Академический Документы
Профессиональный Документы
Культура Документы
Legal Disclaimer
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 2 -Namit
Page 2 2/6
My Official Page
https://www.facebook.com/OFFICIALNAMITBEHL
My Hacking Page
https://www.facebook.com/TestedHackingTrickz
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 3 -Namit
Page 3 2/6
Preface
Computer hacking is the practice of altering computer hardware and software to
carry out a goal outside of the creators original intention. People who slot in
computer hacking actions and activities are often entitled as hackers.
The majority of people assume that hackers are computer criminals. They
fall short to identify the fact that criminals and hackers are two entirely unrelated
things. Media is liable for this. Hackers in realism are good and extremely
intelligent people, who by using their knowledge in a constructive mode help
organizations, companies, government, etc. to secure credentials and secret
information on the Internet.
Years ago, no one had to worry about Crackers breaking into their
computer and installing Trojan viruses, or using your computer to send attacks
against others. Now that thing have changed, it's best to be aware of how to
defend your computer from damaging intrusions and prevent black hat hackers.
Rampant hacking is systematically victimizing computers around the world. This
hacking is not only common, but is being executed without a flaw that the
attackers compromise a system, steal everything of value and entirely rub out
their pathway within 20 minutes. So, in this Book you will uncover the finest ways
to defend your computer systems from the hackers
This Book is written by keeping one object in mind that a beginner, who is
not much familiar regarding computer hacking, can easily, Learn these Topics
covering every characteristic linked to computer security.
After Reading this book you will come to recognize that how Hacking is
affecting our every day routine work and can be very hazardous in many fields like
bank account hacking etc. Moreover, after carrying out this volume in detail you
will be capable of understanding that how a hacker hacks and how you can
defend yourself from these threats.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 4 -Namit
Page 4 2/6
- 5 -Namit
Page 5 2/6
- 6 -Namit
Page 6 2/6
- 7 -Namit
Page 7 2/6
- 8 -Namit
Page 8 2/6
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 9 -Namit
Page 9 2/6
10
- 10 -Namit
Page 10
11
- 11 -Namit
Page 11
12
- 12 -Namit
Page 12
13
- 13 -Namit
Page 13
14
- 14 -Namit
Page 14
15
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 15 -Namit
Page 15
16
- 16 -Namit
Page 16
17
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 17 -Namit
Page 17
18
MODULE
Introduction
What is a HACKER?
Origins Of Hacking
Hacking VS Cracking
Common Network Hacking
Techniques
ETHICAL HACKING
TYPES OF ETHICAL HACKER
PHASES OF HACKING
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 18 -Namit
Page 18
19
PROFILE OF AN HACKER
Skill Profile of an Ethical Hacker
HISTORY OF HACKING &
FAMOUS HACKER
What is Internet Protocol (IP)
What Is File Transfer Protocol
(FTP)
What is TELNET
What Is Simple Mail Transfer
Protocol (SMTP)
What Is Hyper Text Transfer
Protocol (HTTP)
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 19 -Namit
Page 19
20
- 20 -Namit
Page 20
21
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 21 -Namit
Page 21
22
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 22 -Namit
Page 22
23
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 23 -Namit
Page 23
24
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 24 -Namit
Page 24
25
What is a Hacker?
In computer networking, hacking is any
technical effort to manipulate the normal
behavior of network connections and
connected systems. A hacker is any person
engaged in hacking. The term "hacking"
historically referred to constructive,
clever technical work that was not
necessarily related to computer systems.
Today, however, hacking and hackers are
most commonly associated with malicious
programming attacks on the Internet and
other networks.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 25 -Namit
Page 25
26
Origins of Hacking
M.I.T. engineers in the 1950s and 1960s first
popularized the term and concept of hacking. Starting
at the model train club and later in the mainframe
computer rooms, the so-called "hacks" perpetrated by
these hackers were intended to be harmless technical
experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term
to less honorable pursuits. Before the Internet became
popular, for example, several hackers in the U.S.
experimented with methods to modify telephones for
making free long-distance calls over the phone network
illegally.
As computer networking and the Internet exploded in
popularity, data networks became by far the most
common target of hackers and hacking.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 26 -Namit
Page 26
27
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 27 -Namit
Page 27
28
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 28 -Namit
Page 28
29
ETHICAL HACKING
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 29 -Namit
Page 29
30
Types Of Hackers
WHITE HAT
Use Of Knowledge
Skills For Defensive Purpose
GRAY HAT
Individual Who Works For Both The Sides
Ethical And Malicious
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 30 -Namit
Page 30
31
NEOPHYTE
A Newbie In The Field Of computer Security With
Almost No Knowledge
Script Kiddie
A Non- Expert Who Uses Tools or Script made by
others To Hack Into The System
Having Little Knowledge About The Concept
WORKING To Hack
ELITE
Also known As 1337
It Is A Term Used To Describe the Most technically
advanced Hackers Who Use Cutting Edge Technology
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 31 -Namit
Page 31
32
PHASES OF HACKING
Threat An Action or event which is potential
challenge to Security
Vulnerability It is Existence of flaws Or Errors
in the design Of the System Which Can Cause
Undesired results Of System Security.
Attack An Action which Attempts to Violate
or Challenge the Integrity or Security OF A
System
Exploit A Defined Way To Breach the Security
of a System Or Product using an identified
vulnerability
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 32 -Namit
Page 32
33
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 33 -Namit
Page 33
34
Information Gathering
Scanning
Gaining Access
Operation System / Application
Network Level
Denial Of Service
Maintaining access
Uploading /downloading programs or data
Covering Tracks
- 34 -Namit
Page 34
35
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 35 -Namit
Page 35
36
History of Hacking
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 36 -Namit
Page 36
37
Famous Hackers
Jonathan James
Adrian Lamo
Kevin Mitnick
Kevin Paulsen
Robert Tappan Morris
Steve Wozniak
Steve Jobs
Tim Berners-Lee
Linus Torvalds
Richard Stallman
Tsutomu Shimomura
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 37 -Namit
Page 37
38
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 38 -Namit
Page 38
39
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 39 -Namit
Page 39
40
TELNET
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 40 -Namit
Page 40
41
SMTP is
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 41 -Namit
Page 41
42
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 42 -Namit
Page 42
43
Features:
Support offline mail processing and
persistent message IDs
Offers access to new mail from various
client platforms anywhere across the
network
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 43 -Namit
Page 43
44
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 44 -Namit
Page 44
45
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 45 -Namit
Page 45
46
TCP
The Transmission Control Protocol (TCP) is one
of the core protocols of the internet protocol suite.
TCP is one of the original component of the suite,
complimenting the Internet Protocol (IP) and
Therefore the Entire Suite IS Commonly Referred
To As TCP/IP. It Provides the Service of
Exchanging Reliably Between Two Network hosts,
whereas IP handles Addressing and Routing
Message across One or More Networks. In
Particular, TCP provides reliable, Ordered
Delivery Of Stream Of Bytes From A Program On
A On One Computer To Another Program On
Another Computer. It is a protocol that major
Internet Applications relay on, Such As the
WORLD WIDE WEB (WWW), Email, and File
Transfer. Other Applications , Which Do Not
Require Reliable Data Stream Service , May Use
The Datagram Protocol (UDP) Which Provide a
Datagram Service, Which Emphasizes reduced
latency over Reliability.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 46 -Namit
Page 46
47
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 47 -Namit
Page 47
48
WHAT IS A LAN
- 48 -Namit
Page 48
49
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 49 -Namit
Page 49
50
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 50 -Namit
Page 50
51
DNS
The Domain Name System (DNS) is a standard
technology for managing the names of Web sites
and other Internet domains. DNS technology
allows you to type names into your Web browser
like compnetworking.about.com and your
computer to automatically find that address on
the Internet. A key element of the DNS is a
worldwide collection of DNS Server.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 51 -Namit
Page 51
52
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 52 -Namit
Page 52
53
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 53 -Namit
Page 53
54
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 54 -Namit
Page 54
55
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 55 -Namit
Page 55
56
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 56 -Namit
Page 56
57
DHCP server
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 57 -Namit
Page 57
58
network congestion
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 58 -Namit
Page 58
59
- 59 -Namit
Page 59
60
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 60 -Namit
Page 60
61
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 61 -Namit
Page 61
62
Area Networks
Networks can be categorized in several different
ways. One approach defines the type of network
according to the geographic area it spans.Local
area networks (LANs), for example, typically span
a single home, school, or small office building,
whereas wide area networks (WANs), reach
across cities, states, or even across the world.
The Internetis the world's largest public WAN.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 62 -Namit
Page 62
63
Network Design
Computer networks also differ in their design.
The two basic forms of network design are
calledclient/server and peer-to-peer. Client-server
networks feature centralized server computers
that store email, Web pages, files and or
applications. On a peer-to-peer network,
conversely, all computers tend to support the
same functions. Client-server networks are much
more common in business and peer-to-peer
networks much more common in homes.
A network topology represents its layout or
structure from the point of view of data flow. In
so-called bus networks, for example, all of the
computers share and communicate across one
common conduit, whereas in a star network, all
data flows through one centralized device.
Common types of network topologies include bus,
star, ring networks and mesh networks.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 63 -Namit
Page 63
64
Network Protocols
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 64 -Namit
Page 64
65
Home Networking
While other types of networks are built and
maintained by engineers, home networks belong
to ordinary homeowners, people often with little
or no technical background. Various
manufacturers produce broadband
router hardware designed to simplify home
network setup. Home broadband routers allow
devices in different rooms to efficiently share
a broadband Internet connection, enable people to
more easily share their files and printers within
the network, and help with overall network
security.
Home networks have increased in capability with
each generation of new technology. Years ago,
people commonly set up their home network just
to connect a few PCs, share some documents and
perhaps a printer. Now its common for
households to also network game consoles, digital
video recorders, and smartphones for streaming
sound and video. Home automation systems have
also existed for many years, but these too have
grown in popularity more recently with practical
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 65 -Namit
Page 65
66
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 66 -Namit
Page 66
67
Business Networks
Small and home office (SOHO) environments
use similar technology as found in home
networks. Businesses often have additional
communication, data storage, and security
requirements that require expanding their
networks in different ways, particularly as the
business gets larger. Whereas a home network
generally functions as one LAN, a business
network tends to contain multiple LANs.
Companies with buildings in multiple locations
utilize wide-area networking to connect these
branch offices together. Though also available
and used by some households, voice over
IP communication and network storage and
backup technologies are prevalent in businesses.
Larger companies also maintain their own
internal Web sites, called intranets to help with
employee business communication.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 67 -Namit
Page 67
68
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 68 -Namit
Page 68
69
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 69 -Namit
Page 69
70
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 70 -Namit
Page 70
71
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 71 -Namit
Page 71
72
- 72 -Namit
Page 72
73
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 73 -Namit
Page 73
74
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 74 -Namit
Page 74
75
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 75 -Namit
Page 75
76
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 76 -Namit
Page 76
77
- 77 -Namit
Page 77
78
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 78 -Namit
Page 78
79
- 79 -Namit
Page 79
80
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 80 -Namit
Page 80
81
- 81 -Namit
Page 81
82
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 82 -Namit
Page 82
83
- 83 -Namit
Page 83
84
- 84 -Namit
Page 84
85
- 85 -Namit
Page 85
86
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 86 -Namit
Page 86
87
- 87 -Namit
Page 87
88
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 88 -Namit
Page 88
89
- 89 -Namit
Page 89
90
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 90 -Namit
Page 90
91
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 91 -Namit
Page 91
92
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 92 -Namit
Page 92
93
- 93 -Namit
Page 93
94
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 94 -Namit
Page 94
95
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 95 -Namit
Page 95
96
What Is A keylogger
- 96 -Namit
Page 96
97
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 97 -Namit
Page 97
98
- 98 -Namit
Page 98
99
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 99 -Namit
Page 99
100
- 100 -Namit
Page 100
101
- 101 -Namit
Page 101
102
180
Config# cdp timer 30 - Sets the
update timer.The default is 60
Config# int Ethernet 0
Config-if# cdp enable - Enables cdp
on the interface
Config-if# no cdp enable - Disables
CDP on the interface
Config# no cdp run - Turns CDP off
HOST TABLE:
Config# ip host ROUTER_NAME
INT_Address - Example: ip host lab-a
192.168.5.1
-or Config# ip host RTR_NAME INT_ADD1
INT_ADD2 INT_ADD3 - Example: ip host
lab-a 192.168.5.1 205.23.4.2 199.2.3.2 (for e0, s0, s1)
DOMAIN NAME SERVICES:
Config# ip domain-lookup - Tell
router to lookup domain names
Config# ip name-server 122.22.2.2 Location of DNS server
Config# ip domain-name cisco.com Domain to append to end of names
CLEARING COUNTERS:
# clear interface Ethernet 0 - Clears
counters on the specified interface
# clear counters - Clears all interface
counters
# clear cdp counters - Clears CDP
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 102 -Namit
Page 102
103
counters
STATIC ROUTES:
Config# ip route Net_Add SN_Mask
Next_Hop_Add - Example: ip route
192.168.15.0 255.255.255.0 205.5.5.2
Config# ip route 0.0.0.0 0.0.0.0
Next_Hop_Add - Default route
-or Config# ip default-network Net_Add Gateway LAN network
IP ROUTING:
Config# ip routing - Enabled by
default
Config# router rip
-or Config# router igrp 100
Config# interface Ethernet 0
Config-if# ip address 122.2.3.2
255.255.255.0
Config-if# no shutdown
IPX ROUTING:
Config# ipx routing
Config# interface Ethernet 0
Config# ipx maximum-paths 2 Maximum equal metric paths used
Config-if# ipx network 222
encapsulation sap - Also Novell-Ether,
SNAP, ARPA on Ethernet. Encapsulation
HDLC on serial
Config-if# no shutdown
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 103 -Namit
Page 103
104
- 104 -Namit
Page 104
105
- 105 -Namit
Page 105
106
Googles friends!
Services offered by Google use tracking cookies and a
unique ID a piece of text stored on a users computer
by their web browser.
Google Cookies are used for spying your stored data.
Google Privacy Policy is illegal in the European Union.
How can you protect your privacy on Google ?
Do not use Gmail, do not install any Google products in
your computer.
Do not use Google Analitics on your blog (use
altrernative e.g. Piwik)
Google doesnt need to collect this information, but it
does.
Google took complete control of market share with all
their services and they control you by having access to
your : documents, maps, email, phone services, email,
entertainment, news, websites traffic, health records,
translator and calendar.
Google secretly monitors the users behaviou and
collects various types of personal information, such as
Internet surfing habits, sites that have been visited then
maybe used .
I cant believe some people are actually stupid enough
to even consider placing important personal
information in GoogleDocs or sent important emails by
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 106 -Namit
Page 106
107
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 107 -Namit
Page 107
108
- 108 -Namit
Page 108
109
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 109 -Namit
Page 109
110
- 110 -Namit
Page 110
111
- 111 -Namit
Page 111
112
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 112 -Namit
Page 112
113
Internet Firewalls
- 113 -Namit
Page 113
114
- 114 -Namit
Page 114
115
- 115 -Namit
Page 115
116
fbi.gov.
Recently I have also found that UTS actually switches
packets through to the FBI
firewall to be allowed or denied access. This brings me
to the second use for
the FBI firewall. It seems that at times they DO want
people from outside the
wall to be able to access their computers. And to do this
they have set up a
file with addresses that are allowed to access the
computers behind the wall.
Now by logging UTS with one of the various logging
programs I'd say that these
nodes could be easily found, as the programs (the good
ones) log where the
connections are made from and to and the login id and
password of course.
The only problem with this is that I have found UTS to
be one of the most secure
universities on the network in sydney. However nothing
is impossible and UTS is
certainly not hack proof.
The most interesting feature of the Wall is it's CPU
power. I am wondering what
it could do with a good unix version of Killer Cracker
running on it! ;)
Imagine 'Hacker Caught running Password Hacking
programs on FBI's security
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 116 -Namit
Page 116
117
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 117 -Namit
Page 117
118
- 118 -Namit
Page 118
119
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 119 -Namit
Page 119
120
- 120 -Namit
Page 120
121
- 121 -Namit
Page 121
122
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 122 -Namit
Page 122
123
- 123 -Namit
Page 123
124
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 124 -Namit
Page 124
125
What is "ETHERNET
A physical and data link layer technology for local
area networks (LANs). Ethernet was invented by
engineer Robert Metcalfe.
When first widely deployed in the 1980s, Ethernet
supported a maximum theoretical data rate of 10
megabits per second (Mbps). Later, so-called
"Fast Ethernet" standards increased this
maximum data rate to 100 Mbps. Today, Gigabit
Ethernet technology further extends peak
performance up to 1000 Mbps.
Higher level network protocols like Internet
Protocol (IP) use Ethernet as their transmission
medium. Data travels over Ethernet inside
protocol units called frames.
The run length of individual Ethernet cables is
limited to roughly 100 meters, but Ethernet
networks can be easily extended to link entire
schools or office buildings using network bridge
devices.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 125 -Namit
Page 125
126
- 126 -Namit
Page 126
127
- 127 -Namit
Page 127
128
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 128 -Namit
Page 128
129
- 129 -Namit
Page 129
130
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 130 -Namit
Page 130
131
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 131 -Namit
Page 131
132
- 132 -Namit
Page 132
133
- 133 -Namit
Page 133
134
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 134 -Namit
Page 134
135
- 135 -Namit
Page 135
136
deep.
Email Travelling Path
Lets say we have two Email providers, one is
Server1.com and other is Server2.com, ABC is a
registered user in
Server1.com and XYZ is a registered user in
Server2.com .
In this case we will just pretend that both users are
using the websites of server1.com and server2.com No
emailing programms are used.
Step one: ABC signs in to his Email account in
Server1.com, he then writes a mail to the
xyz@server2.com and click on Send
and gets the message that the Email is sent successfully.
So easy ?
But what happens behind the curtain ?
Behind the curtains the Email from the computer of
abc@server1.com is forwarded to the
Email server of Server1.com. Server1 then look.s for
server2.com on the internet and forwards the Email of
the server2.com for the account of XYZ. Server2.com
receives the Email from server1.com and puts it in the
account of
XYZ.
This was just simple mechanism. Actually When abc
clicks on send email his ip address is tracked by
server1.com and it is saved in the email id as headers .
Now a days almost all servers track user's ip address.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 136 -Namit
Page 136
137
- 137 -Namit
Page 137
138
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 138 -Namit
Page 138
139
- 139 -Namit
Page 139
140
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 140 -Namit
Page 140
141
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 141 -Namit
Page 141
142
What is Phishing?
Phishing is a method used by
internet thieves to acquire
sensitive information like
usernames, passwords, credit
card details, by disguising as a
trustworthy entity, and using
different ways of instant
messaging, web pages, software
and even text messages.
Why is phishing so spread?
Phishing has been known since
1996. Internet thieves had
published web pages that looked
similar to the original ones in
order to steal login information
from legitimate users and use
their accounts for spamming or
other purposes.
Phishing can be controlled, but
user intervention and caution is
required too. New phishing web
pages and e-mails are published
and sent daily and lots of
accounts are stolen.
E-mail phishing
Every internet user received at
least one e-mail telling him that
the bank wants his card details
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 142 -Namit
Page 142
143
- 143 -Namit
Page 143
144
- 144 -Namit
Page 144
145
- 145 -Namit
Page 145
146
- 146 -Namit
Page 146
147
- 147 -Namit
Page 147
148
WHAT IS TABNAPPING
- 148 -Namit
Page 148
149
Things to be done:
1.check for mouse movement
2.check for scroll bar movement
3.check for keystrokes
If any of the above event is not triggered till few seconds
, this means user is not using that tab, either is off from
system or using other tab, so if these coditions are met,
then we redirect it to our phished page, which user
thinks it to be genuine page.
The idea behind this is very simple and is done by
javascript. Tab napping is all about the relation of 2
pages. suppose Page A and Page B. Victim was viewing
page A in a tab of a browser and then left this idle and
and now using some other website in another tab of
browser. If the user will not return to page A for some
pre-specified time, page A will automatically redirect to
Page B. This Page B is your phishing page. This
redirection and cheking for user actions is done by
Javascript.
Make a web page and use the tab napping script in that
page say it page A. This script will not affect the layout
or content of the page. This script will check for user
actions. If the page is idle for some time, this script will
redirect this page to a pre-specified page which may be
your phishing page. You have to specify this page in the
script. Be sure to change this in script.
check script for this line...
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 149 -Namit
Page 149
150
timerRedirect =
setInterval("location.href='http://www.yourwebsite.co
m/'",10000);
this line will redirect to Gmail after 10 sec. Change this
location to the address of your phishing page. This line
is used 2 times in the script so change is both lines.
so, page A with tab napping script will redirect to
phishing page B.
Now send the link of the page A to your victim. This is a
normal page. If the page is idle for some time it will be
changed to page B otherwise no effect.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 150 -Namit
Page 150
151
- 151 -Namit
Page 151
152
vulnerabillty.
In order to find sites vulnerable to XSS use google
dorks. The most comman google dork used by attackers
to exploit the XSS vulnerability is:
inurl:search.php?q=
How to find if the website is XSS vulnerable or not.
Example Website: "www.website.com/search.php?q="
Open the website, you will find a search box. in that
search box type this code:
<script>alert("XSS Detected !!")</script>
And click on search. If the site is vulnerable, you will
get a Jquery box saying "XSS Detected", if you got that
you can move foreward to deface the website site.
Now if you want just to display a simple message like
"H4CK3D", Enter the below HTML code and click on
search.
<h1><center><b>Hacked by
H@x0r_C0d3/K!lL</h1></center></b>
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 152 -Namit
Page 152
153
- 153 -Namit
Page 153
154
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 154 -Namit
Page 154
155
- 155 -Namit
Page 155
156
- 156 -Namit
Page 156
157
account.
If your Facebook account gets hacked its embarrassing.
If that is the same email used on your more secure
accounts, now that vulnerability could be costly.
Obviously, if you are selective with your email
addresses and periodically change your passwords, you
minimize your chances of being hacked.
Did you know that anyone can search Facebook for an
email address? For example, if you are looking a
common name such as John Smith, you only need to
search with their email to find the right one.
This is handy for finding your friends on Facebook, but
also useful for hackers. The safe bet is to use distinct
passwords for your public and private email addresses.
There are even more ways to protect your Facebook
and other online accounts, but these 5 are the most
essential, and they are specific to Facebook, which
seems to be the site that is the most vulnerable.
Would You Like More Facebook Tips?
Then consider joining thousands of other small
businesses that have signed up for our monthly Web
Marketing News to get the good stuff a concise
synthesis of what is covered every day here on
JeffKorhan.com excluding weekends, of course.
Good luck
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 157 -Namit
Page 157
158
Indroduction of BacktraCk :
- 158 -Namit
Page 158
159
- 159 -Namit
Page 159
160
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 160 -Namit
Page 160
161
- 161 -Namit
Page 161
162
- 162 -Namit
Page 162
163
#################### ##
TASKKILLER
kill **** = PID number
###############
###############
#################### ##
BLUETOOTH
hciconfig hci0 up = on
hciconfig hci0 = info
hcitool scan hci0 = find devices
###############
###############
#################### ##
ANDROID TETHERING
easytether connect
***new konsole
dhclient eaytether0
###############
###############
#################### ##
TAR/RAR/ZIP = cd to directory
tar zxf file.tar.gz
tar xvfz ******.tar.gz
tar -zxvf ******.tgz
tar xvf *******.tar.gz2
tar jxf file.tar.bz2
tar zxvf file.tgz
unzip ******.zip
unrar x ****.rar
###############
###############
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 163 -Namit
Page 163
164
#################### ##
INSTALL PROGRAMS
aptitude install **** =install
apt-get **** = install
apt-get update = update repos
apt-get remove [--purge] **** =
uninstall plue dependencies
apt-cache search = search repos
###############
###############
#################### ##
BLUETOOTH
start device
>> hciconfig hci0 up
find device info
>> hciconfig hci0
###############
###############
#################### ##
WPACRACKING
rfkill unblock all = start wifi
airmon-ng start wlan0 = start
monitor mode
airdump-ng mon0 = monitor all
airdump-ng -c *channel -*****bssid -w psk mon0 = catch
handshake
aireplay-ng -0 5 -a****acsespoint c ***conectdcomp mon0 = deauth
attack
mdk3 = stronger deauth attack
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 164 -Namit
Page 164
165
Conclusion
Thanks for Reading This Book and I
hope The Contents Describe in the book
Will Help you to become A Hacker. Now
You Are Own Capable Of Securing your
Own and your Surrounding Computers
from the Threat that we Called
HACKING.
www.facebook.com/OFFICIALNAMITBEHL
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
- 165 -Namit
Page 165