Hello There, Guest!

l Register
Current time: 03-28-2024, 08:00 PM
facebook twitter youtube google+ feedburner
  • http://tricksduniya.com
  • Welcome the world of CRYPTO CURRENCY
  • visit daily
  • For Whatsapp Official Group Contact Our Modrate
  • Mr. Paramjit Singh = 08295205000
  • Mr. Mack = 08295943112


Tricks Duniya -ONLINE SHOPPING GUIDE, MOBILE TRICKS, ANDROID TRICKS, HACKING > RULEBRAKER ZONE > Ethical Hacking > tutorial > [Mega-Project] How to be a Hacker | The Ultimate Guide [Mega-Project] >

 Replies: 0    views: 710
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
 [Mega-Project] How to be a Hacker | The Ultimate Guide [Mega-Project]
Download App
03-12-2015, 11:17 PM,
Offline
Administrator
Joined: Nov 2014
Mesajlar : 609
Konular:
Rep Puanı: 7

Points: 0₹
Points: 0₹
#1
[Mega-Project] How to be a Hacker | The Ultimate Guide [Mega-Project]

                        [Image: 4mDzv.png]
                                       [Image: OfXPK.jpg]


 ╥
 ║
About


Table of Contents


Introduction


What is a Hacker?


What is Hacking?


The List


Where to Start


Inspiration


[Image: yn91t.jpg]



[align] These days we keep hearing more and more
stories of hacking. Anonymous, hacking huge corporations | People all around
the world turning on their computers, just to find that their website has been
hacked | A programmer spending months creating a marvelous program, only
to find out that thousands of people are getting it for free. Maybe you have
the potential to be one of these hackers, but you can't find a good place to
start | Maybe you have been misled, and are going in the wrong direction.
Whatever the case is, this guide is for you.

Always remember that your journey is never over; No matter how good you get, there is still more to be learned.




[Image: yF2Bo.png]

Knowing what a hacker is is obviously the first step to becoming one. If you ask any regular person
what a hacker is, they will most likely just tell you "Someone that messes up computers and gives you viruses”. They also think that it is just like in the movies, where a hacker just pushes a couple buttons on a keyboard and they instantly break into any system in the world that they want. If you think about it, that is ridiculous, but the media is making look like something it's not. Hacking, in it's essence, just means: Modifying something to benefit the user. Yep, that's it. A lot of people will tell you that hacking is only done in cyberspace, but electronics in general are a hub of hacking. A lot of people think hacking is all bad, but that is not the case.

There are 3 main types of hackers:


[Image: ggOoF.jpg]

These are the bad guys; the ones that you hear about on the news. They hack for personal gain, and destroy other people's computers and networks for fun. This makes up a large portion of the hacking community, because when people hear about hackers on the TV, they think it's cool and so they try it. There are many other motives that may be the cause of a black hat, such as greed or revenge.


[Image: MCob9.jpg]

Gray Hat hackers are the people who fall in-between white hats and black hats. They usually won't go out of their way to be bad, but may do something illegal every now and then. Another difference between gray hats and white hats is that white hat hackers get permission to pentest on a company or website and then they tell the owners about the
vulnerabilities, while gray hat hackers will do it without permission, and possibly even release the exploit to the public.


[Image: BigI4.jpg]

The good guys! White hats dedicate their time to securing the Internet and making it a safe place for everyone. They are rivals with the black hats, and try to patch up the exploits that they make. Good white hats have years of experience in computer security, and can fix almost any computer problem.

[Image: 9mhbG.jpg]

A lot of people spend long periods of time just trying to decide what kind of hacker they will be. I
personally don't think it matters. I don't put any specific hat on myself, because I feel that it is just a
limitation. For example, if I was to say that I am going to be a white hat, then I may be limiting myself
to just do security related things. I myself choose to just hack how I want, and let other hackers decide what hat they think I am.


[Image: hVsxk.jpg]

So now that you know what a hacker is, you may be asking what is considered “hacking”. That is not easily answered.

This section will attempt to cover:
• What is hacking?
• What are the benefits of different hacking styles?
• How do I know if I am already a hacker?


[Image: 9mhbG.jpg]

Many people come to the dark side of hacking because of lust. They seek revenge. Or they want to show off. Hacking was never meant to be something that people used for a malicious purpose, but it evolved into that (see A History of Hacking). Preforming a Denial of Service (DoS) attack is not considered hacking. Using programs that other people have created is not considered hacking (with the exception of an operating system/web browser/etc.). Copying a code that someone else gives you is not hacking, unless you are modifying it yourself and know what you are doing to it. If you are just following a tutorial that you found on the Internet (with the exception of a guide like this that tells you 'how to be a hacker', as apposed to 'how to hack') then you are not really hacking. If you are using a common exploit, then you are not hacking, but if you are developing a new exploit you are.

There are multiple styles of hacking, and I basically covered them in Chapter 1, but to say them in
different terms, I would say that you can either:

• Hack for glory
• Hack for money
• Hack for revenge
• Hack for security
• Hack because you have to


[Image: w995S.jpg]

You want everyone to know your name. A form of lust. Greed. You want to destroy or build
systems and you want everyone to be damn sure it was you that did it.


[Image: fWzeB.jpg]

Pros:

• You will be remembered for a long time (Depending on what you did)
• You will have a taste of fame
• People will fear you
• Some people may love you

Cons:

• You will get caught
• A lot of people will dislike you
• The consequence can be worse than the benefits
• Prison... People get raped there.


[Image: 1MHZ3.jpg]

You are either a sort of cyber-bounty-hunter, or you are offering assistance in exchange for money. This is taking your skills that you have worked hard to get and trying to get some pay out of it. Usually illegal work is in play.


[Image: fWzeB.jpg]

Pros:

• People will pay you for it
• You may actually get some decent practice to keep your skills sharp

Cons:

• Doing these illegal acts can get you in trouble
• The person hiring you may be undercover, and it could all be a trap
• There is always the risk of getting scammed


[Image: Ht2ch.jpg]

Your girlfriend dumped you. Rage is filling your soul. What is the one thing that she can't live without? Her Social Networking account? Lets hack it. This is an example of hacking for revenge. Although I personally don't believe in this kind of hacking, it is one of the most popular reasons.


[Image: fWzeB.jpg]

Pros:

• You can savor the sweet taste of revenge and watch that person suffer

Cons:

• The person could report you to the police
• You could have had a decent friendship with that person, but you just ruined it
• They could get you back for it later


[Image: 0VTPJ.jpg]

This basically defines a white hat hacker. Security hacking is all about finding exploits in your own system and then finding a way to patch them (This method is called penetration testing). Your cause it to fight off black hats, and to make the Internet/cyberspace a safe place for everyone.


[Image: fWzeB.jpg]

Pros:

• There will be very little chance of you getting a virus
• You will learn a lot about security and computers in general

Cons:

• You might get bored


[Image: 4quqM.jpg]

I am referring to an actual job. What? Didn't think that the people that work for Google or Microsoft are hackers? Most people that work in one of those companies are a sort of hacker.


[Image: fWzeB.jpg]

Pros:

• You are hacking for a living, what more could you ask for
• You may get to see software that won't be released for months
• You might get free products, or at least a discount

Cons:

• Maybe you hate your job
• You could have a bad boss
• You might have a small paycheck


[Image: 9mhbG.jpg]

So how do you know if you are a hacker already? Well basically if another, well respected, member of the hacking community considers you a hacker, then you are a hacker. Hacking is not about degree, it is all based off of experience and achievements. So if you are a well known, helpful member of the community, then you are probably a hacker. “How do I help out?” you may ask. Well, in a number of ways.

• Teach new hacklings how to hack
• Test and debug software
• Help develop programs
• Release open sourced software
• Give out free guides and tutorials

Those are the basic few that will get your status up. But don't limit yourself to those, those are just the most common ways. Be creative. The more you can do for others the better.


[Image: u0CtL.jpg]

As I see it, hacking is made up of a list; a list of things to learn. Instead of making up some fancy name for it, I’m going to call it “The List”. The list is basically every piece of hacking-related knowledge, compiled into, well, a list. As a hacker, you look at the list, and choose which item listed you would like to try. Then you master it. Every time you master a skill, you can check it off of the list, and move on to a new skill. You have not mastered hacking until there is nothing left on the list. Sadly though, that has never been done. The reason for this, is that the list is eternally growing.

Here I will show you a basic list, which is by no means, complete.

● Remote Administration Tools (RATs)
● Keyloggers
● Encryption
● Decryption
● Proxies
● Socks
● Virtual Private Networks (VPNs)
● Virtual Private Servers (VPSs)
● Windows
● Linux
● Unix
● FreeBSD
● All of the programming languages (C++, Java, C#, VB.NET, etc)
● Exploitation
● Structured Query Language Injection (SQLi)
● Cross Site Scripting (XSS)
● Remote File Inclusion (RFI)
● Local File Inclusion (LFI)
● Cracking
● Website Design
● Computer Security
● Network Administration
● Social Engineering (SEing)

I could go on, but for the sake of boredom, I’ll leave it at that. Now, we have a nice little list set up here, and looking through it, even that would take a long time to master. Lets be crazily optimistic and say that it only took you 4 months to master each item on the list. Since there are 23 things, it would be:

23 x 4 = 92 months 92 / 12 = [b]7 years and 6 months!

That is an insane amount of time. With that said, I’ll leave you with a quote:

“In order to master anything, at least 10 years of practice must be put into it”

That doesn’t just mean that it is going to take you 10 years to be a hacker, but think about how many skills you have to master! I will admit, some skills can be mastered faster, but others will take that long. And it’s the combination of all of these skills that make a successful hacker.


[Image: 9mhbG.jpg]

So you’re probably asking yourself, “How do I chose which item to pick first off of the list?” It really depends on personal preference and what you want to do. For example, if you simply want to create a successful website in the future, you may want to learn about web site design,
but if you want to do something a little bit more malicious, you may want to learn how to use MetaSploit, and use/write exploits. There are plenty of good places to start off on the list, but a lot of people may not know where to start. Let's take a look at some things that you may want to begin with.


[Image: RRWLI.jpg]



[Image: q2nV6.jpg]

Html is a very basic web-based programming language. HTML stands for HyperText Markup Language, and is the basic building block for most websites. It is a great starting point for
beginners, as it helps gain an understanding of both the Internet, and programming. The HTML code for a website can be viewed by right clicking anywhere on the page, and clicking “View Page source”

Pros:

● Will help you further you career as a web designer
● Helps you gain an understanding of the Internet
● Helps you to understand how websites are made

Cons:

● Can be more boring than going and hacking into someones computer
● If you never make a website, then you might not have as much use for knowing HTML

Some good tutorials can be found here.


[Image: sCmR3.jpg]

RAT is an acronym which stands for Remote Administration Tool. Wikipedia defines a RAT as:

A Remote Administration Tool (a RAT) is used to remotely connect and manage a single or
multiple computers with a variety of software tools, such as:

● Screen/camera capture or image control
● File management (download/upload/execute/etc.)
● Shell control (from command prompt)
● Computer control (power off/on/log off if remote feature is supported)
● Registry management (query/add/delete/modify)
● Other software product-specific functions

Its primary function is for one computer operator to gain access to remote PCs. One computer will run the "client" software application, while the other computer(s) operate as the "host(s)". RATs themselves are illegal, because they are used mostly for malicious purposes, but there
are actual legal RATs. The thing that makes some RATs legal is permission. Legal Remote Administration Tools, such as TeamViewer, require the other computer to accept the incoming connection. In addition, legal RATs don’t have any malicious features built into them.

Pros:
● Can give you access to sensitive data, such as bank account info
● Will give temporary satisfaction
● Bragging rights if you have infected enough people

Cons:

● Can get in serious trouble if you are caught

Tutorials can be found throughout the web, but a RAT is a program, and programs are everchanging.
Therefore, if I post a link to a guide, it may be outdated by the time you are reading this.


[Image: h6l93.jpg]

Cryptography is not so much a method of hacking, but it will definitely help you along the way. Cryptography is basically the act of encrypting/decrypting something (ex. a file) so that wandering eyes can’t see it. To explain encryption and decryption a little bit more, refer to this
picture:

[Image: 525px-public_key_encryption.png]

[Image: cert-rsa-encryption.jpg]

A good tool to use to encrypt your computer is TrueCrypt.

Main Features:

[/b]

[b]Hidden volume (steganography) and hidden operating system.
More information about the features of TrueCrypt may be found in the documentation.

Direct quote from the Truecrypt website.


To understand the different kinds of encryption methods, I recommend you take the time to read:

http://en.wikipedia.org/wiki/Encryption
http://www.rainbowskill.com/computers/th...rocess.php


[Image: YSUIf.jpg]

Website hacking is, obviously, the art of hacking websites. This can be done in numerous ways:

● SQL Injection
● XSS
● RFI
● LFI


[Image: b1pz8.jpg]

(Structured Query Language Injection)
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

Definition from http://en.wikipedia.org/



[Image: YkiqT.jpg]

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out on websites accounted for roughly 80% of all security vulnerabilities documented by Symantec as of 2007.[1] Their effect may range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner.

Definition from http://en.wikipedia.org/



[Image: EZ7UH.jpg]

Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file, but depending on the severity, to list a few it can lead to:

● Code execution on the web server
● Code execution on the client-side such as JavaScript which can lead to other attacks such as cross site scripting (XSS).
● Denial of Service (DoS)
● Data Theft/Manipulation

Definition from http://en.wikipedia.org/



[Image: lcyFh.jpg]

Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. A typical example of a PHP script vulnerable to LFI is as follows:

$file = $_GET['file'];
if(isset($file))
{
include("pages/$file");
}
else
{
include("index.php");
}
?>

Definition from http://hakipedia.com/



Possible helpful links


http://thehackerlounge.blogspot.com/2009...mysql.html

http://ferruh.mavituna.com/sql-injection...sheet-oku/

http://www.w3schools.com/sql/default.asp

http://www.steve.org.uk/Security/XSS/Tutorial/

http://r00tsecurity.org/forums/topic/104...erability/

http://penetrationengineer.blogspot.com/...usion.html

http://www.youtube.com/watch?v=3PtZcYFsmGY

http://elitehackerz.net/hacking-tutorial...orial.html

http://hakipedia.com/index.php/Category:...on_Hacking

https://www.owasp.org/index.php/Attacks

As a web site dev, it is also important to know how to defend your site against these kind of
attacks. For help on securing your site, refer to these links:

http://web.appstorm.net/roundups/self-pu...r-website/

http://www.onlinesecurityauthority.com/t...m-hackers/


[Image: gJS7Q.png]

Another programming start. Batch has been the starting point of a large amount of hackers. Batch refers to the Windows command line (So do this if you are using the Windows operating system). If you see things online that say “CMD hacks” “Batch viruses” or “Notepad Hacks” then you are seeing people talk about batch. Basically, it is used by opening a blank text document, and entering the script you want, and saving it as a .bat file rather than a .txt. Windows implemented this so that macros could be run on the system that would drastically reduce the time it takes to complete a task, but many new hackers took advantage of this, and use it in malicious ways.

Great sources for batch:

http://www.youtube.com/

http://www.ericphelps.com/batch/

http://www.google.com/


[Image: fBfZr.jpg]

Everyone needs to be inspired in order to do something. I constantly find myself drifting from the path that I want to be on, and going backwards instead of forwards. Here I will show you a few things that might keep you motivated to keep going when it's getting rough.

[/b]
  • Strive to be the best: I always want to be the best hacker. Who doesn't? Whenever you feel like you don't want to do something, remember that while you are goofing off, other people are studying and working their ass off to be better than you. A lot of people also think that they have all the time in the world. This is completely untrue, because even a lifetime isn't long enough to master everything. Don't put things off, do it now.

  • Movies: I personally don't watch movies or TV very much, because I feel like I'm wasting my time, but some movies can actually be helpful. If you find a movie about hackers (Or even just one with a scene like that in it) then it may inspire you to go and be like that person. Something like The Social Network is a good one, because it is a lot more realistic than something like the classic movie Hackers (I actually love that movie)

  • The Hacker Manifesto: Just read it.


    [Image: pi4UN.png]


[b]
Those are just a couple things that motivate me, but things might be the complete opposite for you. What motivates you to continue your journey as a hacker?
[/b]

[/align]


admin signature
                                Heart TricksDuniya.com Heart
                    keep Visiting TricksDuniya
              Don't Forgot to Register Yourself!



03-12-2015, 11:17 PM
Reply
« Next Oldest | Next Newest »
Users browsing this thread: 1 Guest(s)



Forum Jump:

Powered By Mack Doun
© 2015-2024 Paramjit Singh.
TricksDuniya theme TricksDuniya © 2015.