediafire.com/file/u30jy1ym4o...editor.rar reply quote 01March201005:34PM

You might also like