8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
1/38
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
2/38
A Basic Guide of How to do Hacking –
for Beginners
Table of Contents
Introducing Computer
Hacking………………………………………………………….3
History of
Hacking………………………………………………………………………...4
Security Threats that may affect Your Computer
Systems…………………………….5
Understanding basics of tools for ethical hacking and skills required by the
Hacker………………………………………………………………………………
6
Social Engineering behind
Hacking……………………………………………………….8
Learn measures to crack Password of an
http://www.guru99.com/how-to-hack-using-social-enginering.htmlhttp://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.htmlhttp://www.guru99.com/potential-security-threats-to-your-computer-systems.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
3/38
Application……………………………………9
Understanding Trojans, Viruses and
Worms…………………………………………….11
Simple guide to Networks
Snifffer………………………………………………………..13Learn How to Hack different
Networks………………………………………………….15
DoS
Attacks………………………………………………………………………………
15
Wireless
Networks…………………………………………………………………………..18Web
server………………………………………………………………………………….
Website………………………………………………………………………………
Linux
System…………………………………………………………………………………
25
Understanding SQLInjection………………………………………………………………26
Extract of the
Book………………………………………………………………………….26
http://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
4/38
© Copyright 2016 - All rights reserved.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in
either electronic means or in printed format. Recording of this publication is strictly
prohibited and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved.
The information provided herein is stated to be truthful and consistent, in that any
liability, in terms of inattention or otherwise, by any usage or abuse of any policies,
processes, or directions contained within is the solitary and utter responsibility of the
recipient reader. Under no circumstances will any legal responsibility or blame be
held against the publisher for any reparation, damages, or monetary loss due to the
information herein, either directly or indirectly.
Respective authors own all copyrights not held by the publisher.
Legal Notice:
This book is copyright protected. This is only for personal use. You cannot amend,
distribute, sell, use, quote or paraphrase any part or the content within this book
without the consent of the author or copyright owner. Legal action will be pursued if
this is breached.
Disclaimer Notice:
Please note the information contained within this document is for educational and
entertainment purposes only. Every attempt has been made to provide accurate, up to
date and reliable complete information. No warranties of any kind are expressed or
implied. Readers acknowledge that the author is not engaging in the rendering of
legal, financial, medical or professional advice.
By reading this document, the reader agrees that under no circumstances are we
responsible for any losses, direct or indirect, which are incurred as a result of the use
of information contained within this document, including, but not limited to, —errors,omissions, or inaccuracies.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
5/38
Introducing Computer Hacking
What is computer hacking?
In the cyber security era, the professional who is able to find out the weakness in the system and can exploit it to
accomplish his objectives is called as Hacker and this process is called Hacking.
Now a days, people think that hacking is just hijacking any account of exploiting any website, although it is also a
part of hacking but it can’t be considered as main part of hacking.
So now need to think that what exactly hacking is and what should anyone do to become a professional hacker.
Self-interest is the main point to become the hacker and you should always be keen to learn and create something
new.
Here are the different kinds of hackers in the cyber security world.
Script Kiddies
Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. Now it is
easy to say that the person, who doesn’t know the working of the system can also exploit it with the already
available tools.
White Hat Hacker
There are some good guys in the hacking world who work for defensing are White Hat Hacker. Their main
purpose of is too find the security flaws and fix them which in turn improve the security of the system. They work
for an organization or individually to make the cyber space more secure.
Black Hat Hacker
There are some really bad guys too who have malicious intent are called cyber criminals. They are known as
Black Hat Hacker. They have the objective to steal money and infect systems with malware. They use their
hacking skills for illegal purposes.
GreyHat hacke rs
There are some hackers whose work depends on the situation. They may work offensively or defensively. They
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
6/38
are actually don’t have bad intentions but still they like to break into third-party system for fun only or to just show
the existence of vulnerability.
Hacktivists
Few hackers are there who use their hacking skills to protest against injustice. They attack a targeted system or
website to bring the justice. One of the popular hacktivists is Anonymous and RedHack
History of Hacking
In this computer security world, who specially focuses on the security mechanisms of computer and network
system is called hacker. Mass media and popular culture are there who seek access despite these security
measures can be included in the list of hackers who always tries to strengthen such mechanisms. Although media
portrays the ‘hacker’ as a villain, but some of part of the subculture see their objective is to correct security
problems and they take this word in positive sense.
The name White Hat has been given to the ethical computer hackers, who use hacking in a helpful way. For
Information security field white hackers have become mandatory part. They work under the guidelines which
suggest that the breaking into other people’s computer is bad, but it is still an interesting activity to discover and
exploit security mechanisms and break into computers that can be done ethically and legally.
The subculture around such hackers is known as network hacker subculture, or computer underground. This
subculture surrounding was initially developed in context of phreaking during 1960s.
The word “hacker” was first used in the title “The Hacker Papers” in an article in the month of August in 1980 in
Psychology Today (With commentary by Phillip Zimbardo). It was the part of the discussion held by Stanford
Bulletin on the addictive nature of computer use. In the 1982 film Tron, Kevin Flynn clarifies his intentions to break
into ENCOM’s computer system by saying that “I have been doing a little hacking here”. He uses the software
called CLU to do this activity. Although inn 1983, hacking was already been used as computer jargon in the sense
of breaking the computer security but public awareness was not there about such an activity. This matter came
into public awareness at the time of the release of the film WarGames that year, which raised the belief that
computer security hackers could be a threat to national security.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
7/38
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
8/38
Phishing Spyware Key loggers Distributed Denial of Service Attacks Un-authorized access to computer systems resources such as data
Denial of Service Attacks To get rid of above mentioned threats, a company has to take some security measures.Some of them are defined below:
To protect against the Virus, Trojans, Worms etc, a company should not onlyimplement the anti-virus in their computer systems but also should avoid the use of external storage devices and visiting websites which can download unauthorized
programs.
Authentication methods should be implemented to get rid of unauthorized access of the computer system.
To protect against the denial of service attacks, the intrusion detection systems can beimplemented.
Understanding basics of tools for ethical hacking and skills required by the
Hacker
To achieve your desired goals within available time and resources you need to havethe skill. You need to grow your skills to get your job done. These skills includelearning how to solve the problem, how to program, keen to learn new things, use theinternet and take the advantage of existing tools
What is programming language:
The computer programs can be developed with the help of programminglanguage only. The computer programs have the wide range which can work othe operating systems or can operate on the network.
What is the need of learning computer programs:
Hackers are the problem solver and tool builders. So it is verynecessary for a hacker to learn the programming to solve different
problems. To automate several things, a hacker must need a computer
programs. But these programs the job can be done in minutes whichusually take lot of time. Programs can help you identify and exploit programming errors.
There are already open source programs available over theinternet, so you don’t have to invent the wheel every time.
There are different programing languages which can be useful for hacking.
http://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
9/38
HTML: This language used to write webpages. It is a cross platform programming language and this can be used for web hacking. Hackers canuse this language to write the code which can be used to exploit andidentify weaknesses in the code.
JavaScript: This language is the client side scripting language and it is
also a cross platform programming language. This language can be used toread the saved cookies and perform cross site scripting.
PHP: This language is the server side language. This is also a cross platform programming language. This is the most commonly used programming language which can be used to make the changes in the webserver settings and make the server vulnerable to the attacks.
SQL: This language is used to communicate with the database. It is also across platform language. This language can be used to bypass webapplication login algorithms, to delete data from database.
C & C++: These languages come under high level programminglanguages. These are also cross platform languages. They are mainly usedfor writing exploits and shell codes etc.
JAVA, C Sharp, VB: The use of these languages depends on your scenarios. Although these are also cross platform language exceptVB(Visual Basic).
Different Hacking Tools:
There are so many hacking tools available in the market. Few of them are given
below:
NMAP Project: This tool is used to explore networks and performsecurity audits.
John the Ripper: This is a password cracking utility and it works cross platform.
SqlMap: It automates the process of detecting and exploiting SQLinjection weaknesses. It is an open source and works cross platform.
Nessus: This tool can perform different activities like password
dictionary attacks, Denial of service attacks Etc.
Social Engineering behind Hacking
The human brain is not safe from hacking. Social engineering is the art of trickingusers so that they perform certain harmful activities or reveal confidentialinformation to attackers.
What is Social Engineering?
As previously informed, Social engineering is an art which allows manipulation of computing system users in order to reveal secret data or information in order to gainaccess to un-authorized computer systems. This may include certain activities likeexploitation of human kindness, greediness, and his or her eagerness to get full
http://www.guru99.com/how-to-hack-using-social-enginering.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
10/38
authority to access restricted buildings or installing software’s from backdoor. Thisscience proceeds with following steps:
Gathering Information about the victim: This is the foremost steptaken to get maximum information about the guilty victim. This informationcan be collected from company’s web sites, publications and many-a-time
from the users itself. Layout design: Hacker makes a plan to execute well-planned attack
Get desired Tools: This step includes gathering computer programs, which will later be used to execute the attack.
Final Attack : After step 1-3, hacker attacks the desired system.
Gather required information: Data or secret information iscaptured detailing about the company owner’s pet names, date of birth,foundation day etc. in order to guess the password.
Social engineering uses below mentioned techniques, to hack the required data
or information.
Exploiting Informally : It has been found that people are less suspicious of their fellow mates while looking for hacker’s .Hacker or an attacker can introduce himself or herself before applying social engineering on attack. Attacker is one amongst thegroup of friends you are surrounded with while taking meal, or may be your smokingcompanion or may be chit chat friend .This allows attacker to get information from
you.
Attacker tries to get your personal information by asking questions like where your first date was or when it was. How many kids you have and what are the names etclike tricks are used to grab your identity and later on your password hints. Computer User easily answers these basics questions as a friend .Hacker after gettingsuccessful answers to these questions tries hands on your Gmail accounts, or anyother confidential account.
Asking Details in forcibly circumstances: Most of the People fear from heatedarguments that sometimes occur with the unknown people working around them.Attacker or Hacker creates circumstances where ,an unpleasant communication iscreated between the user and attacker and user ,then is forced to forge his details inorder to avoid any legal actions .This technique mostly used to refrain from securitycheck points.
Phishing: well-known and most common technique used by attacker to get
information secretly from the user. This method is tricky and is bets for getting datafrom the users computer system. Attacker indulges in social engineering willimpersonate authentic website and then ask user to confirm his or her confidential
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
11/38
details like account number, credit card number etc. like things. Hacker mostly usesPhishing to get credit card
Tailgating: This technique involves chasing user when he or she enters the passwordrestricted zone.
Making human more curious about things around him: This technique excites user for clicking some site or ads which inject virus through flash drive .This is a kind of
bate system where attacker throws a chocolate and user picks it up. This Flask Driveis mostly plugged in by the user or sometimes injected with a auto run option whichasks users to open a file like Employees Revaluation Report 2014.docx, a fake nameto infected file.
Exploiting human by money: This technique lures user with fake promises of giving
money by filling online form asking details of credit card, debit card like confidentialfigures
Learn measures to crack Password of an Application
We are all aware of the fact that data or Information is one of the most valuableresource for creating either data base or any secret file of an operation. This
confidential data is kept secret and can be accessed only by the legitimate people.Authentication systems mainly provide security to this data.
Password cracking is the process of getting access to un-authorized data using
common passwords or techniques that can be easily guessed by the attacker.
We are listing below some of the techniques that can help hacker in cracking password:
Password Cracking
Password cracking is a process or we say an art of getting access to un-authorizedsystems by means of cracking password using authentication method. Number of techniques is used to get this thing possible. Password cracking process mainlyworks on principle of comparing password from the stored list of words or thistechnique uses algorithms which create passwords matching data entered by thehacker.
Password strength
This is a general term, which most of the people are familiar with. Password strengthis the method of obtaining efficiency of password in order to limit or resist theattacker from hacking your details. Computer system analyzes password strength by
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
12/38
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
13/38
Techniques to crack PasswordAlthough, Hackers use number of techniques in order to crack passwords, we are listing down some of the most
commonly used techniques:
Dictionary attack – This technique compares user’s passwords the word list stored in Dictionary.
Brute force attack – This technique is almost similar to the fir st one but differs fromthe fact that Brute force attacks uses algorithms which compounds alpha-numericcharacters with symbols in order to get passwords for attacking user computer .Taking an example password of some ABC user is of the value “Yogesh” which canalso be tried as y0ge$H using this technique.
Rainbow table attack –Method uses hashes which have been pre-computed in the
system.Taking an example of password of value ”Yogesh hashes.” This method willcreate another data file containing Yogesh hashes passwords commonly used by theusers. This hash can later be compared with the data base stored in the system inorder to get the password.
Guess – This method is basic and does not contain any science behind it. Commonlyused Passwords like 1234, qwerty, password, admin etc. are set as default .Many
people keep them as same carelessly and give hacker an open chance to getinformation.
Spidering – It has been seen that many organizations keep passwords related to their companyinformation, which is readily available on either their websites or on socialnetworking sites like facebook, twitter etc. Spidering captures information throughthese sources to get word lists, which is then used to create password using first twomethods.
Tools used to crack Password
Many software developers have designed software programs to crack password from
the users computer system. Many sites are available like www.md5this.com usingdifferent techniques to crack passwords. Especially this site, using rainbowtechnique. Many Tools are available in the online market. Listed down few of themwhich are commonly used by the Hacker:
John the Ripper Software Tool
This tools uses command prompt in order to get passwords. Mostly suited to professional who are fluent enough
working with commands. A well-defined wordlist is used to crack passwords. Hacker can easily get this program
for free but only purchase that needs to be made is for the word list .Alternatively this software offers a free
wordlist that can also be used.
Cain & Abel Software Tool
This tool runs only on windows platform in order to crack passwords for user personal accounts, Microsoft Access
http://www.md5this.com/http://www.guru99.com/the-secret-to-social-network-marketing.htmlhttp://www.guru99.com/the-secret-to-social-network-marketing.htmlhttp://www.md5this.com/http://www.guru99.com/the-secret-to-social-network-marketing.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
14/38
passwords; networking sniffing etc.like secret accounts. This tool is based on Graphical user Interface and is so
user-friendly ad easy to use. This Tool being simple and easy to use, commonly used by newbies and script kiddies.
Ophcrack Software Tool
This tool works on Windows cross platform in order to crack password .Methodology used by the tool is rainbow
tables .Compatible with windows, Linux and Mac Operating Systems. Many features integrated in these amazing
tools makes it a all-time favorite of millions of hackers.
Understanding Trojans, Viruses and Worms
Hacker is not beginners and is mostly skilled with complete knowledge of programming and computer networking. These skills are often used to get access touser computer systems. The main objective of stealing is to get sensitive informationof the company and cause harm to their computer controlled data. This objective can
be achieved by Trojans, viruses and worms like threats detailed below in the
book.This paragraph will detail you on some of techniques that Hacker can use togain access to users system.
http://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.htmlhttp://www.guru99.com/unix-linux-tutorial.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
15/38
Understanding Trojan horse?Trojan horse program attacks users computer system from a remote location.
This program impersonates to be useful to the user. Once user is convinced andinstalls this fake program, hacker from remote location can easily install harmful
payloads, and get an entry through backdoors, in order to install other extra and evenunwanted applications that will harm user’s company and etc
Trojan horse threat gives attacker permission to do certain things like :
This allows attacker to use user’s system as Botnet where he or shecan perform attacks related to distributed denial of services.
This threat can damage user’s system by complete crash, blue scree
etc like unpredictable things. Trojan horse allows hacker to steal sensitive data related to
passwords, details of credit card etc. May Modify stored files of user’s computer May cause accidental theft of Electronic money by allowing un-
authorized access to money transactions This threat may Log keys which user presses and sends the details to
attacker sitting at remote location. This method can be used to get user ids,user name, passwords and other sensitive information.
Users computer screen shot can be viewed by the hacker. Browsing history can be downloaded
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
16/38
Understanding worm?Worm is a malware program that runs on users computer system and repeat
itself frequently over the computer networking system. Worm threat can be used by the hacker in order to accomplish below mentioned tasks;
This threat may Install backdoors on users or victim’s computer.This backdoor, then creates zombie computers which sends spam mails or perform unwanted actions like distributed denial of service etc. However,this backdoors can be prevented from spreading using other malware
programs. Worms consumes a considerable amount of bandwidth while
replicating itself and so slows down the networking system.
This worm can carry pre-installed harmful payload codes.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
17/38
Understanding virus?Virus is again a dreadful program which runs on computer and attaches itself
like a suicide bomber in order to spoil programs and files without asking for
user’s consent. Viruses like worm consume a lot of space, increases CPUProcessing time and hence delays the processing tasks. Program affected by virus is
called infected one.Hacker use Virus to execute certain operations:
In order to get personal data like user id and passwordsAnnoying messages pop up to disturb user May corrupt stored data of your computer May log al keys pressed by the user in order to fetch password relateddetails.
All these threats Trojan Horse, Worm and Virus involves social engineeringtechniques which deceives users to disclose harmful files which otherwise ,look alike normal ones. Once user open this files, execution of virus code takes placeresulting in harmful consequences set by the hacker.
Network Sniffer Guide
The main communication channel of the computer system is the network, from where
it sends the data over the network to internal or external world. The networks can belocal area network (LAN) or Wide Area Network (WAN). Now the programs called
Network Sniffer are to capture low level package data that is been transmitted over the network. Hacker can analyze this data to get the useful information such as ID,Account number, password.
Here are some common network sniffing techniques and tools which we are
describing for you:
Introduction of IP and MAC address:The Acronym of IP is Internet Protocol Address. All the hardware which are used tocommunicate through network such as computer, printer etc. are being uniquelyidentified by IP address. There are two versions of IP addresses have beenintroduced
IPv4 Address: This version uses 32 bit numbers. This address has been formatted into four groups of numbers separated by dot. It contains minimum value as 0 andmaximum value as 255.
For Example: 234.214.9.10
IPv6 Address: This uses 128 bit number. IPv6 has been developed because of the
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
18/38
heavy growth of the internet. IPv6 addresses are formatted in the groups of sixnumbers separated by colon. The numbers in the groups are written as hexadecimaldigits.
For Example: 2002:0db6:85a3:0000:0020:8a2e:0310:7334
MAC (Media access control) addresses are basically used to uniquely identifynetwork interfaces at the physical layer of the network. It usually embedded intonetwork card. MAC address can also termed as Physical address.
The command to get all these addresses on the window Operating system is
Ipconfig /all
What is Network Sniffing?
The communication of the computers can be done by broadcasting the message by onecomputer over the network and the other computer with same range of IP addressreceives that message over the internet.
Now network sniffers intercept these data packages and fetch the useful informationfrom it. Specialized software programs or hardware are being used to do thisactivity.
So the main purpose of Sniffing is:
To capture sensitive data such as account informationTo capture files being transmitted over the internet.Monitor and temper chat messages.
Protocols that are defenseless against sniffing are listed below:
NNTP Telnet FTP
HTTP SMTP Rlogin POP IMAP
In case user sends logging in details in text format, then chances of causing threatincreases.
Network sniffing is of two types: Passive and Active Sniffing. Lets understand thesetwo by the means of hubs and switches.
A hub transmits data sent by one port to all other connected ports except the one who has sent the
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
19/38
packet. The recipient port whose IP address matches with the sender, responds actively to the request raised by
the sender port. This process is simple but all ports which are connected in between gets the message details. Hub
works at physical layer of OSI Model.
A switch on the other hand works on a different principle. It tracks IP/MAC
addresses and takes data to the physical ports. Broadcasting message is first sent
to the physical port where IP/MAC address configurations are matched in order tolocate the exact recipient computer. This means packet or message is received only atthe dedicated terminal. Switch operates at Layer no 2 and 3 of OSI Model.
Passive sniffing basically involves intercepting packages sent over a hub whereActive sniffing does the same but on switch.
Learn How to Hack different Networks-DoS Attacks, Wireless Networks, Web
server, Website and Linux System Hacking techniques ------will go step by step andsee How to hack these networks.
Dos Attacks
Any business can be expanded and promoted by means of internet. Cutting off Internetis a kind of big loss to the company because Internet and Computer networks play acrucial role in promoting any business category. Especially online shopping businesscannot think of surviving for a second without proper internet connection. But there isone flaw behind these online shopping sites, users need to fill their credentials inorder to make successful payment. This gives attacker a opportunity to hack thedetails plus the company secret information .DoS is an acronym for Denial of Serviceattack which denies legitimate users to access any private resource like accessingwebsite of the company.
What is DoS Attack?
DoS or Denial of Service does not allow any stranger to access web site/app/service
etc or like confidential details. Thisattack sends multiple requests to server at the
same time and then attack the target web server or any other resource, which makes
server weak enough to handle all requests in one go. This may decrease the
processing speed of server or sometimes may lead to severe crash.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
20/38
Dos Attacks are available in various types
Mainly 2 types of Dos attacks have been observed so far.
DoS –This attack is intended for single host
Distributed DoS – this attack targets same victim and mostly, attack is done by considerable number of compromised machines in order to createa flood of data packets in the network.
See How DoS Attack-There are 5 common types that can be used to attack DoS
Ping of DeathCommand basically sued to check availability of the resources for the network is called ping command .This tool
first sends small data packets to the network resources. Packet length is usually above the maximum length set by
TCP/IP protocols ,which is then fragmented by TCP/IP into small packets .So, it is clear that this tool sends data o
larger length so, system may crash,boot,rebooat or freeze in the middle
Smurf
This attacking tool uses large-sized Internet Control Message Protocol (ICMP) which can ping traffic of target
system at Internet Broadcast Address. Target or intended victim gets the spoofed IP address. All mails or replies
sent by the target system are sent to the Hacker. It has been aid that a single Internet Broadcast Address can
handle maximum of 255 hosts at the same time, and smurf attack amplifies this single host to almost 255 times.
This slows down the processor and takes network to a stage when it stops working.
Buffer ove rflow
Buffer is awell-known term used for temporary data storage and is mostly located inside RAMwhich holds data
firmly so that CPU can edit or modify it before copying it back to the disc. Although Buffers are limited in size.
This attack overloads buffer more than its actual capacity. This results in overflow and so buffer is forced to
corrupt the data, it is holding previously .Sensing emails with more than 256 character size is a perfect example of
buffer overflow attack.
Teardrop
This is another attack which uses large sized data packets. TCP/IP fragments these packets by breaking them intosmaller pieces which are later assembled again at receiver host. The Hacker mostly edits and manipulates the
transmitting packets in order to overlap one over the other .When target system tries to reassemble the packets,
system may crash resulting in potential DoS attack.
SYN attack
SYN is an acronym for Synchronize attack which uses a unique three-way handshake technology in order to
establish strong communication by the help of TCP protocol. SYN attack floods the victim’s system with
incomplete messages which force target to use new memory resources which he or she has never used, ultimately
leading to DoS attack.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
21/38
Attacking toolsSome of the Tools that attacker can use in order to perform DoS attacks.
Nemesy – this tool generates multiple packets randomly and iscompatible with Windows based operating system. This tool detects evenanti-virus as a virus because of fits nature and properties.
Land and LaTierra – this tool is for IP spoofing and openingconnection based on TCP protocol
Blast – this tool is one of the basic tools amongst DoS List.
Panther- this tool floods target computer or network with UDP packets.
Botnets – this tool comprises of compromised computers supportinginternet in order to perform Distributed DoS attack.
Wireless Network
Wireless networks, as we are all aware of ,are the networks that sues radio waves inorder to link one or more devices ,that can be accessed in the radius of router’stransmission zone, which makes them more prone to the attacks. Implementation ismostly done in the first layer that is physical layer of OSI Model. You might haveseen Hotspots in public places like hospitals, airports, restaurants, parks etc.
How user access this Wireless Networks
Initially user need to have a wireless network enabled device which can be anything like your Laptop, tablet, smart
phones etc.in the transmission radius of Wi-Fi access point. Many a times, when you switch on your Wi-Fi
network, you can see the list of networks that are available to the current network. These networks are mostly
password protected and in case, you have not set any password, then any one, who comes under Wi-Fi
transmission circle can access Internet without any hassle of entering password. However, in case network is
password protected, no one can use Internet without filling in the password details.
Authentication of this Wi-Fi Network
Wi-Fi network can be accessed by anyone coming under its radius, but if your network is protected, then users are
restricted to access without asking password from you or hacking it using unfair means. Various authentication
techniques are employed to make this network safe..
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
22/38
WEPWEP or Wired Equivalent Privacy, compatible with IEEE 802.11 WLAN standards. Main goal of setting this
authentication is to give security similar to that of wired networks. WEP use encryption and decryption to code and
decode your information while sending from one end and receiving at other.
Authentication techniques
Open System Authentication or we call itOSA – this methods permits station based on access policy
configured previously.
Shared Ke y Authentication or SKA – This method first sends a challenge to the requesting station and the
challenge is an encrypted one. Station then encrypts the challenge using key and then respond to it .Access is
granted only when the encrypted challenge is matching with the AP value, else stands null and void.
This paragraph will guide attacker to find the weakest area of wireless network
security system in order to hack the data or information shared or connected to thewireless terminology.
Weakness of WEP
WEP no doubt, is a strong piece of network but has some flaws and threats.
Packet Integrity check using CRC32 ,Cyclic Redundancy Check
:Attacker can easily crack this code using at least two packets. Encryptedstream bit and checksum can be modified by the hacker easily and so,authentication system accepts packets from him or her without any hassle.This creates a feasibility of entering into users network. Hacker can take
benefit of this system.
Stream ciphers are created using RC4 encryption algorithm:
Stream cipher is an input value made from initial value (IV) and aconfidential or secret key. It has been assumed that the expected length of theIVis24 bits and that of a secret key may be 40 or 104 bits long.Making a total
length of almost 64 bits in case secret key is 40 bit or 128 bits long whensecret key is 104 bits .The lower the value of secret key is ,more are thechances of its cracking..
In case Initial value is weak and cannot be encryptedsufficiently,chances of attack by the hacker increase.
Since WEP is passwords based; making it more prone or vulnerableto dictionary attacks.
Key management system not implemented properly: In case key is of long length, then its management becomes a tough task. WEP shouldincorporate a central key management system in order to make it stronger andmore secure.
Possibility of using Initial values again and again makes this system
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
23/38
more vulnerable to attacks.
These weaknesses forced user to switch to WPA authentication system.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
24/38
WPAWPA or we call it Wi-Fi Protected Access, security protocol designed by Wi-Fi Alliance in order to remove
weaknesses observed by the users in WEP. This System supports 802.11 WLANs standards, and uses longer
Initial values of almost 48 bits in place of 24 bits used in WEP uses. Temporary encryption packets increase
security system.
This WPA Protocol was developed to eliminate weaknesses of WEP ,but still has some limitations
Attacker can easily broke collision avoidance implementationsystem of WPA
Most susceptible to denial of service attacks This protocol uses Pre-shares keys which in term use passphrases
and if user selects any Weak passphrases then, chances of dictionary attacks
increases.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
25/38
Cracking Wireless NetworksCracking WEP
Cracking is again a form of attacking or hacking which is done to get access to unauthorized information .WEPcracking in context to WEP means exploiting networks that use WEP systems in order to levy control systems for
security reasons. Two different cracking types are defined under WEP
Passive cracking – This cracking is difficult to detect and has no effect until or unless it affects or cracks WEP
security details.
Active cracking –This cracking severely affects network traffic load. Can bedetected easily and is found to be more effective than Passive cracking.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
26/38
Tools that ease WEP Cracking Aircrack – used as a powerful cracking tool for network sniffer and
WEP . WEPCrack – Open source program developed for cracking 802.11
WEP standard or secret keys, implements FMS attack.
Kismet- this tool can detect visible and hidden wireless networks,sniffer packets and even intrusions.
WebDecrypt – This cracking tool uses active dictionary attacks inorder to crack WEP keys, creates its in-house key generator, implementing
packet filters.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
27/38
Cracking WPAWPA as already informed used pre-shared keys almost 256 in numbers, or may use passphrase in order to provide
authentication. Weak or Short length passphrases are more susceptible to dictionary and other attacks which can
later be used to hack passwords.
Tools used for Cracking WPA.
CowPatty – this cracking tool cracks pre-shared keys (PSK)employing brute force attack.
Cain & Abel – this cracking tool decodes captured files fromsniffing programs like wireshark. Captured files may be WEP or WPA-PSK encoded .
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
28/38
Type of Attacks that user systems are more vulnerable to :Sniffing – this technique intercepts in between packets which are
transmitted by the sender from one end , in order to retrieve data usingtools like Cain & Abel.
MITM or Man in the Middle Attack – this attaching technique involves
special tactics to capture system’s sensitive information.
Denial of Service Attack – the Attacking technique denies access to
legitimate users for using network resources.FataJack tool is mostly used
in this type of attack.
How to crack keys of Wireless network WEP/WPA
Hacker can easily crack WEP/WPA keys in order to gain permission to access wireless networks. This act
requires hardware and software resources, not only this patience are a must thing. This attack will be successful or
not, mainly depends on the fact hoe active the user is when attacker is planning to target him or her.
Basic Information is given below to start with cracking.
Backtrack
Security operating system running on Linux platform, developed on the top of Ubuntu. This OS includes multiple
security tools in order to gather information, know vulnerabilities and plan exploiting other things.
List of backtrack tools includes;
Aircrack-ng Metasploit Ophcrack Wireshark NMap
Cracking is a slow yet smart process and requires lot of patience while using above listed tools. One more tool, that
is definitely the perfect tool to backtrack data is a hardware one called wireless network adapter ,which hasenough capability of injecting packets .
Basic Information about Hackers still to access Backtrack.
Backtrack OS:Hacker should be aware of this operating system.
Try to limit your range to the radius of Wi-Fi transmission. Incase user or target computer comes under the Wi-Fi zone, hacker can easilycrack it.
Hacker should be fluent enough with working on Linux basedoperating systems and Aircrack and many other scripts.
Patience is the foremost thing, cracker should work with:
http://www.wireless-warrior.org/detail/780/fatajack.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
29/38
Cracking keys may sometimes be easy or sometimes take a bit of time inorder to implement number of factors on cracking. This may be a timeconsuming task and should e handled with patience by the hacker.
Hacking web Server
More Customers are now switching to online services or shopping like activities.This force them to enter their credit card ,email address and other details into thewebsite f the company. This makes their personal data more vulnerable andsusceptible to attacks. Many Defaced websites are available on the Internet whichfools people in the name of religion or political ideologies etc.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
30/38
Vulnerabilities to Web Server ProgramsWeb server is and internet program that mainly stores data files as web pages and make them available
through any network or internet. This program needs both hardware and software tools.Hacker usually
targetssoftware programs to hit or get unauthorized access to the server. Attackers can take advantage of some of
the most vulnerable threats highlighted below.
Default settings – Default user id and passwords are easy to guessand can be cracked bythe attackers. Default settings sometimes ask attacker
performing actions like running commands which are easy to exploit.
Misconfiguration: Web server programs may be misconfigured interms of configuringoperating systems and other networks .Many other configuration which allow user to process commands that can be dangerous
in case user have not set a strong password. Web programs are vulnerable to operating system and web
server bugs :In case these bugs are detected by the hacker, then it really
becomes easy for him or her to access the unauthorized systems.
Not only the above mentioned threats, but Lack of security policy and procedures can affect hacker gaining
unauthorized access: Practices such as updating software for antivirus, web server and patch up with operating
system may lead attacker to gain access.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
31/38
Web Servers can be of different types Apache –most common web servers type being used on the internet.
This type is compatible with cross platform but installed on Linux OS. PHPwebsites are mostly hosted on these servers.
IIS or Internet Information Services ,developed by Microsoft andruns smoothly on windows OS .This type is the second web server typemostly used after Apache on the internet. Sites hosted under this type aremostly asp and aspx.
Apache Tomcat – Sites hosted on this type are mostly Java (jsp)websites.
Other web servers –Many other web servers are available
including Novell's Web Server, Lotus Domino of IBM etc.
http://www.guru99.com/java-tutorial.htmlhttp://www.guru99.com/unix-linux-tutorial.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
32/38
Attacks that can affect Web ServersDirectory traversal attacks – This most prominent attackmainly exploits the bugs present in web
server in order to gain access to unauthorizedfiles and documents, not available in public domain. Incase any hacker is able to get access to the unauthorized area, he or she can hack all sensitive
information like downloading sensitive information from the target system, executing server
commands or installing malware software.
Denial of Service Attacks – This attack leads of crash of web server program and may disable system to legitimate users.
Hijacking Domain Name System – This technique involves changing
DNS settings and making data or files available to the attacker’s web
server. Traffic which was basically directed to your system will be routedto another or some wrong web server.
Sniffing – Data which has not been coded or left Unencrypted and sentover the transmission network may be interrupted to get access to webserver by unfair means.
Phishing –This attach enables hacker to pretend same or impersonate other website and hack details from the target system by asking personal details.Users unaware of this attack may get trapped and login details related tohis or her id, passwords, credit card etc.
Pharming – This attack shortens DNS server in order to change the routeof malicious site.
Defacement – As the name suggest, in this type attacker modifies thecompany websites by adding his or her details, images, in order to forgetarget system.
What will happen in case, attacker gets successful
Company or organization’s reputation is at risk :In case hacker edits the company’s details and try to include malware information, thenother people apart from the target customer will see those details and can bemisguided.
Malicious software may force virus, Trojan or botnet software etc.to enter into user computer system.
Hacker act may force user to Compromise data resulting in
fraudulent activities: This act can push a great loss to the user plus to thecompany for whom he or she is working.
Tools that attacker can use to hack Web server
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
33/38
Metasploit – this open source tool is used for developing, testingand many-a-times exploiting code. Web servers vulnerabilities can also bediscovered using this tool and even exploiting things in order to compromisethe server.
MPack – This PHP written, web exploitation tool, is backed by
database engine called MySQL. In case attacker is able to compromise webserver with the help of MPack, network traffic will be transferred to fake or malicious websites.
Zeus – This powerful tool gives you boot or zombie by convertingyour compromised computer.Bot is basically a compromised computer designed to perform attacks based on internet whereas botnet is a collectiveterm for compromised computers. Attacker may use Botnet in denial of service attack or for sending spam E-mails.
Neosplit – this tool performs simple operations like installing
programs, deleting programs, replicating etc.
Hacking website
More and more people are now becoming use to Internet .Manufacturers, businessman, shareholders, etc like high grade officials are creating their websites inorder to spread awareness about the company and their offering. This has forcedthem to seek web developers in order to make user-friendly applications that allow
user and the company to interact and solve most of the queries online only. Hackersmainly attack these sources to get information about the active users of a company.Taking an example of shopping site, where you select the list of items you want to
buy and then company website asks you to enter your basic details like name, user name, Id, password and then while payment, they ask you for credit card details .Incase web developer has used poorly written or weak codes for running thisapplication, then hacker may attach and get the desired information about you fromthe company’s website.
Web Applications and threats associated with it.
Website or any web application works on the very famous model of client-server,wherein server contains complete details of database access along with the logicwith which the company is running. This server mostly runs on a web server. Comingon client side, client application on the other hand runs on web server of client itself .
Web applications are mostly written in Java, C# and VB.Net, PHP, ColdFusionMarkup Language etc. like languages and MySQL, MS SQL Server, PostgreSQL,SQLite etc. database engine
It has been found that most of web applications are accessible to the public via internet because they are hosted on
public servers. This increases their vulnerability to attacks because of wider spectrum.
http://www.guru99.com/java-tutorial.html
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
34/38
Hacking Linux System
Linux is the operating system which is mainly used for web servers. This operatingsystem is the only one which is open source means it provide the code to the users.
So as compare to other operating system Linux is less secure operating system because the attackers can read its code and can find out the weaknesses in the code,so by exploiting the code un-authorized access can be gained by the attackers.
There are many distributions of Linux based operating system such as Redhat, Fedoraand Ubuntu etc. but among them Linux is less secured operating system because thevulnerabilities can be found from it by reading the code of this operating systemwhich can motivate the attackers to gain un-authorized access of the code. Thisoperating system can run on servers, desktop, tablets etc.
Linux Hacking Tools :
There are so many Linux Hacking tools available over the internet. Some of them aredescribed here:
Nessus: To scan the configuration settings, patches, network relatedinformation this tool can be downloaded from the internet.
NMap: To monitor the number of users and processes running on theserver, this tool can be utilized. This tool can also monitor the ports of the
servers.SARA (Security Auditor’s Research Assistance): The audit the networ against threats such as SQL Injection, XSS etc, and this tool can beutilized.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
35/38
Understanding SQL Injection This threat mainly bypasses logging in algorithms, sabotage data etc.
Denial of Service Attacks – This attack has been discussedmultiple times in our book and the goal of this threat could be to denylegitimate users access to the resource.
Cross Site Scripting XSS – The objective of this threat is to executethe code on the client side browser.
Cookie/Session Poisoning – The attackers want to get unauthorizedaccess and they perform this activity by modifying the cookie/session data.
Form tempering – The objective of this threat is to temper the
prices of the product on e-commerce website so that cheap price productscan be ordered by attackers.
Code Injection –Injecting the programming code like PHP is themain motive of this threat so that this code can run on the server side so thatsensitive personal data can be revealed.
Defacement – This threat’s objective is to repoint all the pages of a particular website on the single site which contains attacker’s message.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
36/38
Extract of the Book
One of the criminal defense attorneys of California defines Hacker as “A particular
person who delights in having an intimate knowledge of the internal workings of a
system, computers and computer networks in particular” This definition describeshacker with two different perspectives. One calling hacking as an illogical act of
entering other computer system while the other one calls it an extra-ordinary talent of
a person who can think different and out of the box.
Our ebook describes certain methods to hack DoS, Wireless systems, Websites, Web
Pages, Linux OS etc, and it is advised to use them for betterment.
Hacking is good practice, if done in right direction. Professional hackers are needed
in almost every field like military to track useful details of the enemy headingtowards the war with country. Many Government officials find this, a blessing but
can really be harmful, if used against the country. For running any business, if hacker
finds that his system is being hacked, then he or she can fix the issue in the middle
itself and protect business image from ruining in public.
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
37/38
Personal Thank You from Me!
Hello, my name is Brian founder of SS publishing, and I personally want to thank you
for reading my book. It really means a lot!
We are a small and locally owned business. Our goal is for you to be completely
satisfied with your purchase and your reading experience, if for any reason this is not
the case we would appreciate it if you would give us a chance to address your
concerns BEFORE leaving feedback. Simply log in to our Facebook group, and
address your concerns and we will do our best to address your issue.
https://www.facebook.com/sspublish/
***Also, within the Facebook group you will find many weekly free book deals as
well as new release events, so make sure you press LIKE in our page.
*If you’ve had a pleasant reading experience (*and we think this is likely the case*),
we would be grateful if you would leave us feedback on amazon.
https://www.facebook.com/sspublish/
8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones
38/38
Thanks again and I look forward to doing business with you again soon…
Brian S.