BASIC HACKING

How do I hack?
- There is no easy way how to hack. Google is your best friend.. REMEMBER THAT! Read any information you can find on hacking. Read hacking forums and check out hacking websites. Learn a programming language like C++. Get a book like Hacking for Dummies which will teach you alot.
What do I need to be able to hack?
- Firstly you need to understand how your computers operating system works, networks and protocols works, security settings and general PC knowledge. After you understand how it works you need hacking tools which helps you to hack.
What is command prompt (cmd- the little dos Windows)?
Go START, RUN and type in: "cmd"
What can I do in cmd?
You can can do various things with it like run exploits or do a ping request.
Why does some of the hacking tools I download just close itself when I open them?
- Lot's of hacking tools are DOS based and has to be run through CMD. If you double click on the program it will open a DOS box and automaticly close the box. From CMD you can navigate to the directory which your hacking tool is stored in and run it from there. Other hacking tools are GUI ( graphical user interface ) based and it will open like a normal Windows based program.

What is a IP address?
- Every computer connected to the Internet or some network has a IP address. Goto START, RUN and type in "cmd" then type in "ipconfig" it will show you your IP adress or adresses. It will look something like this : 81.35.99.84. IP = internet protocol.What can I do with a IP?
Well you need someone's IP before you can hack, portscan or DOS them.
What is IP ping ?
- It's a command you can use to check if someone's IP address is online, to check it they connected to the Internet or a network. In command prompt type in "ping 192.168.0.21" - this will show you something like this : Pinging 192.168.0.21 with 32 bytes of data:
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Ping statistics for 192.168.0.21:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
That means you can succesfully PING IP 192.168.0.21 which means the IP is online. If you get a message "request timed out" it means the IP is not online. Bytes=32 is the ammount of data which was sent to the host. Time<1ms is the time the host took to reply.
Why can't I ping a certain IP?
Either the IP is not online/ in use or the person your trying to ping is running a firewall which blocks ping requests or maybe your firewall is blocking outgoing ping requests
What is 127.0.0.1 IP?
- It is your PC's local loopback IP address.
Why do I have two IP addresses when I do a ipconfig?
Well if your on a local LAN (Local area network) you will have a IP like 192.168.0.1. If your also directly connected to the internet you will have another IP address like 80.87.34.56. 192.168.0.1 is your local IP which you use to comunicate with your local internet network (lan) and 80.87.34.56 is your internet IP.
What is a static and dynamic IP address?
- Static means permanent set IP address
- like a website will have a static IP address, it never changes. Dynamic means temporary IP address - dailing up to the Internet with a modem or most ADSL connections has dynamic IP's. Everytime you logon to the Internet your ISP ( Internet Service Provider ) will issue you a new IP address.
I have sent someone a trojan but I cannot connect to their PC?
- Either they are running a firewall which blocks you from connecting to their PC, or they are connected to the internet through a router.
What do I do when someone is behind a router and I want to control their PC with a trojan?
- You will need to use a trojan which uses reverse connections - meaning you don't connect to the host, the host connects to you. Bifrost is a trojan which has the mentioned function. Remember when someone is behind a router and your using IPstealer to get hold of their IP address, you are actually getting their routers IP, not their actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will have a difirent IP - their LAN IP.
How do I check if my own PC is infected with a trojan?
- Do a port scan on your PC and check which ports are open. If you find any open ports in this trojan port list you might be infected with a trojan. Download the trojan you think you might be infected with and connect to that specified port.
What is a router?
A device which is used to route data on a network. a Router decides where certain traffic should be sent to.
What is a firewall?
Its a software or hardware device which can block or permit certain ports or IP's or certain kinds of data.
What is a port and what can I do with it?
Every program running on your PC which has some network function uses a specific port to send an receive data though. If you do a port scan you will see which ports are open on the host you scanned. Port 80 is normally a web server. Port 21 a FTP server ect ect.. Trojans also uses ports. Check this list of trojan ports, if you find an open port in this list, the host might be infected with a trojan, download the trojan and try connecting to the port.
How do I do a port scan?
You need a program like superscan to do a portscan. Then all you do is add the ip you want to scan.
Why do you want to scan ports?
If you scan a PC with a port scanner, it will show you which programs or services are running on the PC.
Common ports:
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110
What is an exploit?
It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there.
How do I use a exploit?
You first need to compile the exploit with a program like Bloodshed C++ compiler. Then you can start the exploit through command prompt and see if the system your trying to exploit is vulnerable to that specific exploit. Scroll down for more information about exploits.
What is a exploit POC?
- POC stands for proof of concept and it the proof that a exploit works.
- It is when too much data is being sent to a host and it cannot handle all the data and disconnects from the Internet.
How do I see what connections is currently made to my PC?
- In cmd type in "netstat" - it will show you IP addresses of connections to your PC and what port it is using.
What is a MAC address?
- Its a hard coded number, almost like a name which is embedded into a network card. It identifies the manufacturer of the card and a unique number for the card. No two network cards in the world has the same MAC address.
How do I find out my own or someone else's MAC address?
Your own MAC = Goto cmd and type in "ipconfig /all"
MAC address looks something like this : 00-13-20-A3-0B-4C
Someone else's MAC address you need their IP address and then goto cmd and type in "nbtstat -a 192.168.0.5" or whatever IP they use. This will show you their MAC address as well as their currently logged on user.
What is a Windows Registry and how do I access it?
- Its where Windows stores most of the configurations of your operating system and most programs installed. You might used it to make a trojan server file you uploaded to the PC run automaticly when Windows starts up. To access the registry go START, RUN and type in "regedit"
Carefull what you change in the registry, it might screw up you PC.. First make a backup of the registry.
How do I hack a webpage/ web server?
Read the IIS hacking tutorial in the MISC download section on Windows Hacker. Remember not all webservers run IIS!
What is IIS?
It is Microsoft's web server. IIS - Internet information server. Most webservers run on port 80.
How do I check if a website is running on IIS?
- Telnet to the website URL through CMD - "telnet www.siteyouwanttochack.com 80"
Aug 24

MULTIPLE LOGIN IN YAHOO!!!!

You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps
1. Go to Start ----> Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test

3.On the right pane , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.


That's it done!!
Now close registry and restart yahoo messenger .For signing in with new id open another messenger .
Aug 24

Shutdown Your System in a Hurry SUPERFAST

If you need to shut down in a hurry-or if a frozen application prevents you from shutting down in the normal ways-you can use the following procedure. Be aware, however, that you won't get an opportunity to save open documents. To perform an emergency shutdown, press Ctrl+Alt+Del to display Task Manager. Open the Shut down menu and hold down the Ctrl key as you click the Turn Off command. Poof! If your computer is part of a domain, the procedure is similar. Press Ctrl+Alt+Del and then hold down Ctrl when you click Shut Down. In this situation, you'll get a warning message pointing out-quite correctly-that this should be used only as a last resort

ANOTHER WAY IS TO CREATE A FILE FOR THIS WORK
JUST RIGHT CLICK ON THE DESKTOP AND CLICK ON NEW>SHORTCUT>AND TYPE IN SHUTDOWN.EXE -S -T 3

Comments

  1. hey after reading this...........i learned a lot and i came to knw what else i need to learn..................thks for this lovely blog..................if u r free sir plz reply at k28809853@gmail.com

    ReplyDelete

Post a Comment

Popular posts from this blog

Getting Twitter Homeline using Prototype

Execute Simple MySql Queries in Joomla

What Is Bitcoin? 10 Facts You Should Know