Date post: | 03-Apr-2018 |
Category: |
Documents |
Upload: | tamthientai |
View: | 215 times |
Download: | 0 times |
of 51
7/28/2019 Basics of hacking.pdf
1/51
Basics of hacking
A history of hacking
Hacking has been around formore than a century. In the
1870s, several teenagers wereflung off the country's brandnew phone system by enraged
authorities. Here's a peek at
how busy hackers have been inthe past 35 years.
Early 1960s
University facilities with hugemainframe computers,likeMIT's artificial
7/28/2019 Basics of hacking.pdf
2/51
intelligence lab, become
staging grounds for hackers. Atfirst, "hacker" was a positiveterm for a person with a mastery
of computers who could push
programs beyond what theywere designed to do.
Early 1970s
John Draper makes along-distance call for
free by blowing aprecise tone into a
telephone that tells the phonesystem to open a line. Draper
JohnDraper
7/28/2019 Basics of hacking.pdf
3/51
discovered the whistle as a
give-away in a box of children'scereal. Draper, who later earnsthe handle "Captain Crunch," isarrested repeatedly for phone
tampering throughout the1970s.
Yippie social movementstarts YIPL/TAP(Youth
International PartyLine/Technical Assistance
Program) magazine to
helpphone hackers (called"phreaks") make free long-
distance calls.
7/28/2019 Basics of hacking.pdf
4/51
Two members of
California's HomebrewComputer Clubbegin making"blue boxes," devices used to
hack into the phone system. The
members, who adopt handles"Berkeley Blue" (Steve Jobs)
and "Oak Toebark" (SteveWozniak), later go on to
found Apple Computer.
Early 1980s
AuthorWilliam Gibson coins
the term "cyberspace" in a
7/28/2019 Basics of hacking.pdf
5/51
science fiction novel
calledNeuromancer.In one of the first arrests ofhackers, the FBI busts the
Milwaukee-based 414s (named
after the local area code) aftermembers are accused of60
computer break-ins rangingfrom Memorial Sloan-KetteringCancer Center to Los Alamos
National Laboratory.
Comprehensive Crime
Control Act gives Secret
7/28/2019 Basics of hacking.pdf
6/51
Servicejurisdiction over credit
card and computer fraud.Two hacker groups form,the Legion of Doomin the
United States and the Chaos
Computer Club in Germany.
2600: The Hacker Quarterly isfounded to share tips on phone
and computer hacking.Late 1980s
The Computer Fraud and
Abuse Act gives more clout tofederal authorities.
7/28/2019 Basics of hacking.pdf
7/51
Computer Emergency
Response Team is formed byU.S. defense agencies. Based atCarnegie Mellon University in
Pittsburgh, its mission is to
investigate the growing volumeof attacks on computer
networks.
At 25, veteran hackerKevinMitnicksecretly monitors the
e-mail of MCI and DigitalEquipment security officials. He
is convicted of damagingcomputers and stealing software
7/28/2019 Basics of hacking.pdf
8/51
and is sentenced to one year in
prison.First National Bank of Chicago
is the victim of a $70-millioncomputer heist.
An Indiana hacker knownas "Fry Guy" -- so named for
hacking McDonald's -- is raided
by law enforcement. A similarsweep occurs in Atlanta
forLegion of Doom hackersknown by the handles
"Prophet," "Leftist" and"Urvile."
7/28/2019 Basics of hacking.pdf
9/51
Early 1990s
AfterAT&T long-distanceservice crashes on MartinLuther King Jr. Day, law
enforcement starts a national
crackdownon hackers. The fedsnab St. Louis' "Knight
Lightning" and in New Yorkgrab Masters of Deception trio"Phiber Optik," " Acid Phreak"and "Scorpion." Fellow hacker"Eric Bloodaxe" is picked up in
Austin, Texas.
7/28/2019 Basics of hacking.pdf
10/51
7/28/2019 Basics of hacking.pdf
11/51
the Korean Atomic Research
Institute. Scotland Yard nabs"Data Stream," a 16-year-oldBritish teenager who curls up inthe fetal position when seized.
A Texas A&M professorreceives death threats after ahacker logs on to his computer
from off-campus and sends20,000 racist e-mail messages
using his Internet address.
7/28/2019 Basics of hacking.pdf
12/51
In a highly publicized
case, Kevin Mitnickisarrested (again), thistime in Raleigh, N.C.,
after he is tracked
down via computerbyTsutomu
Shimomura at the SanDiego Supercomputer
Center.
Late 1990s
Hackers break into and
defacefederal Websites, including the U.S.
Kevin
Mitnick[photo /
AP ]
7/28/2019 Basics of hacking.pdf
13/51
Department of Justice, U.S. Air
Force, CIA, NASA and others.Report by the General
Accounting Office findsDefense Department computers
sustained 250,000 attacksbyhackers in 1995 alone.
A Canadian hacker group called
the Brotherhood, angry athackers being falsely accused of
electronically stalking aCanadian family, break into the
Canadian Broadcasting Corp.Web site and leave
7/28/2019 Basics of hacking.pdf
14/51
message: "The media are
liars."Family's own 15-year-oldson eventually is identified asstalking culprit.
Hackers pierce security
in Microsoft's NT operatingsystem to illustrate its
weaknesses.
Popular Internet search engineYahoo! is hit by hackers
claiming a "logic bomb" willgo off in the PCs of Yahoo!'s
users on Christmas Day 1997unless Kevin Mitnick is
7/28/2019 Basics of hacking.pdf
15/51
released from prison. "There is
no virus," Yahoo!spokeswoman Diane Hunt said.
1998
Anti-hacker ad runs duringSuper Bowl XXXII. TheNetwork Associates ad, costing
$1.3-million for 30 seconds,
shows two Russian missile silocrewmen worrying that acomputer order to launch
missiles may have come from a
hacker. They decide to blow upthe world anyway.
7/28/2019 Basics of hacking.pdf
16/51
In January, the federal Bureau
of Labor Statistics is inundatedfor days with hundreds ofthousands offake informationrequests, a hacker attack called
"spamming."Hackers break into United
Nation's Children Fund Website, threatening a "holocaust" if
Kevin Mitnick is not freed.
Hackers claim to have brokeninto a Pentagon network and
stolen software for a military
7/28/2019 Basics of hacking.pdf
17/51
satellite system. They threaten
to sell the software to terrorists.The U.S. Justice Department
unveils NationalInfrastructure Protection
Center, which is given amission to protect the nation's
telecommunications, technologyand transportation systems from
hackers.
Hacker group L0pht, intestimony before Congress,
warns it could shut downnationwide access to the
7/28/2019 Basics of hacking.pdf
18/51
Internet in less than 30
minutes. The group urgesstronger security measures
Basics of hacking
As frank I want to say that aswe all comes new to hacking
every one runs for the hacking
methods no one cares for the
basics of the hacking
Most of hackers some of them
learn just learn methods and
start making money from
companies from bug bounty
7/28/2019 Basics of hacking.pdf
19/51
programs but actually in real the
got nothing even if you askthem to tell you something
about the basics of hacking then
ignore you or get offline so now
today I am going make a
research paper on the basics of
hacking..
So lets start
So in real what hacking is ???
7/28/2019 Basics of hacking.pdf
20/51
Hacking has two meanings one
is a hobby or profession to playwith computers other meaning
I think everyone knows it is to
break into the computer system
and websites without letting
admin knows about it
Now days hacking is famous
among all youngsters everyone
wants to be hacker ;)
So know what is hacker:-A
person who involves into the
hacking means a person that
7/28/2019 Basics of hacking.pdf
21/51
hack the sites computers and
other security like atm cardsweb cameras etc. that is called
as a hacker. And the person
who got lot of information
regarding computers about
every field is called as a hacker
.But in today according to some
lamer the person who defaces
more sites is called as a hacker
but that is bullshit in actual all
hackers love to do defacing buta real hacker just love to break
7/28/2019 Basics of hacking.pdf
22/51
best securities not to deface
thousands of sites
So now types of hackers:-
7/28/2019 Basics of hacking.pdf
23/51
There are three basic types of
hacker*white hat hackers
*black hat hackers
*grey hat hackers
*elite hackers
*script kiddies(noobs)
So now their brief description
****White hat hackers:-so
white hat hackers are those whowork for the organizations they
just find vulnerabilities in the
7/28/2019 Basics of hacking.pdf
24/51
site exploit them and then report
them to the company to patch itor otherwise they themselves
patch it so no one other can
hack it by that way ;) I am
myself a white but some time I
am also a black hat for my
country so come back to topic
now a days lot of white hat
hackers are in market. They are
also called as ethical hackers
7/28/2019 Basics of hacking.pdf
25/51
****Black hat hackers:-
So black hat hackers are thosehackers who hacks for his own
profit for fame money and
knowledge I like most the blackhat hackers they just love to
destroy things they like to
destroy best securities and steal
data like credit card numbers
source codes and a lot other
things and then they just sell it
in black market or they just leak
the data to gain some respect in
7/28/2019 Basics of hacking.pdf
26/51
hackers community and for
name and fame they are alsocalled as cyber criminals and
they are just master minds they
create their own virus,
softwares to hack
****Grey hat hackers:-Grey hat hackers is that who
exhibit traits from both white
hat hacker and black hathackers means to say elite
hacker lies in the middle of the
7/28/2019 Basics of hacking.pdf
27/51
white hat hackers and black hat
hackers he just break securitythen report to admin other wise
he sell data like black hats or
some times he patch security by
taking money from the
company ;)
****Elite hackers:-
As with any society, better than average
people are rewarded for their talent and
treated as special. This social status
among the hacker underground, the elite(or, according to the hacker language that
eventually devolved into leetspeak,
7/28/2019 Basics of hacking.pdf
28/51
31337) are the hackers among hackers in
this subculture of sorts. They're the
masters of deception that have a solid
reputation among their peers as the
cream of the hacker crop.
**** Script kiddies:- script kiddies are
those who have not even a single
knowledge of the processes no doubt
they can be good but they just hack by
some other peoples method not by their
own they just learn method not the damn
working behind the screen so we can say
them that they are perfect so I am always
says try to be the black hat or white hat
create things by yourself and use them
7/28/2019 Basics of hacking.pdf
29/51
So now main types of hacking:-
*Website hacking
*Computer hacking
*Atm machines hacking*Webcams hacking
7/28/2019 Basics of hacking.pdf
30/51
*Lockers hacking that are
controlled by the softwares
So now brief description:-
*Website Hacking:-so now
these days website hacking is
most famous among hackers
every hacker loves to breaksecurities of websites and
deface them defacing means
to change the index page ofthe site so when other people
open the site they see that the
7/28/2019 Basics of hacking.pdf
31/51
website is hacked by this or
that hacker ;-like as shownbelow
So the basic method to hackwebsites are sqli Xss (cross
7/28/2019 Basics of hacking.pdf
32/51
site scripting), lfi (local file
inclusion) and some zerodays and other methods
.
These day most powerful
method considered as is ddos
the server that not only effect
the server but also suspend or
destroy all the sites hosted on
that server ;)
7/28/2019 Basics of hacking.pdf
33/51
****Computer Hacking:- so
this is the second most
common type of hacking..
So what is computer hacking
its simple means clear from
name hacking computers
which notifying the admin
means hack into the computer
of someone to steal important
information like Zero daysprivate tutorials , private
7/28/2019 Basics of hacking.pdf
34/51
information like some
hackers break into fbicomputers to leak their
emails and database and also
to stole some secrets ;)
The common things used to
hack computers are
keyloggers, fuds, rats ,
Also metasploit armitage
used to hack computers
Metasploit is used by lot of
hackers to hack computersbecause it is easy to use and
7/28/2019 Basics of hacking.pdf
35/51
operate + It has lot of
exploits remote exploits andothers which helps to hack
into victim computers and
give us the full access
****Atms Hacking:-
In today everything is
possible some master minds
also learn to hack atm
machines with the software
and other technical methods
7/28/2019 Basics of hacking.pdf
36/51
So here I like to mention
hacking from computer ismostly used but some times
technical things also used
But in coming future
everything can be hacked
through computer . in coming
future the house doors
everything is connected to
internet then the hackers try
to hack the full house so they
got full access to it and theyuse it as they want :D nice
7/28/2019 Basics of hacking.pdf
37/51
so come back they hackers
hack the atms by softwareinstalled into computer and
also with the help of the
technical material the person
who watched terminator first
part can easily understand me
at this point
Then come ****Webcams
hacking and also lockers
hacking connected withsoftware :- so once you got
7/28/2019 Basics of hacking.pdf
38/51
access to victim pc you got
everything in your hands likeevery computerized is
connected to a specific
computer established near to
it if you get access to it they
you can easily do whatever
you want so now comes to
webcams hacking so now
days this is another famous
thing webcams hacking is
done to leak some hackerinformation mostly but some
7/28/2019 Basics of hacking.pdf
39/51
damn idiots hack girls
webcam you can understandwhat I want to say ^_^ so
now come back to point once
you get access to pc you can
hack webcams lockers
easily
so then comes :- Id hacking:-
So now you all will be happy
at last you come to knowabout how to hack ids lolz
7/28/2019 Basics of hacking.pdf
40/51
most of the hackers start from
the ids hacking and the theygot emerged in hacking like
mads take my example
frankly saying my main cause
of coming into hacking is that
I was hacked by some one
and I got his ip due to
security setting on Facebook
then I take swear that until I
hacked him back uptil that I
wont even eat or sleep anddue to this strong
7/28/2019 Basics of hacking.pdf
41/51
determination I hacked him
and fucked him back ;) soevery hacker has story to
come in hacking so coming
back to topic so ids hacking
is most interesting so main
methods to do it are
keylogging, phishing , social
eng. , and a lot methods you
can also find zero days to
hack ids like some time
before the hackers found zeroday to hack facebook id but
7/28/2019 Basics of hacking.pdf
42/51
its patched as soon as the fb
team now about it so hereare the basics methods to
hack ids
7/28/2019 Basics of hacking.pdf
43/51
So now proceeding what the
basics things a person need tobecome hacker:-
A person needs a brain.exe
Knowledge about
programming languages like
c, c++, java, python, perl,
ruby etc.
Other things some great
friends like I got Shritam
bhai Code injector , Nipun
Jaswal , chetan soni , codieroot , amar Shankar , pivot
7/28/2019 Basics of hacking.pdf
44/51
etc and the main thing you
need is that you baiscs mustbe stong .
So in basics the main things
come
1. what is hacking described
above
2. what are hacekrs.
3. what is sever
4. what is network
5 . good in networking
7/28/2019 Basics of hacking.pdf
45/51
6. what is internet? how it
works7. what is server I know
when you shell some site you
just run to deface it have you
ever see what is inside that
server how it works once you
going to explore the server
you got many things
8. how things works never
learn methods see how they
work and try to implementyours like when I am new I
7/28/2019 Basics of hacking.pdf
46/51
understand keylogging and
modified it So by this way you keep your
base hard
So whats the hacker needs
most to learn:- some books ,
time , coffee and the
internet you see google baba
ji is great you ask anything he
gives back you results you
can use google as you best
friend to fuck biggest sites :Pif you know how to use it
7/28/2019 Basics of hacking.pdf
47/51
Youtube is second baba ji so
ask from them never wastetime from asking other little
of them will tell you not the
most :P
What hacker needs in his life
?????
Like everyone he wants to be
famous name and fame and
that world knows him Takeexample of kevin mitnick he
7/28/2019 Basics of hacking.pdf
48/51
is famous and most wanted
hacker of us So at last I want to say that be
good and learn yourself teac
yourself you is a biggest teacherwho can teach yourself
I have not explained the
methods because I am goingto create a separate tutorial
on that topic about the
methods to hack different
things id website and some
more useful stuff
7/28/2019 Basics of hacking.pdf
49/51
Contact me Got any doubt :[email protected]
7/28/2019 Basics of hacking.pdf
50/51
FORREADING
7/28/2019 Basics of hacking.pdf
51/51