📄 Page
1
(This page has no text content)
📄 Page
2
Copyright 2015- All rights reserved. This document is geared towards providing exact and reliable information in regards to the topic and issue covered. The publication is sold with the idea that the publisher is not required to render accounting, officially permitted, or otherwise, qualified services. If advice is necessary, legal or professional, a practiced individual in the profession should be ordered. - From a Declaration of Principles which was accepted and approved equally by a Committee of the American Bar Association and a Committee of Publishers and Associations. In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic means or in printed format. Recording of this publication is strictly prohibited and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved. The information provided herein is stated to be truthful and consistent, in that any liability, in terms of inattention or otherwise, by any usage or abuse of any policies, processes, or directions contained within is the solitary and utter responsibility of the recipient reader. Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly. Respective authors own all copyrights not held by the publisher. The information herein is offered for informational purposes solely, and is universal as so. The presentation of the information is without contract or any type of guarantee assurance. The trademarks that are used are without any consent, and the publication of the trademark is without permission or backing by the trademark owner. All trademarks and brands within this book are for clarifying purposes only
📄 Page
3
and are the owned by the owners themselves, not affiliated with this document.
📄 Page
4
Content Introduction What is computer hacking Why do hackers Hack Chapter 1: Essential Hacking Tools and Skills Chapter 2: What is Malware and the basics Trojans Viruses Worms Spyware Bots Ransomware Rootkit Adware Chapter 3: Using Software for Hacking Email Hacking Operating system Hacking WPA2 Hacking Chapter 4: Hackers arsenal: Common Techniques and Viruses Chapter 5: Tips for Ethical Hacking Chapter 6: Hacking Self Defense (how to protect yourself from hacks) Hacking the Hackers Conclusion
📄 Page
6
What is computer hacking Computer hacking is the act of modifying computer equipment and programming to perform an objective outside of the inventor's unique reason. Individuals who take part in computer hacking exercises are frequently called hackers. Since "hack" has long been utilized to portray somebody who is uncouth at his/her calling, a few hackers guarantee this term is hostile and neglects to give fitting acknowledgment to their aptitudes. Computer hacking is most normal among adolescents and youthful grown-ups, albeit there are numerous more established hackers as well. Numerous hackers are genuine innovation buffs who appreciate adapting all the more about how computers function and consider computer hacking a ‘fine art’. They regularly appreciate programming and have master level abilities in one specific system. For these people, computer hacking is a genuine use of their critical thinking abilities. It's an opportunity to show their capacities, not a chance to damage others. Since an expansive number of hackers are self-trained wonders, a few companies really utilize computer hackers as a feature of their specialized bolster staff. These people utilize their abilities to discover
📄 Page
7
imperfections in the organization's security framework with the goal that they can be repaired rapidly. By and large, this kind of computer hacking aides forestalls fraud and different genuine computer-related unlawful acts. Why do hackers Hack When somebody hacks a computer or network system, it’s regularly for one of three fundamental reasons: A few hackers make endeavors on computers, servers or system frameworks only for the individual gratification. Others may feel that they have to demonstrate something to their associates or companions, and hack something just for the test. For things. Yes, breaking into a computer is awesome for getting data. If I needed a DVD that somebody has, I would simply need to break in and take the DVD stacked programming without needing to do it with anyone’s help. Free DVD anybody? Another reason to hack a framework is to take cash. A vast segment of hacking endeavors falls into this class. Banks and huge organizations are normal focuses for hacking employments, however some of the time littler organizations or even a specific individual's computer are focused, as well.
📄 Page
8
For status. Much the same as bank theft, it looks cool to be in a posse, have a personality and get acknowledgment for ability. That is if you're frantic for social approbation. Adding connections to your site is a more inconspicuous, less ruinous method for hacking. Web indexes see connections back to a site from different destinations of worth as a positive thing. These connections may help the site they connection to rank higher in the hunt postings. For entertainment only. Hacking is an amusement to demonstrate how brilliant you are. The more protections, hostile to viral, against spyware and firewalls you can crush the more brilliant you are. Also, its fighter diversions wonder. No doubt you can get a rush structure wrecking somebody's computer. It's not your own. There are also a few hackers, including hacking gatherings; that objective an organization for keeping in mind the end goal to upset business make turmoil and simply be an aggravation. These gatherings frequently are attempting to create an impression with their hacking, exhibit security deficiencies, or to show general objection for the business itself. Samples of hacking gatherings that stood out as truly newsworthy are Anonymous and LulzSec.
📄 Page
9
In vain. At times, you hack without importance as well. Then again you join a posse to see what it’s like. Before you know it, you're snared. Try not to do it. For blame. Hackers at times break into fix frameworks which clients neglect to repair. They also aware clients of security openings in their framework. They also can repair frameworks from a far which different hackers have demolished. Remember, that these individuals are an incredible when they show up however like batman they can be alarming. Lamentably, hacking for good undertakings is uncommon.
📄 Page
10
Chapter 1: Essential Hacking Tools and Skills SQLI Helper SQLI Helper is a device that will hack powerless sites utilizing SQL infusion. You don't need to put in a really long time attempting to discover your way in a site and attempting many mixes and codes to hack a site. There is also no need of learning of SQL to utilize this product. This instrument will do it without anyone else. You just need to advise her do and where to look. Dark Port Scanner Dark Port Scanner examines for open ports on a network. Sonic Bat - The Batch File Virus Creator This system makes clump (.bat) infections and has shifted choices to destroy the casualty computer in different ways. We can surge the storage room on casualties' computer by making huge number of documents in different organizers by utilizing its "envelope surge" highlight. It also
📄 Page
11
incorporates bat to exe converter to change over your bunch infection records into exe infection programs and a symbol changer. Brutus ( Password Cracker) Brutus is a remote online password wafer for windows, useful for HTTP, POP3, FTP, SMB, and Telnet and parcels others... it’s also free. It is accessible for Windows 9x, NT and 2000, there is no UN*X variant accessible in spite of the fact that it is a probability sooner or later. Brutus was first made freely accessible in October 1998 and since that time there have been no less than 70,000 downloads and more than 175,000 guests to this page. Improvement proceeds with so new releases will be accessible soon. Brutus was composed initially to help me check switches and so forth for default and regular passwords. IP Tools IP-Tools offer numerous TCP/IP utilities in one system. This honor winning Free Hacking device can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, and Windows Vista and is key for any individual who utilizes the Internet or Intranet. It incorporates the accompanying utilities:
📄 Page
12
1. Local Info – inspects the neighborhood host and shows data about processor, memory, Winsock information, and so on. 2. Name Scanner – examines all hostnames inside of a scope of IP locations 3. Port Scanner – examines network(s) for dynamic TCP based administrations 4. Ping Scanner – pings a remote has over the system Cain and Abel Cain and Abel (here and there called just "Cain") is a Windows password recuperation apparatus. It can recoup numerous sorts of passwords utilizing techniques, for example, system bundle sniffing, breaking different password hashes by utilizing routines, for example, lexicon assaults, animal power and cryptanalysis assaults. Cryptanalysis assaults are done through rainbow tables which can be created with the winrtgen.exe project furnished with Cain and Abel. Cain and Abel are kept up byMassimiliano Montero. The Essential Skills to Becoming a Master Hacker As the hacker is among the most talented data innovation disciplines, it obliges wide information of IT advancements and procedures. To really be an extraordinary hacker, one must master numerous abilities. Try not to be debilitated if you don't have all the abilities I list here, yet
📄 Page
13
rather utilize this rundown as a beginning ground for what you have to study and master soon. 1. The Fundamental Skills These are the basics that each hacker ought to know before notwithstanding attempting to hack. When you have a decent grasp on everything in this area, you can move into the delegate level. 2. Basic Computer Skills It most likely goes without saying that to turn into a hacker you require some basic computer abilities. These abilities go past the capacity to make a Word record or voyage the Internet. You should have the capacity to utilize the order line in Windows, alter the registry, and set up your systems administration parameters. 3. Organizing Skills You have to comprehend the basics of systems administration, for example, the accompanying. • DHCP • NAT • Subletting • IPv4
📄 Page
14
• IPv6 • Public v Private IP • DNS • Routers and switches • VLANs • OSI model • MAC tending to • ARP As we are frequently abusing these advances, the better you see how they function, the more fruitful you will be. Note that I didn't compose the two aides underneath, however they are exceptionally instructive and cover a percentage of the systems administration basics said above. • Hacker Fundamentals: A Tale of Two Standards • The Everyman's Guide to How Network Packets Are Routed 4. Linux Skills It is amazingly discriminating to create Linux aptitudes to turn into a hacker. Almost all the instruments we use as a hacker are produced for Linux and Linux gives us abilities that we don't have utilizing Windows.
📄 Page
15
If you have to enhance your Linux abilities, or you're simply beginning with Linux, look at my Linux arrangement for amateurs beneath. • Linux Basics for the Aspiring Hacker 5. Virtualization You have to end up capable in utilizing one of the virtualization programming bundles, for example, Virtual Box or VMware Workstation. In a perfect world, you require a sheltered situation to practice your hacks before you take them out in certifiable. 6. Security Concepts & Technologies A decent hacker comprehends security ideas and advances. The best way to conquer the barriers set up by the security administrators is to be acquainted with them. The hacker must see such things as PKI (open key infrastructure), SSL (secure attachments layer), IDS (interruption discovery framework), firewalls, and so on. The apprentice hacker can get large portions of these abilities in a basic security course, for example, Security+. • How to Read & Write Snort Rules to Evade an IDS 7. The Intermediate Skills
📄 Page
16
This is the place things get intriguing, and where you truly begin to get a vibe for your abilities as a hacker. Knowing these will permit you to progress to more natural hacks where you are making every major decision not some other hacker. 8. Web Applications Web applications are likely the richest ground for hackers lately. The more you see about how web applications work and the databases behind them, the more fruitful you will be. Also, you will likely need to assemble your own site for phishing and different accursed purposes. • How to Clone Any Website Using Track • How to Redirect Traffic to a Fake Website • The Ultimate List of Hacking Scripts for Metasploit's Meterpreter 9. Database Skills If you need to have the capacity to capably hack databases, you will need to comprehend databases and how they function. This incorporates the SQL dialect. I would also prescribe the mastery of one of the major DBMS's such SQL Server, Oracle, or Myself.
📄 Page
17
• The Terms & Technologies You Need to Know Before Getting Started • Hunting for Microsoft's SQL Server • Cracking SQL Server Passwords & Owning the Server • Hacking Myself Online Databases with Slap Separating Data from Online Databases Using Slap 10. Advanced TCP/IP The apprentice hacker must comprehend TCP/IP basics, however to ascend to the middle of the road level, you must see in close subtle elements the TCP/IP convention stack and fields. These incorporate how each of the fields (banners, window, do, toss, sew, ask, and so forth.) in both the TCP and IP parcel can be controlled and utilized against the casualty framework to empower Mitt assaults, in addition to other things. 11. Cryptography Albeit one doesn't should be a cryptographer to be a decent hacker, the more you comprehend the qualities and shortcomings of each cryptographic calculation, the better the shots of crushing it. Furthermore, cryptography can utilized by the hacker to conceal their exercises and avoid discovery. 12. The Intangible Skills
📄 Page
18
Alongside all these computer aptitudes, the fruitful hacker must have some elusive abilities. These incorporate the accompanying. 13. Persistence A hacker must be relentless. If you fall flat at to begin with, attempt once more. If that falls flat, think of another approach and attempt once more. It is just with perseverance that you will have the capacity to hack the most secured frameworks. 14. Think Creatively There is ALWAYS an approach to hack a framework and numerous approaches to fulfill it. A decent hacker can think inventively about various ways to deal with the same hack. • Null Byte's Guide to Social Engineering • Crypto Locker: An Innovative & Creative Hack 15. Problem-Solving Skills A hacker is continually coming up against apparently unsolvable issues. This obliges that the hacker be usual to thinking logically and tackling issues. This regularly requests that the hacker analyze precisely what isn't right and afterward separate the issue into discrete segments. This is one of those capacities that accompanies numerous hours of practice.
📄 Page
20
Chapter 2: What is Malware and the basics Malware, short for noxious programming, is any product used to upset computer operation, assemble touchy data, or obtain entrance to private computer systems. Malware is characterized by its malevolent expectation, acting against the necessities of the computer client, and does exclude programming that causes inadvertent mischief because of some lack. The term barware is now and then utilized, and connected to both genuine (vindictive) malware and accidentally hurtful software. Aware may be stealthy, proposed to take data or keep an eye on computer clients for a developed period without their insight, as for instance Reign, or it might be intended to bring about mischief, frequently as damage (e.g., Stunt), or to blackmail installment (Crypto Locker). "Malware" is an umbrella term used to allude to a mixed bag of types of threatening or meddling software. Including computer infections, worms, Trojan horses, ransomware, spyware, adware, scareware, and different noxious projects. It can take the type of executable code, scripts, dynamic substance, and other software. Malware is regularly camouflaged as, or