LEARN HOW TO HACK

Discussion in 'DELETED POSTS' started by prof.vince, Nov 3, 2010.

Users Viewing Thread (Users: 0, Guests: 0)

    prof.vince Member

    Member Since:
    Oct 3, 2010
    Message Count:
    23
    Likes Received:
    0
    So, you want to learn how to hack?

    Sure u want to!

    Q: Are u ready to take the challenges?

    I am talking of premature H@cking or simple SQL injection.

    But the "REAL DEAL".

    I am not saying that u will know H@cking from here bt if u are Smart, it may take u of to like 5-10%.

    WHO IS A HACKER

    A hacker is someone who can spot vulnerabilities in web app and exploit them to his own benefit.

    Short for a definition u would say.

    I'm going to refer to every kind of computer as a box, and only as a box.
    This includes your PC, any server, supercomputers, nuclear silos, HAL9000,
    Michael Knight's car, The Matrix, etc.

    The systems we're going to hack (with permission) are plenty of normal users, whose
    don't have any remote idea about security, and the root. The root user is called
    superuser and is used by the admin to administer the system.

    I'm going to refer to the users of a system as lusers. Logically, I'll refer to
    the admin as superluser.


    Operating Systems

    ~~~~~~~~~~~~~~~~~

    Ok, I assume you own a x86 box (this means an intel processor or compatible) running windoze9x,
    or perhaps a mac (motorola) box running macOS.

    You can't hack with that. In order to hack, you'll need one of those UNIX derived operating
    systems.
    This is for two main reasons:

    -the internet is full of UNIX boxes (windoze NT boxes are really few) running webservers and
    so on. to hack one of them, you need a minimun knowledge of a UNIX system, and what's better
    than running it at home?

    -all the good H@cking tools and exploit codes are for UNIX. You won't be able to use them unless
    you're running some kind of it.

    Let's see where to find the unix you're interested on.

    The UNIX systems may be divided in two main groups:

    - commercial UNIXes
    - free opensource UNIXes

    A commercial unix's price is not like windoze's price, and it usually can't run on your box,
    so forget it.

    The free opensource UNIXes can also be divided in:
    - BSD
    These are older and difficult to use. The most secure OS (openBSD) is in this group.
    You don't want them unless you're planning to install a server on them.

    - Linux
    Easy to use, stable, secure, and optimized for your kind of box. that's what we need.

    I strongly suggest you to get the SuSE distribution of Linux.
    It's the best one as i think, and i added here some tips for SuSE, so all should be easier.

    Visit http://www.suse.de/ and look for a local store or order it online.
    (i know i said it the software was free, but not the CDs nor the manual nor the support.
    It is much cheaper than windoze anyway, and you are allowed to copy and distribute it)

    If you own an intel box, then order the PC version.

    If you own a mac box, then order the PowerPC version.

    Whatever you do, DON'T PICK THE COREL DISTRIBUTION, it sucks.

    It's possible you have problem with your hardware on the installation. Read the manual, ask
    for technical support or buy new hardware, just install it as you can.

    This is really important! READ THE MANUAL, or even buy a UNIX book.
    Books about TCP/IP and C programming are also useful.

    If you don't, you won't understand some things i'll explain later. And, of course, you'll
    never become a hacker if you don't read a lot of that 'literature'.

    prof.vince Member

    Member Since:
    Oct 3, 2010
    Message Count:
    23
    Likes Received:
    0
    the Internet
    ~~~~~~~~~~~~

    Yes! you wanted to hack, didn't you? do you want to hack your own box or what?
    You want to hack internet boxes! So lets connect to the internet.

    Yes, i know you've gotten this document from the internet, but that was with windoze
    and it was much easier. Now you're another person, someone who screams for knowledge and wisdom.
    You're a Linux user, and you gotta open your way to the Internet.

    You gotta make your Linux box to connect to the net,
    so go and set up your modem (using YaST2 in SuSE).

    Common problems:

    If your box doesn't detect any modems, that probably means that you have no modem installed
    :-D (not a joke!).

    Most PCI modems are NOT modems, but "winmodems". Winmodems, like all winhardware, are
    specifically designed to work ONLY on windoze. Don't blame linux, this happens because the
    winmodem has not a critical chip that makes it work. It works on windoze cause the vendor
    driver emulates that missing chip. And hat vendor driver is only available for windoze.


    ISA and external modems are more probably real modems, but not all of them.
    If you want to make sure wether a modem is or not a winmodem, visit http://start.at/modem.

    Then use your modem to connect to your ISP and you're on the net. (on SuSE, with wvdial)

    NOTE: Those strange and abnormal online services like aol are NOT ISPs. You cannot connect the
    internet with aol. You can't hack with aol. i don't like aol. aol sucks.
    Don't worry, we humans are not perfect, and it's probably not your fault. If that is your case,
    leave aol and get a real ISP. Then you'll be forgiven.


    Don't get busted
    ~~~~~~~~~~~~~~~~


    Let's suppose you haven't skipped everything below and your Linux bow is now connected to the net.

    It's now turn for the STEALTH. You won't get busted! just follow my advices and you'll be safe.

    - Don't hack
    this is the most effective stealth technique. not even the FBI can bust you. :-)
    If you choose this option, stop reading now, cause the rest is worthless and futile.

    - If you change a webpage, DON'T SIGN! not even with a fake name. they can trace you, find
    your own website oe email address, find your ISP, your phone number, your home...
    and you get busted!!

    - be PARANOID, don't talk about H@cking to anyone unless he is really interested in H@cking too.
    NEVER tell others you've hacked a box.

    - NEVER hack directly from your box (your_box --> victim's box).
    Always use a third box in the middle (your_box --> lame_box --> victim's box).

    Where lame_box is a previously hacked box or...a shell account box!
    A shell account is a service where you get control of a box WITHOUT H@cking it.
    There are a few places where shell accounts are given for free. One of them is nether.net.

    - Don't hack dangerous boxes until you're a real hacker.
    Which boxes are dangerous:
    Military boxes
    Government boxes
    Important and powerful companies' boxes
    Security companies' boxes
    Which boxes are NOT dangerous:
    Educational boxes (any .edu domain)
    Little companies' boxes
    Japanese boxes

    - Always connect to the internet through a free and anonymous ISP
    (did i tell you that AOL is NOT an ISP?)

    - Use phreking techniques to redirect calls and use others' lines for your ISP call.
    Then it'll be really difficult to trace you. This is not a guide to phreaking anyway.


    TCP ports and scanning
    ~~~~~~~~~~~~~~~~~~~~~~

    Do you got your stealth linux box connected to the internet (not aol)?
    Have you read the manual as i told you?


    Then we shall start with the damn real thing.

    First of all, you should know some things about the internet. It's based on the TPC/IP protocol,
    (and others)

    It works like this: every box has 65k connection PORTS. some of them are opened and waiting for
    your data to be sent.

    So you can open a connection and send data to any these ports. Those ports are associated with
    a service:

    Every service is hosted by a DAEMON. Commonly, a daemon or a server is a program that runs
    on the box, opens its port and offers their damn service.

    here are some common ports and their usual services (there are a lot more):

    Port number Common service Example daemon (d stands for daemon)
    21 FTP FTPd
    23 Telnet telnetd
    25 SMTP sendmail (yes!)
    80 HTTP apache
    110 POP3 qpop


    Example:
    when you visit the website http://www.host.com/luser/index.html, your browser does this:
    -it connects to the TCP port 80
    -it sends the string: "GET /HTTP/1.1 /luser/index.html" plus two 'intro'
    (it really sends a lot of things more, but that is the essential)
    -the host sends the html file

    The cool thing of daemons is they have really serious security bugs.

    That's why we want to know what daemons are running there, so...

    We need to know what ports are opened in the box we want to hack.

    How could we get that information?

    We gotta use a scanner. A scanner is a program that tries to
    connect to every port on the box and tells which of them are opened.

    The best scanner i can think of is nmap, created by Fyodor.
    You can get nmap from my site in tarball or rpm format.

    Let's install nmap from an .rpm packet.

    bash-2.03$ rpm -i nmap-2.53-1.i386.rpm

    then we run it:

    bash-2.03$ nmap -sS target.edu

    Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )
    Interesting ports on target.edu (xx.xx.xx.xx):
    (The 1518 ports scanned but not shown below are in state: closed)
    • GL Legend
    • Guru Member
    • Retired Moderator

    Al3ksA Retired Moderator

    Member Since:
    Sep 30, 2010
    Message Count:
    2,093
    Likes Received:
    12
    You are not alone.
    • Guru Member

    freshguy Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    484
    Likes Received:
    3
    pls teach me how to hack gmail,yahoo and hotmail acount plsssssssssssss
    • GL Legend
    • Guru Member

    RESISTANCE GL Legend

    Member Since:
    Oct 9, 2010
    Message Count:
    1,481
    Likes Received:
    1
    for i am here with yooouuuuuuuuuuu
    • Super Moderator
    • GL Senior Member
    • GL Legend
    • Guru Member

    EFCC Special Agent
    1. Free and Cheap Browsing Mastermind Group

    Member Since:
    Sep 30, 2010
    Message Count:
    6,580
    Likes Received:
    20
    every thing here look like cracker not hacker

    sponge Member

    Member Since:
    Oct 21, 2010
    Message Count:
    3
    Likes Received:
    0
    Na so

    @EFCC wether hacker or cracker thumbs up 2 thread owner. Continue chairman,we re wit u always
    • Super Moderator
    • GL Senior Member
    • GL Legend
    • Guru Member

    EFCC Special Agent
    1. Free and Cheap Browsing Mastermind Group

    Member Since:
    Sep 30, 2010
    Message Count:
    6,580
    Likes Received:
    20
    hmmmmm
    • Guru Member

    freshguy Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    484
    Likes Received:
    3
    pls teach me how to hack gmail,yahoo and
    hotmail acount plsssssssssssss
    • Guru Member

    SEAKPO Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    657
    Likes Received:
    0
    • GL Legend
    • Guru Member

    eleniyan Eleniyan...

    Member Since:
    Oct 2, 2010
    Message Count:
    1,419
    Likes Received:
    0
    9ce thread. bt give us d real tin + pm me ur numba abeg
    • Guru Member

    Drogba Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    397
    Likes Received:
    3
    nice one here bt continue oooh
    • Guru Member

    freshguy Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    484
    Likes Received:
    3
    i want 2 learn hw to hack email account.pls update

    Alves Member

    Member Since:
    Oct 1, 2010
    Message Count:
    964
    Likes Received:
    0
    A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:

    White Hat
    – These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

    Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.

    These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.

    Alves Member

    Member Since:
    Oct 1, 2010
    Message Count:
    964
    Likes Received:
    0
    Hacker Hierarchy

    Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no H@cking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.

    Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks

    Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.
    What does

    lorena007 Member

    Member Since:
    Oct 1, 2010
    Message Count:
    1,099
    Likes Received:
    0
    guy i need this thing oooooo. i beg pm your number make i arrange something with you. cos i need am.

    bayo4real Upcoming Guru

    Member Since:
    Sep 30, 2010
    Message Count:
    258
    Likes Received:
    6
    me i want to know how to hack muf sites 4 real

    1cutevee New Member

    Member Since:
    Oct 5, 2010
    Message Count:
    344
    Likes Received:
    0
    DIS STUFF HERE IS NOT HACK NOR CRACK....... ITS PURE COPY AND PASTE

    Alves Member

    Member Since:
    Oct 1, 2010
    Message Count:
    964
    Likes Received:
    0
    What have u Contributed Newbie
    • GL Senior Member
    • GL Legend
    • Guru Member

    PaUlaRO Strict Nigga!

    Member Since:
    Sep 30, 2010
    Message Count:
    10,415
    Likes Received:
    91
    NA TRUE U TALK ALVES

    CUTEVEE......ALWYZ APPRECIATE WT SOMEONE IS DOING.........SO AS TO ENABLE FORWARDNESS

    Alves Member

    Member Since:
    Oct 1, 2010
    Message Count:
    964
    Likes Received:
    0
    MORE tutorials to come
    • Guru Member

    SEAKPO Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    657
    Likes Received:
    0
    am with u

    1cutevee New Member

    Member Since:
    Oct 5, 2010
    Message Count:
    344
    Likes Received:
    0
    Alves y did u cal me newbie?, any networkin associate knws dis is nt H@cking or crackin, nd nt bcos i dnt contribute gives u d mind 2 cal any1 names!
    • GL Legend
    • Guru Member

    Xplora GL Legend

    Member Since:
    Sep 30, 2010
    Message Count:
    2,661
    Likes Received:
    0
    Funny.................................[sup]funny xo xo funny..........! (Newbie)[/sup]
    • GL Legend
    • Guru Member

    Xplora GL Legend

    Member Since:
    Sep 30, 2010
    Message Count:
    2,661
    Likes Received:
    0
    Alves, treasure what made u whole !!!!!!!!!!!!!! (CODE)
    • GL Legend
    • Guru Member

    FITZ GL Legend

    Member Since:
    Oct 1, 2010
    Message Count:
    3,366
    Likes Received:
    7
    Chai my brain don burst,dis one need make person go school go learn am?
    • Guru Member

    freshguy Guru Member

    Member Since:
    Sep 30, 2010
    Message Count:
    484
    Likes Received:
    3
    dead and rubbish thread

    1cutevee New Member

    Member Since:
    Oct 5, 2010
    Message Count:
    344
    Likes Received:
    0
    Xplora tnx 4 calling me names also!

    olarzz Member

    Member Since:
    Oct 3, 2010
    Message Count:
    41
    Likes Received:
    0
    Newbie is not a disease. Its one of the pain, to gain. From seed comes a fruit & from Newbie comes a Hacker.

    Alves Member

    Member Since:
    Oct 1, 2010
    Message Count:
    964
    Likes Received:
    0
    iTS TOO BAD THAT REASONABLE GUYS SMTIMES ACT LIKE MUGUS.


Share This Page