how to hack!

Download How to Hack!

Post on 14-Jan-2015

4.159 views

Category:

Technology

4 download

Embed Size (px)

DESCRIPTION

How to hack a short presentation by Arun and Gitesh.......................... For more please like this or send me message

TRANSCRIPT

  • 1. Google Internet Web Browser http://www.google.com/Giggle SearchGoogle[ Hack The hacker before they hack you ]

2. Your Page Name Internet Web Browserhttp://www.google.co.in/group-d%504128%slide%index=114212%search/ Giggle SearchSearch results Who is a hacker?In the media the word "hacker" is often used, for what I would call a"cracker", someone that breaks into systems to damage it, or for thepurpose of getting illegitimate access to resources. Now the question arises that what do you mean by hacking or cracker? Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creators original purpose. 3. Your Page Name Internet Web Browserhttp://www.google.co.in/group-d%504128%slide%index=114212%search/ Giggle SearchSearch results Hacking Types Index Well there are many types of hacking but we will tell you about three of them which are as follows :-> 1. Windows Hacking 1. NetBIOS 2. Cracking Windows Passwords 3. Countermeasures 2. Programming 1. Do I really need it? 2. Where should I start? 3. Best way to learn 3. Passwords Hacking 1. Password Cracking 2. Phishing 4. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/ Giggle SearchHow to hack with Gitesh and Arun Windows Hacking How to use Net Bios1.Open command prompt ( start > run > cmd)2. In the command prompt use the net view commandExample: C:>net view 59.43.45.212____________3. After succeeding, use the net use command in the command prompt.The net use is another netbiosIndex command which makes it possible to hack remote drives or printers.Example-1:1. Windows HackingC:>net use D: 59.43.45.212F1. NetBIOS 2. Cracking WindowsExample-2:Passwords C:>net use G: 59.43.45.212SharedDocs 3. Countermeasures Example-3:C:>net use I: 59.43.45.212Myprint2. Programming4. After succeeding your computer will give a message that The command completed successfully. Once1. Do I really need it? you get the above message you are only one step away from hacking the computer.2. Where should I start?[ad code=1 align=center]3. Best way to learnNow open My Computer you will see a new Hard-Disk drive(Shared) with the specified name. You canopen it and access remote computers Hard-Drive. Y ou can copy files , music, folders etc. from victims hard-3. Passwordsdrive. You can delete/modify data on victims hard-drive only if WRITE-ACCESS is enabled on victims system.Hacking1. Password CrackingYou can access files folders quickly through Command Prompt.2. Phishing 5. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/Giggle SearchHow to hack with Gitesh and ArunWindows HackingCracking windows Password 1. Download Ophcrack LiveCD 2. This program is now an ISO image. Just burn it with Nero or whatever youre already using for burning images( for burning only ISO images download this burning program ISORecorder ) 3. Now reboot your computer with the CD inside (if the CD will not boot you need to set the boot priority inside BIOS, so that the CD-ROM is the first in the list)____________ 4. A menu like this will appear:Index1. Windows Hacking1. NetBIOS 2. Cracking WindowsPasswords 3. Countermeasures2. Programming1. Do I really need it?2. Where should I start? 5. Hit or wait six seconds to boot into the Ophcrack Graphic mode. If something goes3. Best way to learn wrong and the screen wont show the Graphics, restart and go into the Ophcrack Graphic VESA3. Passwords mode. If this also fails, go into Ophcrack Text mode.Hacking6. Once it ophcrack loads completely, it will automatically get your Windows password hashes and1. Password Cracking begin the cracking process.2. Phishing 6. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/Giggle SearchHow to hack with Gitesh and Arun Windows HackingCountermeasures There are a couple things you can do to prevent NetBIOS and Ophcrack password cracking attacks. 1. To keep computer from being a target of NetBIOS attacks, simply disable file and printer sharing. In Windows Vista, it is disabled by default but you must do a little work in Windows XP. Go to Start -> Control Panel -> Network Connections.____________ Double click on your active connection. In my case it is the Wireless Network Connection 2.Index Click on Properties.1. Windows Hacking If File and Printer Sharing is selected, deselect it and click1. NetBIOS 2. Cracking WindowsPasswords 3. Countermeasures2. Programming1. Do I really need it?2. Where should I start?3. Best way to learn3. PasswordsHacking1. Password Cracking2. Phishing 7. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/Giggle SearchHow to hack with Gitesh and Arun Programming Do I really need it? & where should I start?Do I Really Need It?You might be asking yourself, do I even need to learn a programming language? The answer to that is both yesand no. It all depends on what your goals are. Nowadays, with all the point and click programs out there, youcan be a fairly good ethical hacker without knowing any programming. You can do some effective hacking if youunderstand all of the security tools very well. Even if you understand whats going on in the background ofthese programs, most people will still classify you as a script kiddie. Personally I think you should learn some____________programming. Even if its the very basics, itll give you a much better understanding of whats going on. Also,Index once you learn how to program well, youll be able to develop your own exploits, which is great in many ways:1. Windows Hacking1. Youll be considered an elite hacker.1. NetBIOS2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The 2. Cracking Windowsblack hat would be able to take down thousands of machines before anyone discovers and patches thePasswords 3. Countermeasuresvulnerability.3. You will feel so much more satisfied having created your own program or exploit. I promise you this.2. ProgrammingSo my advice is, dont settle for being a point and click hacker. Take some time to understand even just the1. Do I really need it? basics of programming and an entire new world of hacking will open up to you.2. Where should I start?Where should I start?3. Best way to learnMany people finally decide that they are going to begin learning a programming language, but dont knowwhere to start. I believe that before you begin to learn a programming language, you should first master HTML3. Passwords(HyperText Markup Language). HTML is part of what makes up all of the website pages you see on the internet.Hacking HTML is very easy to learn and itll get you used to looking at source code.1. Password Cracking From there I would suggest starting your2. Phishingprogramming life with C. C is one of the most popular languages, and it is what makes up the majority of theexploits out there today. C also makes up some of the most powerful hacking programs and viruses that are outthere today. 8. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/Giggle SearchHow to hack with Gitesh and Arun Programming Best way to learnBest way to learnSo how should I go about learning the programming language of my choice?1. Purchase a beginners book on your programming language. Before you choose the book, make sure you readthe reviews to make sure its a good choice.2. It is important that once you begin learning the programming language through your book, you dont takebig breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest____________of the book.Index 3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying1. Windows Hackingwhat you learn.1. NetBIOS4. When something difficult comes up or something that makes no sense to you, dont avoid or skip it. Instead 2. Cracking Windowsembrace it! This is how you actually learn. If you still dont understand it after going over it multiple times, findPasswords 3. Countermeasuressomeone that can help you.5. Join a programming forum. Search for a website on your programming language that has a large user base.2. ProgrammingThere will be many professionals on there that will be able to help you when you get stuck.1. Do I really need it? 6. Practice. Practice Practice. Think of ideas for fun programs that you could make and program them!2. Where should I start?3. Best way to learn3. PasswordsHacking1. Password Cracking2. Phishing 9. Google Internet Web Browserhttp://www.how-to-hack-with-arun.com/Giggle SearchHow to hack with Gitesh and Arun Password Hacking Password CrackingBefore we get into cracking passwords with programs, I will explain a couple old-fashioned ways to obtainsomeones password.Shoulder SurfingWhen you type in your password make sure there is no one behind you attempting to peak. If there is, turnaround and drop kick him/her in the face. No not really. Also, make sure you dont keep any sticky notes layingaround that have your password or password hints on them.____________GuessingIndex To prevent this attack from happening, never use a password like your birth date, your mothers maiden1. Windows Hackingname, your pets name, your spouses name, or anything that someone may be able to guess.1. NetBIOSDictionary Attacks 2. Cracking WindowsDictionary attacks are very simple to prevent. Dont use a password that is in the dictionary. Some people mayPasswords 3. Countermeasuresthink that if they use a word from the dictionary but replace most of the letters with a number, then they aresafe. They are not. There are 1337 speak dictionarys out there too. Basically what 1337 speak is, is changing a2. Programmingword like animal to 4n1m41. For a secure password, I would recommend using a phrase such as1. Do I really need it? doyoulikecheese?2. Where should I start?Brute-force Attacks3. Best way to learnBrute-force attacks may be prevented by creating a very long password and using many num