Introduction into Becoming a Hacker V2
According to me when, you start hacking you need to choose what you want to hack. Here is a list of options:
- Other computers (one of the most common options)
- Websites (another common option)
- Software Cracking (it is arguable to put this under the title hacking)
Your own computer and rooting personal devices (changing things that the makers did not intend on having changed. eg. Jailbreaking iPhone's or Android, hacking OS's (operating systems)) - Phones (Internal Systems, Credit Stealing, Apps, Free calls and texts). This is known as Phreaking.
You don’t really need to choose one - you can try all of them, but it’s best to get good at one and move on to another. However, it is totally up to you.
Unnecessary Note:
Ethics
Next, you need to understand some things. Hackers and others tend encourage good grammar and look down on those who don’t use it, but this is not a rule. It is unfortunate if you are foreign as you will have a disadvantage, but just mention that it is not your first language and most people will empathize with you. Also if you are foreign you may not need to have any English at all because there are many different sites for other countries too. However, many tutorials and languages are English based, so it is a huge advantage.
Manifestos
A manifesto is a public declaration of principles and intentions. The most referred to manifesto is +++The Mentor+++ 's one which I will now quote:
Quote: Another one got caught today, it's all over the papers. "TeenagerThere other manifestos but you'll have to find them yourself
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.
+++The Mentor+++
What Is Hacking?
I would like to quote BluexXxKalishnikov on this as he puts it best.
(12-31-2010 09:10 PM)BluexXxKalishnikov Wrote: ►For the people confused, 'hacking' was a term used in place of 'tinkering' long before it was used in the now common criminal sense. Omniscient wrote a thread called "taking back hacker" in which he explained the meaning of it in hopes of clearing the name, I'll link to that at the end of this post, as well as a thread I wrote explaining the meanings of both hacking and cracking. When computers came around, a hacker was someone who made them operate differently than they were intended to. This could be by altering the programs, OS, or the hardware. "Cracking" is the proper term for breaking into systems. While the modern use of the word hacking may not be correct, meanings of words tend to change over time and that's something that can't be avoided.This is an often argued term but after a while I'm sure you'll make your own meaning.
The thread can be found here: Taking Back Hacker.
BluexXxKalishnikov Wrote:What is a hacker, and what does he do?That is from a thread I wrote, which can be found here: Hacking and Cracking; What they are.
A hacker is a computer enthusiast, someone good at what he does, and all-around intrigued by technology. He'll spend all night trying to solve a particular problem, to make a patch to make a program function properly, just to do it. Not because he personally benefits from it, or he's getting paid to do so. Hackers are the ones who built many of the things we use today, and did a damned good job doing it.
What is a cracker, and what does he do?
A cracker is someone with some of the knowledge a hacker has, sometimes an equal amount. The difference between them is the Hacker builds things while the Cracker breaks(into) them. A cracker is one who searches for vulnerabilities only to exploit them, commonly without intent to even inform the admin of them. Crackers are the ones you see on the news stealing credit card numbers, all that type of thing.
I hope this post has helped to inform everyone. Also, I mean no disrespect in posting this, as I'm okay with whatever way people use the word. It makes no difference to me as all people will have to accept that words lose and/or change meaning over time.
Terminology
You need to understand the terminology:
White Hat - These are people who write Anti Virus programs, and spend their time fighting malware. They do not get involved in the use of viruses/trojans, but instead spend their time disinfecting computers.
Black Hat - These are people with casual disregard for morals. They infect other computers, and some commit serious fraud and other crimes. These people give "Hacking" a bad name.
Grey Hat - These people are in between white and black hat.
Skid - This is someone who is not very good at hacking, and does not really know what they are talking about. They C&P programs, instead of learning how to code one themselves. If you are called this, don't bother flaming back as this will just encourage the person. Some people also use the term noob.
You can search for more common terms with Google, or using a site such as Urban Dictionary.
Forums
When joining a forum (which I strongly advise you do) you must choose a good Username. This entails not using substitution of numbers for letters (l33t speak), as well as phrases such as "Hacker Elite". Read the rules here as well as an other forum you join so you wont get banned. These make you look bad and immature. Do not ask the question “how to hack” because if you search the forum you will find many other threads with that same theme. Read them instead. Posting threads such as that will get people very annoyed with you.
Also you can directly speak to hackers in real time at HackForums IRC at Malvager. If you use the IRC (Internet relay Chat) a lot you can apply to join the Malvager crew here.
Tools
When downloading tools do not use the link you are given in a video. This is because the program commonly contains a trojan, and you will be infected. Instead search Google for the program and download it from the developers site. If you can’t find one, the program should be treated with caution and scanned at NoVirusThanks. There is also a URL scanner there, so you can check a site before you download. Many hack tools will set off your AV. If you download a program such as a RAT, be sure NOT to run the built server.
If you collect a lot of tools use MalwareBytes to scan your PC, in case you were inadvertently infected. Just don't let it delete the programs that you use. And remember the golden rule “If it seems too good to be true it probably is”.
Now here are my explanations for most if not all tools and the best of them:
R.A.T. - Stands for Remote Administration Tool. They take full control of the infected computer and have many features - password stealers, keyloggers, screenrecorder, webcam view, control of mouse and keyboard, administrator settings, file sharing and more.
Best RATs - Blackshades, Cybergate, ProRAT, Dark Comet and more. When you get good at using RATs you can apply to join the RATs crew here.
Keylogger - Records keystrokes and sends them back to the hacker in files called logs by FTP (File Transfer Protocol) or email.
Best Keyloggers - All the RATs mentioned above have keyloggers, Ardmax (requires physical access), Burning Phoenix and others.
Crypters - Make your virus undetectable from AVs (Anti-Virus eg. Norton Security). The best ones (and private versions) make RATs FUD (Fully Undetectable). Most crypters eventually get outdated and detected because scanning sites like virus total are used by idiots (to see whether or not their virus or server is FUD) and the file is sent to expert who analyze it and make it detectable by AVs. Use NoVirusThanks instead.
Best Crypters - Ownz Crypter, the newest ones in the Cryptography and Encryption Section.
Bruteforcers - Bruteforcing a password is when you try almost every combination and using different attacks or methods.
Dictionary Attack - Is when the program uses every word in the dictionary
Hybrid Method - Is when the program uses words put together eg boardcat.
Bruteforce Attack - Uses every possible combination (depending on the settings this could take several years!)
Wordlist - Is when it uses a list of possible words to get access eg. list of words used on the victims facebook account.
Rainbow Tables - This is the most complicated method. It uses special tables of characters to try and crack the password (most commonly used by Ophcrack).
Best Bruteforcers - Ophcrack (Cracking Windows passwords with physical access to the computer.), CForce (uses wordlists of usernames and passes to access accounts commonly used along side Athena which gathers usernames and passwords using Google.)
Hacking Tools AIO's (All In One) - These are sets of tools gathered into the one download.
Best Tool Collections - Katana (built to be the ultimate most portable set of tools (USB Stick) it includes backtrack and other live cds too.), Samurai (made to be the best live cd collection for web hackers), Backtrack (made to be the best hacker OS and Linux Distro. It includes every tool a hacker would ever need),
Googles Collection (he's a member here not the search engine *facepalm*) I also like tartou2's packs BEST TOOLS EVER [1], BEST TOOLS EVER [2], BEST TOOLS EVER [3], BEST TOOLS EVER [4], BEST TOOLS EVER [5], BEST TOOLS EVER [6] and BEST TOOLS EVER [7].
Proxies and VPN's - Are used to make yourself anonymous during your ventures. They connect you to what you want to go to via a web server or another computer. For more see iBruteforce's thread here
Use my tutorial here on how to get webproxies.
Best (free) VPN's - Cyberghost, ProXPN and others.
Password Stealers - Use data left on the computer to find usernames and passwords.
Best Stealers- iStealer
Sniffers - With access to an unsecured network it can gather packets of data sent from computers to web servers or otherwise.
Best Sniffers - Cain and Abel, Wireshark, Firesheep (open it with firefox!)
DDOSers - DDOS(Distributed Denial Of Service) is when you send so many packets to a PC or server that it crashes. Best if you have a botnet.
Anti-Viruses - An anti-virus is vital if you are downloading potentially dangerous files. How can you call your self a hacker if your hacked?
Best AV's - I recommend getting MalwareBytes and waiting for HF's very own HackerAV. For protection against keyloggers I recommend you use Keyscrambler
Code
Developing software uses code as well as scripts. Things "hackers" code are Crypters, Binders, Malware, Website exploits (like those to get past spam and The Facebook Exploit) and other things.
In my opinion, there are three groups of coding languages: Operating System languages, Web Development languages and software languages.
Web Development: HTML, PHP, XHTML, Javascript, CSS, Flash and others. All of these languages can be learned at W3Schools
Hope u enjoyed this post.
No comments:
Post a Comment