+ All Categories
Home > Documents > Basics of hacking.pdf

Basics of hacking.pdf

Date post: 03-Apr-2018
Category:
Upload: tamthientai
View: 215 times
Download: 0 times
Share this document with a friend

of 51

Transcript
  • 7/28/2019 Basics of hacking.pdf

    1/51

    Basics of hacking

    A history of hacking

    Hacking has been around formore than a century. In the

    1870s, several teenagers wereflung off the country's brandnew phone system by enraged

    authorities. Here's a peek at

    how busy hackers have been inthe past 35 years.

    Early 1960s

    University facilities with hugemainframe computers,likeMIT's artificial

  • 7/28/2019 Basics of hacking.pdf

    2/51

    intelligence lab, become

    staging grounds for hackers. Atfirst, "hacker" was a positiveterm for a person with a mastery

    of computers who could push

    programs beyond what theywere designed to do.

    Early 1970s

    John Draper makes along-distance call for

    free by blowing aprecise tone into a

    telephone that tells the phonesystem to open a line. Draper

    JohnDraper

  • 7/28/2019 Basics of hacking.pdf

    3/51

    discovered the whistle as a

    give-away in a box of children'scereal. Draper, who later earnsthe handle "Captain Crunch," isarrested repeatedly for phone

    tampering throughout the1970s.

    Yippie social movementstarts YIPL/TAP(Youth

    International PartyLine/Technical Assistance

    Program) magazine to

    helpphone hackers (called"phreaks") make free long-

    distance calls.

  • 7/28/2019 Basics of hacking.pdf

    4/51

    Two members of

    California's HomebrewComputer Clubbegin making"blue boxes," devices used to

    hack into the phone system. The

    members, who adopt handles"Berkeley Blue" (Steve Jobs)

    and "Oak Toebark" (SteveWozniak), later go on to

    found Apple Computer.

    Early 1980s

    AuthorWilliam Gibson coins

    the term "cyberspace" in a

  • 7/28/2019 Basics of hacking.pdf

    5/51

    science fiction novel

    calledNeuromancer.In one of the first arrests ofhackers, the FBI busts the

    Milwaukee-based 414s (named

    after the local area code) aftermembers are accused of60

    computer break-ins rangingfrom Memorial Sloan-KetteringCancer Center to Los Alamos

    National Laboratory.

    Comprehensive Crime

    Control Act gives Secret

  • 7/28/2019 Basics of hacking.pdf

    6/51

    Servicejurisdiction over credit

    card and computer fraud.Two hacker groups form,the Legion of Doomin the

    United States and the Chaos

    Computer Club in Germany.

    2600: The Hacker Quarterly isfounded to share tips on phone

    and computer hacking.Late 1980s

    The Computer Fraud and

    Abuse Act gives more clout tofederal authorities.

  • 7/28/2019 Basics of hacking.pdf

    7/51

    Computer Emergency

    Response Team is formed byU.S. defense agencies. Based atCarnegie Mellon University in

    Pittsburgh, its mission is to

    investigate the growing volumeof attacks on computer

    networks.

    At 25, veteran hackerKevinMitnicksecretly monitors the

    e-mail of MCI and DigitalEquipment security officials. He

    is convicted of damagingcomputers and stealing software

  • 7/28/2019 Basics of hacking.pdf

    8/51

    and is sentenced to one year in

    prison.First National Bank of Chicago

    is the victim of a $70-millioncomputer heist.

    An Indiana hacker knownas "Fry Guy" -- so named for

    hacking McDonald's -- is raided

    by law enforcement. A similarsweep occurs in Atlanta

    forLegion of Doom hackersknown by the handles

    "Prophet," "Leftist" and"Urvile."

  • 7/28/2019 Basics of hacking.pdf

    9/51

    Early 1990s

    AfterAT&T long-distanceservice crashes on MartinLuther King Jr. Day, law

    enforcement starts a national

    crackdownon hackers. The fedsnab St. Louis' "Knight

    Lightning" and in New Yorkgrab Masters of Deception trio"Phiber Optik," " Acid Phreak"and "Scorpion." Fellow hacker"Eric Bloodaxe" is picked up in

    Austin, Texas.

  • 7/28/2019 Basics of hacking.pdf

    10/51

  • 7/28/2019 Basics of hacking.pdf

    11/51

    the Korean Atomic Research

    Institute. Scotland Yard nabs"Data Stream," a 16-year-oldBritish teenager who curls up inthe fetal position when seized.

    A Texas A&M professorreceives death threats after ahacker logs on to his computer

    from off-campus and sends20,000 racist e-mail messages

    using his Internet address.

  • 7/28/2019 Basics of hacking.pdf

    12/51

    In a highly publicized

    case, Kevin Mitnickisarrested (again), thistime in Raleigh, N.C.,

    after he is tracked

    down via computerbyTsutomu

    Shimomura at the SanDiego Supercomputer

    Center.

    Late 1990s

    Hackers break into and

    defacefederal Websites, including the U.S.

    Kevin

    Mitnick[photo /

    AP ]

  • 7/28/2019 Basics of hacking.pdf

    13/51

    Department of Justice, U.S. Air

    Force, CIA, NASA and others.Report by the General

    Accounting Office findsDefense Department computers

    sustained 250,000 attacksbyhackers in 1995 alone.

    A Canadian hacker group called

    the Brotherhood, angry athackers being falsely accused of

    electronically stalking aCanadian family, break into the

    Canadian Broadcasting Corp.Web site and leave

  • 7/28/2019 Basics of hacking.pdf

    14/51

    message: "The media are

    liars."Family's own 15-year-oldson eventually is identified asstalking culprit.

    Hackers pierce security

    in Microsoft's NT operatingsystem to illustrate its

    weaknesses.

    Popular Internet search engineYahoo! is hit by hackers

    claiming a "logic bomb" willgo off in the PCs of Yahoo!'s

    users on Christmas Day 1997unless Kevin Mitnick is

  • 7/28/2019 Basics of hacking.pdf

    15/51

    released from prison. "There is

    no virus," Yahoo!spokeswoman Diane Hunt said.

    1998

    Anti-hacker ad runs duringSuper Bowl XXXII. TheNetwork Associates ad, costing

    $1.3-million for 30 seconds,

    shows two Russian missile silocrewmen worrying that acomputer order to launch

    missiles may have come from a

    hacker. They decide to blow upthe world anyway.

  • 7/28/2019 Basics of hacking.pdf

    16/51

    In January, the federal Bureau

    of Labor Statistics is inundatedfor days with hundreds ofthousands offake informationrequests, a hacker attack called

    "spamming."Hackers break into United

    Nation's Children Fund Website, threatening a "holocaust" if

    Kevin Mitnick is not freed.

    Hackers claim to have brokeninto a Pentagon network and

    stolen software for a military

  • 7/28/2019 Basics of hacking.pdf

    17/51

    satellite system. They threaten

    to sell the software to terrorists.The U.S. Justice Department

    unveils NationalInfrastructure Protection

    Center, which is given amission to protect the nation's

    telecommunications, technologyand transportation systems from

    hackers.

    Hacker group L0pht, intestimony before Congress,

    warns it could shut downnationwide access to the

  • 7/28/2019 Basics of hacking.pdf

    18/51

    Internet in less than 30

    minutes. The group urgesstronger security measures

    Basics of hacking

    As frank I want to say that aswe all comes new to hacking

    every one runs for the hacking

    methods no one cares for the

    basics of the hacking

    Most of hackers some of them

    learn just learn methods and

    start making money from

    companies from bug bounty

  • 7/28/2019 Basics of hacking.pdf

    19/51

    programs but actually in real the

    got nothing even if you askthem to tell you something

    about the basics of hacking then

    ignore you or get offline so now

    today I am going make a

    research paper on the basics of

    hacking..

    So lets start

    So in real what hacking is ???

  • 7/28/2019 Basics of hacking.pdf

    20/51

    Hacking has two meanings one

    is a hobby or profession to playwith computers other meaning

    I think everyone knows it is to

    break into the computer system

    and websites without letting

    admin knows about it

    Now days hacking is famous

    among all youngsters everyone

    wants to be hacker ;)

    So know what is hacker:-A

    person who involves into the

    hacking means a person that

  • 7/28/2019 Basics of hacking.pdf

    21/51

    hack the sites computers and

    other security like atm cardsweb cameras etc. that is called

    as a hacker. And the person

    who got lot of information

    regarding computers about

    every field is called as a hacker

    .But in today according to some

    lamer the person who defaces

    more sites is called as a hacker

    but that is bullshit in actual all

    hackers love to do defacing buta real hacker just love to break

  • 7/28/2019 Basics of hacking.pdf

    22/51

    best securities not to deface

    thousands of sites

    So now types of hackers:-

  • 7/28/2019 Basics of hacking.pdf

    23/51

    There are three basic types of

    hacker*white hat hackers

    *black hat hackers

    *grey hat hackers

    *elite hackers

    *script kiddies(noobs)

    So now their brief description

    ****White hat hackers:-so

    white hat hackers are those whowork for the organizations they

    just find vulnerabilities in the

  • 7/28/2019 Basics of hacking.pdf

    24/51

    site exploit them and then report

    them to the company to patch itor otherwise they themselves

    patch it so no one other can

    hack it by that way ;) I am

    myself a white but some time I

    am also a black hat for my

    country so come back to topic

    now a days lot of white hat

    hackers are in market. They are

    also called as ethical hackers

  • 7/28/2019 Basics of hacking.pdf

    25/51

    ****Black hat hackers:-

    So black hat hackers are thosehackers who hacks for his own

    profit for fame money and

    knowledge I like most the blackhat hackers they just love to

    destroy things they like to

    destroy best securities and steal

    data like credit card numbers

    source codes and a lot other

    things and then they just sell it

    in black market or they just leak

    the data to gain some respect in

  • 7/28/2019 Basics of hacking.pdf

    26/51

    hackers community and for

    name and fame they are alsocalled as cyber criminals and

    they are just master minds they

    create their own virus,

    softwares to hack

    ****Grey hat hackers:-Grey hat hackers is that who

    exhibit traits from both white

    hat hacker and black hathackers means to say elite

    hacker lies in the middle of the

  • 7/28/2019 Basics of hacking.pdf

    27/51

    white hat hackers and black hat

    hackers he just break securitythen report to admin other wise

    he sell data like black hats or

    some times he patch security by

    taking money from the

    company ;)

    ****Elite hackers:-

    As with any society, better than average

    people are rewarded for their talent and

    treated as special. This social status

    among the hacker underground, the elite(or, according to the hacker language that

    eventually devolved into leetspeak,

  • 7/28/2019 Basics of hacking.pdf

    28/51

    31337) are the hackers among hackers in

    this subculture of sorts. They're the

    masters of deception that have a solid

    reputation among their peers as the

    cream of the hacker crop.

    **** Script kiddies:- script kiddies are

    those who have not even a single

    knowledge of the processes no doubt

    they can be good but they just hack by

    some other peoples method not by their

    own they just learn method not the damn

    working behind the screen so we can say

    them that they are perfect so I am always

    says try to be the black hat or white hat

    create things by yourself and use them

  • 7/28/2019 Basics of hacking.pdf

    29/51

    So now main types of hacking:-

    *Website hacking

    *Computer hacking

    *Atm machines hacking*Webcams hacking

  • 7/28/2019 Basics of hacking.pdf

    30/51

    *Lockers hacking that are

    controlled by the softwares

    So now brief description:-

    *Website Hacking:-so now

    these days website hacking is

    most famous among hackers

    every hacker loves to breaksecurities of websites and

    deface them defacing means

    to change the index page ofthe site so when other people

    open the site they see that the

  • 7/28/2019 Basics of hacking.pdf

    31/51

    website is hacked by this or

    that hacker ;-like as shownbelow

    So the basic method to hackwebsites are sqli Xss (cross

  • 7/28/2019 Basics of hacking.pdf

    32/51

    site scripting), lfi (local file

    inclusion) and some zerodays and other methods

    .

    These day most powerful

    method considered as is ddos

    the server that not only effect

    the server but also suspend or

    destroy all the sites hosted on

    that server ;)

  • 7/28/2019 Basics of hacking.pdf

    33/51

    ****Computer Hacking:- so

    this is the second most

    common type of hacking..

    So what is computer hacking

    its simple means clear from

    name hacking computers

    which notifying the admin

    means hack into the computer

    of someone to steal important

    information like Zero daysprivate tutorials , private

  • 7/28/2019 Basics of hacking.pdf

    34/51

    information like some

    hackers break into fbicomputers to leak their

    emails and database and also

    to stole some secrets ;)

    The common things used to

    hack computers are

    keyloggers, fuds, rats ,

    Also metasploit armitage

    used to hack computers

    Metasploit is used by lot of

    hackers to hack computersbecause it is easy to use and

  • 7/28/2019 Basics of hacking.pdf

    35/51

    operate + It has lot of

    exploits remote exploits andothers which helps to hack

    into victim computers and

    give us the full access

    ****Atms Hacking:-

    In today everything is

    possible some master minds

    also learn to hack atm

    machines with the software

    and other technical methods

  • 7/28/2019 Basics of hacking.pdf

    36/51

    So here I like to mention

    hacking from computer ismostly used but some times

    technical things also used

    But in coming future

    everything can be hacked

    through computer . in coming

    future the house doors

    everything is connected to

    internet then the hackers try

    to hack the full house so they

    got full access to it and theyuse it as they want :D nice

  • 7/28/2019 Basics of hacking.pdf

    37/51

    so come back they hackers

    hack the atms by softwareinstalled into computer and

    also with the help of the

    technical material the person

    who watched terminator first

    part can easily understand me

    at this point

    Then come ****Webcams

    hacking and also lockers

    hacking connected withsoftware :- so once you got

  • 7/28/2019 Basics of hacking.pdf

    38/51

    access to victim pc you got

    everything in your hands likeevery computerized is

    connected to a specific

    computer established near to

    it if you get access to it they

    you can easily do whatever

    you want so now comes to

    webcams hacking so now

    days this is another famous

    thing webcams hacking is

    done to leak some hackerinformation mostly but some

  • 7/28/2019 Basics of hacking.pdf

    39/51

    damn idiots hack girls

    webcam you can understandwhat I want to say ^_^ so

    now come back to point once

    you get access to pc you can

    hack webcams lockers

    easily

    so then comes :- Id hacking:-

    So now you all will be happy

    at last you come to knowabout how to hack ids lolz

  • 7/28/2019 Basics of hacking.pdf

    40/51

    most of the hackers start from

    the ids hacking and the theygot emerged in hacking like

    mads take my example

    frankly saying my main cause

    of coming into hacking is that

    I was hacked by some one

    and I got his ip due to

    security setting on Facebook

    then I take swear that until I

    hacked him back uptil that I

    wont even eat or sleep anddue to this strong

  • 7/28/2019 Basics of hacking.pdf

    41/51

    determination I hacked him

    and fucked him back ;) soevery hacker has story to

    come in hacking so coming

    back to topic so ids hacking

    is most interesting so main

    methods to do it are

    keylogging, phishing , social

    eng. , and a lot methods you

    can also find zero days to

    hack ids like some time

    before the hackers found zeroday to hack facebook id but

  • 7/28/2019 Basics of hacking.pdf

    42/51

    its patched as soon as the fb

    team now about it so hereare the basics methods to

    hack ids

  • 7/28/2019 Basics of hacking.pdf

    43/51

    So now proceeding what the

    basics things a person need tobecome hacker:-

    A person needs a brain.exe

    Knowledge about

    programming languages like

    c, c++, java, python, perl,

    ruby etc.

    Other things some great

    friends like I got Shritam

    bhai Code injector , Nipun

    Jaswal , chetan soni , codieroot , amar Shankar , pivot

  • 7/28/2019 Basics of hacking.pdf

    44/51

    etc and the main thing you

    need is that you baiscs mustbe stong .

    So in basics the main things

    come

    1. what is hacking described

    above

    2. what are hacekrs.

    3. what is sever

    4. what is network

    5 . good in networking

  • 7/28/2019 Basics of hacking.pdf

    45/51

    6. what is internet? how it

    works7. what is server I know

    when you shell some site you

    just run to deface it have you

    ever see what is inside that

    server how it works once you

    going to explore the server

    you got many things

    8. how things works never

    learn methods see how they

    work and try to implementyours like when I am new I

  • 7/28/2019 Basics of hacking.pdf

    46/51

    understand keylogging and

    modified it So by this way you keep your

    base hard

    So whats the hacker needs

    most to learn:- some books ,

    time , coffee and the

    internet you see google baba

    ji is great you ask anything he

    gives back you results you

    can use google as you best

    friend to fuck biggest sites :Pif you know how to use it

  • 7/28/2019 Basics of hacking.pdf

    47/51

    Youtube is second baba ji so

    ask from them never wastetime from asking other little

    of them will tell you not the

    most :P

    What hacker needs in his life

    ?????

    Like everyone he wants to be

    famous name and fame and

    that world knows him Takeexample of kevin mitnick he

  • 7/28/2019 Basics of hacking.pdf

    48/51

    is famous and most wanted

    hacker of us So at last I want to say that be

    good and learn yourself teac

    yourself you is a biggest teacherwho can teach yourself

    I have not explained the

    methods because I am goingto create a separate tutorial

    on that topic about the

    methods to hack different

    things id website and some

    more useful stuff

  • 7/28/2019 Basics of hacking.pdf

    49/51

    Contact me Got any doubt :[email protected]

  • 7/28/2019 Basics of hacking.pdf

    50/51

    FORREADING

  • 7/28/2019 Basics of hacking.pdf

    51/51


Recommended