Академический Документы
Профессиональный Документы
Культура Документы
Hi there. Thanks for taking the time to view this thread. I'm sure you will lear
n something new from it :)
Sections:
1) Introduction
2) The hacker manifesto
3) What is hacking?
4) Choosing your path
5) Where should I start?
6) Basic terminology
7) Keylogging
8) RAT's
9) Java Driveby's
10) Crypters
11) Dosing and DDosing, what's the difference?
12) Staying anonymous
13) Proxies
14) VPN's
15) Alternatives, tips and tricks
16) Extending your knowledge
17) Closing section
SECTION 1
Introduction
Hi there. If you are reading this, you're either an eager to learn beginner hack
er, or an upgraded member here to judge my work. Well, in either case, I'm sure
you will enjoy this thread and increase your knowledge of hacking. I will be goi
ng over ALL the basics of hacking, and a lot more. I've included tutorials aswel
l, so you could say this is an all-in-one guide.
SECTION 2 - The hacker manifesto
The hacker manifesto (also known as the conscience of a hacker) is an essay writ
ten by a hacker known as 'The Mentor'. It is often said to give an insight into
the psychology of hackers. If you are hoping to start learning the art of hackin
g, this will certainly give you the right mindset for the job. "The Hacker Manif
esto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, i
t's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker
Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in
your three-piece psychology and 1950's technobrain, ever take a look behind the
eyes of the hacker? Did you ever wonder what made him tick, what forces shaped h
im, what may have molded him? I am a hacker, enter my world... Mine is a world t
hat begins with school... I'm smarter than most of the other kids, this crap the
y teach us bores me... Damn underachiever. They're all alike. I'm in junior high
or high school. I've listened to teachers explain for the fifteenth time how to
reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I di
d it in my head..." Damn kid. Probably copied it. They're all alike. I made a di
scovery today. I found a computer. Wait a second, this is cool. It does what I w
ant it to. If it makes a mistake, it's because I screwed it up. Not because it d
oesn't like me... Or feels threatened by me.. Or thinks I'm a smart ass.. Or doe
sn't like teaching and shouldn't be here... Damn kid. All he does is play games.
They're all alike. And then it happened... a door opened to a world... rushing
through the phone line like heroin through an addict's veins, an electronic puls
e is sent out, a refuge from the day-to-day incompetencies is sought... a board
is found. "This is it... this is where I belong..." I know everyone here... even
if I've never met them, never talked to them, may never hear from them again...
I know you all... Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at school wh
en we hungered for steak... the bits of meat that you did let slip through were
pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apa
thetic. The few that had something to teach found us willing pupils, but those f
ew are like drops of water in the desert. This is our world now... the world of
the electron and the switch, the beauty of the baud. We make use of a service al
ready existing without paying for what could be dirt-cheap if it wasn't run by p
rofiteering gluttons, and you call us criminals. We explore... and you call us c
riminals. We seek after knowledge... and you call us criminals. We exist without
skin color, without nationality, without religious bias... and you call us crim
inals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us a
nd try to make us believe it's for our own good, yet we're the criminals. Yes, I
am a criminal. My crime is that of curiosity. My crime is that of judging peopl
e by what they say and think, not what they look like. My crime is that of outsm
arting you, something that you will never forgive me for. I am a hacker, and thi
s is my manifesto. You may stop this individual, but you can't stop us all... af
ter all, we're all alike."
Taken from http://www.mithral.com/~beberg/manifesto.html
That is the essay. It's quite impressive isn't it? After reading it you should h
ave an idea of the mindset any hacker should have. I read it about 5 months ago
and it has certainly sent me on the right track.
SECTION 3 - What is hacking?
What is hacking? Well, whatishacking.org defines it as "the practice of modifyin
g the features of a system, in order to accomplish a goal outside of the creator
's original purpose. The person who is consistently engaging in hacking activiti
es, and has accepted hacking as a lifestyle and philosophy of their choice, is c
alled a hacker. Computer hacking is the most popular form of hacking nowadays, e
specially in the field of computer security, but hacking exists in many other fo
rms, such as phone hacking, brain hacking, etc. and it's not limited to either o
f them." - Taken from whatishacking.org That's a great definition but in my opin
ion hacking is much more than that. In my opinion, hacking isn't something you c
an just 'learn'. It's not just a skill, it's an art. Hacking requires knowledge.
Knowledge is power. In order to gain said knowledge, and the power that comes w
ith it, a change of lifestyle is required, along with a certain amount of secrec
y. Learning 'how' to hack takes time and dedication. There's no easy way to get
better at it. That's right, no shortcuts and its unlikely you're going to get a
helping hand. Like everything else in life, it takes practice. Don't go crying t
o others if it doesn't work out, just keep calm and carry on. If you are serious
about becoming a hacker, you will need to be willing to change your lifestyle,
and dedicate yourself to the task. With enough dedication and hard work you will
excel at hacking.
SECTION 4 - Choosing your path
Ask any stranger what a hacker is, they will probably give you a really negative
answer; identity theft, hacking accounts, stealing, to name a few. The reality
is actually quite different. There are a few kinds of hackers, you probably only
know about the bad ones. This section should give you a better understanding of
the different kinds of hackers, and help you decide which kind you should becom
e.
Black hat hackers: These are the bad guys you always hear about. These are the p
eople giving other hackers a bad name. Black hat hackers are the ones who commit
crime. They steal identities, hack accounts, ddos sites and just go about causi
ng havoc.
Grey hat hackers: Grey hats are basically good guys. They still do illegal stuff
, but they report it to the person/company they are targeting. So... Basically t
hey do bad stuff and help people to fix it.
White hat hackers: White hat hackers are the good guys. They fix stuff and help
people. They don't do illegal stuff. You've probably never heard of an event whe
re a hacker does something good but these guys do that all the time.
Examples of white hat hackers are:
Technicians
Cyber security teams
IT consultants
Now that you have a better understanding of the 'types' of hackers, you need to
choose your path. This requires a lot of thinking, because you need to consider
the possibilities of each path. Black hat is the easiest path to choose. It's 'f
un' and it has the most benefits. It also is the only one that will get you in t
rouble and maybe even arrested. Grey hat is a slightly more difficult path. You
(technically) are a good guy but most people won't see you as such. Grey hats ha
ve a hard time because although they are trying to help, the method they are usi
ng isn't really that legal. If you do choose to be a Grey hat, be aware that som
e people won't believe you are really trying to help, and you may still get in t
rouble. The last and most difficult path is White hat. As I mentioned before, Wh
ite hats are the good guys. Their job is to help. Becoming a White hat may seem
boring but you are helping people, and that should be a reward in itself. The on
ly problem with becoming a What hat is that you will have to start out as a Blac
k hat. I personally would recommend that you start out as a Grey hat. You'll get
more out of it.
SECTION 5 - Where should I start?
This is the question that most people ask. I honestly don't think there is any o
ne place to start. Ask around on any forum and people will always tell you to le
arn to use RAT's and keyloggers. To be honest I wouldn't recommend doing that st
raight away. I would advise to learn the basic terminologies of hacking (see sec
tion 6) and try to get an idea of exactly what everything means. It's really imp
ortant to understand stuff before you go downloading random hacking programs fro
m the Internet. It you don't know how to use them, or if they are viruses, you o
nly have yourself to blame.
SECTION 6 - Basic terminology
As I mentioned in the previous section, it is important to have a decent amount
of knowledge about hacking before you can start. So I've taken the liberty of ty
ping up a list of common terminologies you should know.
Common terminologies:
Ddos - Distributed denial of service attack. This is where a website is flooded
with packets of data from multiple sources and the server basically overloads. D
dos attacks are often confused with Dos attacks.
Dos - Denial of service attack. This is where a site is flooded with packets of
data from a single source. A Dos isn't as effective as a ddos, but it is a lot e
asier, as you can Dos straight from cmd.
404 Error - The error you are given when a site is down. If you have attacked a
site and don't see this, your attack wasn't successful.
cmd - Command prompt. This is basically MS-Dos, except it's now just a program w
ith some commands rather than an OS. Cmd can be used to perform tasks using comm
ands.
.bat - Batch file extension. This is the file type which is opened in cmd. Most
.bat's that you will see online will be malicious. Some are good though.
RAT - Remote Administration Tool. RAT's are the most commonly used tools by begi
nner hackers. RAT's are favored because they are easy to use and they perform ma
ny functions. They also allow control over of the infected computer, which makes
them very popular. Slave - A user which has been infected with your keylogger/R
AT.
Keylogger - A program which logs the keystrokes of a computer. These are usually
the first things that beginner hackers learn to use. They have a lot of functio
ns but they aren't as good as RAT's.
Crypter - A program used to change the hash sum of a malicious program so that i
t is undetectable by anti-virus programs.
FUD - Fully UnDetectable. A program which is FUD cannot be detected by ANY antivirus program. UD - UnDetectable. A program which is UD is mostly undetectable b
ut can be detected by some anti-virus programs.
JDB - Java Driveby. A fake site which contains a java applet. This java applet i
s used to download and execute (run) a certain program. The victim as to click t
he 'allow plugin to run' button to start the applet.
Silent Java Driveby - A java driveby that's downloads and executes a file withou
t the user seeing any pop-ups. These are more effective than normal java driveby
's as they are less suspicious.
Direct link - The direct download link to a certain file. When you download a fi
le from a site (e.g. Mediafire), you are given a download link which redirects y
ou to a page with a download button. However a direct link is a link which leads
directly to the file. There is no download button, the download starts straight
away.
FTP - File Transfer Protocol. An FTP server is a server used to store and send f
iles.
OS - Operating system
vb - Microsoft Visual Basic. This is a coding language used to make a lot of pro
grams.
.NET - Microsoft .NET framework. This is another coding language made by Microso
ft. It is used to create programs.
C/C+/C++/C# - Commonly use coding languages. They are often used to code games.
IP address - The address used to identify your network while on the Internet. Ev
ery computer has a different IP address, and therefore every IP address is uniqu
e.
VPN - Virtual Private Network. This is a network you can connect to on a compute
r. It will give you anonymity while online. A VPN will hide your IP address by t
ricking sites and programs into thinking you are somewhere you are not.
Proxy - A proxy redirects web traffic through a virtual tunnel to another IP add
ress. A proxy is like a VPN but only tricks websites, not the whole computer. Th
at may seem like a lot of things to remember, but it's not that much considering
those are just the basics. Don't let that put you off learning though, once you
start to learn one thing, another will follow and so on so forth.
Keylogging
Keylogging is one of the most basic things in hacking. I explained what a keylog
ger is in section 6. Downloading a good, free keylogger isn't that hard to do. J
ust search around HackForums and you will find one in about 30 seconds. I would
recommend using SysLogger as it is free and really easy to use. It has many feat
ures and allows for the logs to be sent via Email or an FTP server. SysLogger ha
s a really nice interface, so you should be able to figure out how to use it. Ho
wever if you can't figure it out, or would like to know how to use it before get
ting it, here is a tutorial I typed up a while ago:
Are your friends bothering you? Need to get back at someone? Or do you just want
to learn some of the basics of hacking accounts? In any case, this thread will
be INCREDIBLY useful to you.
First of all, heres what this method will require and what it will involve:
-
Computer (duhh)
Internet connection
Keylogger, we will be using one called SysLogger
Target
Making a fake program that the target will want to open
An email (preferably a Gmail)
Now we need to fill in the mailing options. I recommend using mail as opposed to
FTP because it is more secure and its a lot easier. Put in your email address a
nd password. If you are using a Gmail you don't have to change the 'SMTP' option
s, if you aren't google the SMTP options for your email provider. Click 'test em
ail', if a box pops up saying success, you've done everything right, if not, go
back and do it again. There should be a box below that which says 'Interval'. Se
t that to whatever time you want.
Now click 'Change file properties'. This will open up another GUI. Find an icon
that suits your fake program here
The icon changer might not work for everyone. If it doesn't, download a free ico
n changer from google.
ngs'. Type in the proxy then select the appropriate settings (e.g. HTTPS or Sock
s5). Then you need to restart Chrome (just close it then open it again). Go to h
ttp://whatismyip.com to check if the proxy is working properly. If it is, it sho
uld display a different IP to your actual one.
SECTION 14 - VPN's
Many of you have probably heard of VPN's before. For those of you who don't know
what they are, VPN's are VirtualPrivateNetworks. A detailed explanation of what
they are can be found in section 6. Connecting to a VPN is really easy.
I will teach you how to connect to a VPN on:
Your PC
Your iDevice
Before I teach you how to do that, you will need to find a VPN to use. Here is a
list of VPN's you might want to try.
Free VPN's:
http://bestcanadavpn.com Best Canada VPN
http://hideme.ru HideMe.ru
http://hotspotshield.com Hotspot Shield
Paid VPN's:
http://hidemyass.com HideMyAss
http://nvpn.comn VPN
http://openvpn.net OpenVPN
How to connect to a VPN on your PC:
This will teach you how to connect to a VPN on your PC.
- Click on the WiFi icon on the taskbar.
- Select the option Open Network and Sharing Center
- Click Connect to a new connection or network - Select Connect to a workplace and t
hen click next
- Click next - Select Use my internet (VPN) - Type in the address of the VPN you w
ant to connect to
- Type in the username and password then click Connect - You should see the scre
en
You re done! This should appear.
How to set up a VPN on your iDevice:
Heres how to connect to a VPN using your iDevice. For this tutorial we will be u
sing the free VPN, BestCanadaVPN. I will be going over all the steps needed to s
et this up and a few other things. First off, you need to open up settings. Now
go "General"-->"Network"-->"VPN" Now tap the "Add VPN configuration" button. It
will bring up this menu. Now fill in the boxes with these. Description: VPN Serv
er: bestcanadavpn.com Account: free Secret: (put anything here) Now we need to g
et the password. So open up safari and head over to bestcanadavpn.com You will s
ee the password on the homepage. Now type the password into the "Password" box i
n the VPN configuration. Now tap "Save". Congratulations! You have just set up t
he VPN on your iDevice! Now you need to connect to it. To do that just press the
"On" button. Once you are connected, it will say so and a VPN icon will appear
in the status bar. ***PLEASE NOTE*** The VPN password changes every 24 hours. Us
ing a VPN will provide a significant amount more protection that a proxy, but wo
n't make you completely untraceable.
SECTION 15
Alternatives, tips and tricks
This section will cover some of the alternatives to proxies and VPN's. These met
hods are probably a little bit harder to use, but they are just as good (if not
better).
Change your IP
Most routers have a setting which allows you to clone your MAC address and set i
t as your IP address. This allows you to hide your location and disguise it as.
Use anonymous web searches Some sites offer anonymous web searches. This doesn't
offer very good anonymity, but hey, it's better than nothing.
Ctrl+Shift+Delete
This amazing little shortcut can clear cookies and data, web history and autofil
l data incredibly quickly! It's great and takes almost no time to do.
Put Tor on a USB
Tor is a network which provides anonymity while on the Internet. Most schools wi
ll not allow you to download it and install it. So just download it onto a USB a
t home and run it when you get to school. Your school won't have a clue what you
are doing online!
Use private browsing
Most browsers have a private browsing option. This opens up a ******* which does
n't save cookies, and can't be tracked in an administrator system. Its great bec
ause anyone can use it.
Double Desktop Switcher
Yup, everyone knows this one, but it does work! Download Double Desktop Switcher
onto a USB and bring it to school. You can do whatever you want and when a teac
her walks by just press the hotkey to change screens.
Use your mobile/iPod
Most schools think they are smart an monitor all the traffic on their computers.
The reality is that they are dumb idiots as they don't monitor mobile traffic.
I have downloaded torrents and done a whole bunch of stuff on my iPod and my sch
ool hadn't had a clue!
Use public computers
Don't do hacking stuff from home. Go to an Internet cafe or the library. Bring a
ll your stuff on a USB and run it from that.
Combine methods
If you seriously
and use a public
Go online using
b proxy. Open up
ing.
With all of that, your Internet will probably be so slow it's unbearable, but yo
u will be anonymous!!!! Oh yeah... did I mention that all of these will slow you
r internet connection speed? No? Too bad.
I m kidding. They will slow down your connection, but not by very much, so the tra
de-off is worth it.
SECTION 16
Extending your knowledge
Don t learn to hack, hack to learn . You ve probably seen that posted all around the in
ternet. To a certain extent, it s true. Hacking is often used to gain knowledge yo
u wouldn t otherwise be able to know. However if you don t learn to hack, how can yo
u hack?
This section will help you discover ways to extend your knowledge of hacking. No
w, in order to do this, you will need to spend extensive amounts of time browsin
g the internet. There s no other way. There are also no shortcuts. If you don t put
in the work, you won t get the results. End of story.
Now that we ve got that out of the way, let s begin.
Since you re probably too lazy to use google, here are some useful sites
Those are pretty much the only sites you will need to start off with. They have
almost ENDLESS supplies of knowledge, and have relatively friendly members. Sign
up for those sites and you ll be well on your way to becoming a successful hacker
.
SECTION 17
Closing section
Congratulations, you ve finally reached the last section! I bet it took you a whil
e to read through all of that, but you ve probably learned a lot too. Now most of
my knowledge has been passed down to you. I put a lot of time and effort into ty
ping this up (7 hours to be more precise), and spell-checked this over 50 times.
I even added images in (lucky you) so this guide would be easy to follow. So pl
ease, post a short thank you message in the original thread. That takes 30 secon
ds, this took 7 hours.
Remember, knowledge is power. But if you misuse that power it will be taken away
from you. Stay true to yourself and the world will do so aswell.
ccvabh[at]yahoo[dot]com