Pages

Saturday, January 7, 2012

COMPLETE GUIDE TO BASIC HACKING FOR NEWBIES



First of all I wanna tell you that hacking is a art. I am teaching you this art so that you can make yourself more secure. I don't want you to use my techniques to harm others because hackers never harm others, crackers do. And we are Hackers not cracker.

There are 5 easy steps to learn Hacking :-

1. Take all safety Measures to hide yourself from target.

There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can.

I am mentioning few important tricks below :-

  • Use Hide Ip Software :- This software will help you to hide your IP address.
  • Use Firewall :- Firewall secure your computer as well as restrict any personal information from going outside.
  • Use Proxy servers :- Whenever you want to surf the computer of your target use proxy servers.
  • Use others username and password :- Try to avoid using your own user name and password for internet connection. Learn the technique to get other's user name and password.

2. Find out the IP Address of Target Computer.

  • what is Ip address :- It's full form is Internet Protocol Address. Protocol means the way computer talks to each other and Internet protocol means , way in which two computer talks to each on internet. So the complete meaning of Ip address is address of a computer who wants to talk to other computers on internet.
    • There are two important things about ip address :-
      • it is unique for every computer.
      • it is needed every time we connect to internet.
      • Get full details about IP here whatismyipaddress.com

  • Use of IP address in Hacking :- Ip address is one of the most important part of hacking. To learn its importance in hacking first of all we need to know what is hacking. All i can say here is that if we don't know the ip address of target computer we can't able to move single step forward in getting access to target computer.
  • Ways to find out IP address :-
    • Ping
    • tracert
    • dns query

3.Gather information about target computer such as its operating system ,time,date etc etc .

  • What 's the need ?
    • To be able to know weaknesses of target computer.
    • To exploit those weakness.
    • Learn more how we can exploit it.
  • How to gather information?
    • Telnet
    • Dns Query
    • Port Scan
    • tracert

4.Use Search engine (according to information obtained from above steps) to get tools which will help us to hack target computer.

Search engines like google are very close friends of hackers. If we do all the things mentioned above we know exactly where vulnerability lies in target computer. To use that vulnerability we search for available tools on google.com. After downloading specific tools we need IP Address of target computer ( we already know) to get access on other computer.


5. Leave one or two files on the target computer so to get easy access in future.
To get access again and again hackers usually leave files on target computer. For eg Net cat which allow them to get access again and again. Download netcat.

The next thing to do is learn programming. I recommend learning C++ first because it will help you understand a lot about programming, it’s easy to use, and is a lot like the other programming languages you should also learn. Read these books:
  • Teach Yourself C++ in 21 Days: the name says it all
  • Learning Perl: an AMAZING book on learning Perl
  • Programming Perl: the next step after Learning Perl
  • Perl Cookbook: the next step after Programming Perl
  • Core Java (Volume I & II): these books are by the makers of Java. Java is a really cool language to say the least, but you should at least learn C++ before so you can understand classes.
  1. learn to program
  2. learn how the internet works
  3. learn how unix/linux works


Now, you may be saying I may have been a bit hypocritical by saying not to ask how to hack but to ask about installing Linux. The thing is that Linux people are usually pretty nice, and the people who are Linux gurus want more than anything for Linux to prosper, and are willing to help you out. Oh, by the way, if you’ve installed Linux the way you want it (which does not include throwing you Linux box out the window and yelling, “I LIKE THIS JUST FINE!”), congratulations. You have now earned my respect.
Okay, I mentioned kiddie scripts earlier, and I’ll follow up on it now. Kiddie Scripts are auto hacking programs that will do all the work for you. You don’t want that. I do condone downloading them and learning from them, but don’t become a script kiddie. The only place they go in life is jail (not where you want to be).
Now, you should know a great deal about hacking. You have a compendium of information at your fingertips with a mental index. You want the best advice? Don’t hack. Odds are, you will get caught, and then it goes down on your criminal record, and unless you did something fan-fucking-tastic, like hacking the white house security cameras and get video of Slick Willie getting a BJ, you can pretty much kiss your computer future goodbye, cuz no one will hire a convicted hacker. If you do hack, be a white hat hacker. For example, upon breaking into a site, leave a note maybe including how to contact you (not through the phones, mail, real email address etc., do it through a hotmail account or something) or how to fix it. They may be nice enough to offer you a job! That’s right, there are some people who get paid to hack and do what they love.
In conclusion, you may have noticed that this was not a real guide to hacking. That’s because there is no one resource for hacking. This was a guide to LEARNING how to hack, which, if you want to be a real hacker, you will have to do. There is no one way to hack. (If so, it would be a lot easier for system administrators to keep you out!) It’s a variety of different tricks as well as the ability to keep up with current vulnerabilities in software and hardware. You should also learn how to program. Even though Kevin Mitnick was infamous among the hacker culture for being the most wanted cracker, he couldn’t even write his own exploits! That’s pretty sad. Please use whatever information you have wisely and responsibly, and distribute it only to people who are worthy of it.


From : kinghackz.net

No comments:

Post a Comment