WHAT IS HACKING?
Hacking is an art. An art of finding – how things work, why they work and how you can manipulate it, so that it works on your commands. Hacking is not based on the so-called “code of ethics”. It is all based on pure imagination, creativity, inquisitiveness and thinking out of the “box”.
Hacking is an art. An art of finding – how things work, why they work and how you can manipulate it, so that it works on your commands. Hacking is not based on the so-called “code of ethics”. It is all based on pure imagination, creativity, inquisitiveness and thinking out of the “box”.
- Who are Hackers?
Hacker is a computer-enthusiast, a skilled programmer, a good social engineer, who knows his way around computer systems. Hacker is a problem-solver. For a Hacker, computer is nothing but a reward and Internet is an unexplored treasure house. - Who are Script Kiddies?
Script Kiddies alias skiddies are low-profiled ignorant cunts, who break into computers with malicious intent, propagate cyber-terrorism, use already available toolset, rip exploit codes and remain nescient all through. - What is 1337/l33t speak?
1337 or l33t speak is a typeset and widely used Internet language. It is the graphical denotation of numbers that resemble an English alphabet. In this lingo, several English words are misspelled to give an indifferent touch. It was extensively used by the “old-sk00l h4x0rs” during the BBS days. Nowadays. It is used commonly in online gaming sessions. Example: j00 907 pwn3d! - What programming languages are important for hacking?
Start with C to acquire the basic methodologies of programming. After gaining certain efficiency in C, move on to ASM to get deep into more advanced stuff. You could also try your hands with Perl, Python, or Ruby for quick scripting, exploit development and easy-to-use tools. - Which is the best hacking site?
Duh! One the most clichéd question. Ever. Well, there is no “best hacking site”. Hackers do not rely on hacking sites, other than a personal memory dump on an unused shell. Nevertheless, hackers love sites that are informative. And, just for the notes, Google (http://www.google.com) is your information hub. - What is the difference between *nix and Linux?
*nix is a family of operating systems that constitutes of different operating systems that are based on UNIX. It was developed at AT&T Bell laboratories in the 70’s. It houses popular operating systems such as GNU/Linux, as well as BSD and BeOS.
Linux is a UNIX-based monolithic kernel, developed by a Finnish student, named Linux Torvalds in 1991. The source code has been developed in C and it is freely available. Linux is not immensely popular. However, as a web server, Linux is the best choice. - What is the difference between Linux and GNU/Linux?
Well, Linux is the barebone kernel with minimal tools repository, originally developed by Torvalds. Whereas GNU/Linux is, Linux accompanied with tools and scripts that are a part of the GNU project. GNU/Linux is often called as ‘Windows NT’s worst enemy’. As an operating system. - Open Source? What is it?
Open Source in plain simple words means that the software’s source code can be legally viewed, modified and redistributed. Most *nix operating systems are open source. - Is Linux is better than Windows?
Yes, it certainly is. - What is a distro?
Distro alias Distribution can be well defined as a modified kernel that is targeted towards the average user. - What is a Live CD?
A Live CD distro is type of distribution in which the entire Linux operating system can be booted off with a CD. You need not have to install it. Although, most of the Live CD distros that have fancy GUI’s require excessive amount of RAM. Example: Ubuntu, CentOS. - Which distro are you using, now, SB?
A minimal barebone distro called CRUX. My base install is 150MB with X, gcc, perl and stuff. It boots within 10.22 seconds on a standard 400 MHz box in X. Why? Because I am not a lazy bum, who uses restraining distros that hogs up +1GB of unneeded startup scripts, useless services, an overflowing /etc directory, 200MB of /usr/doc that you never even look at and yes, not to forget, an overfilled glibc and KDE/Gnome with bazillion dependencies. - How do I tune my O/S?
Minimize your kernel, keep your LiLo/Grub secure, make a cooler boot prompt, and free your disk from unused services that are rarely played. Partition your box in a much more effective way, rather than a large reiserfs. Use hdparm to extract out the maximum potential of your disks. Get rid of memory-hog window managers such as KDE or Gnome and choose lighter ones such as Openbox, Fluxbox. - Which is your favourite Window Manager?
Openbox.
Shagbox, the one I developed myself, with random tid-bit help from Blackbox. - UNIX Shell? What is it?
In simple words, the black screen through which you executed commands and then they popped out messages. That is a shell, for the lame. The most commonly used shell is bash, though, very less majority of people still prefer traditional ones, such as ksh, tcsh, csh, sh, ash etc.
Online shells are effective and useful. This is because, you could try your hands with various flavours of *nix without the paranoia of messing up. It is not yours, after all! - Where do I get a free shell?
Your own servers, free shell servers, ask your ISP for one. I would recommend the shell that you operate from your own server, because you are in charge of the logs and such. - What is root?
Ever played rootwars? If no, then, root is the highest-privileged user in a UNIX-based box. It is the system administrator account. - What are exploits?
An exploit is piece of code that is used to gain unauthorized access, take advantage of existing vulnerability, supersede verification, and acquire root. Exploits are coded in various programming languages like C, Perl, Python, PHP, Bash, and Ruby. - Where do I find exploits?
Generally, hackers do not popularize their exploit code. However, a few ‘White Hats’ exhibit their exploit code for the vendor’s benefit. Therefore, to obtain exploit codes, you could visit:
www.milw0rm.com
www.securityfocus.com
www.packetstormsecurity.org
www.nvd.nist.giv
Although, I would say, do not use the exploits to “hack” or to “break into systems”, unless and until, you like the Script Kiddie tag. - How do I compile exploits?
Using the language’s compiler, “Genius”. - Whenever I compile exploits, I get some sort of errors. What is the problem?
Usually, hackers who code exploits deliberately put errors so that script kiddies cannot compile the code. Therefore, you must know the language before compiling a random exploit. - What are 0dayz?
0dayz are exploit codes that have not experienced a legitimate release. - What are buffer overflows?
Buffer Overflow proves to be extremely hazardous, especially, in an environment where user input plays an important role. Buffer Overflow is a fault or I can say an error arising in the programmer’s end. In other words, the source of an application embraces such errors. Moreover, such errors can be exploited easily by studying the coding nature and scripting behaviour of the application. Example of a vulnerable code:
Code:#include
void main(void)
{
char pwn[255] = { 0 };
std::cin >> pwn;
getchar();
} - Then, what are stack overflows?
In plain and simple words, Stack is a region allocated to store variables of a particular function. It also stores specified arguments that are supposed to be passed on to other function type. Each of the function has a pre-defined stack frame, which is accountable for saving/restoring the caller’s stack frame.
Now, in a stack overflow, the saved instruction pointer is overwritten with the address where the shellcode has been affixed. This means you can have total control over the program and can spawn a shell. Example of a vulnerable code:
Code:void func(char *pwn)
{
printf("%sn",pwn);
}
int main()
{
char pwn[256];
func(pwn);
} - What are backdoors?
Backdoor is a malicious technique to bypass the normal authentication process, keeping a remote access in the form of either reverse connection or bind connection or connect back connection and remaining undetected. You can remain undetected by either installing a hexed malicious application or you could modify any existing application or device driver or O/S service. - What is a Trojan?
Trojan is a malicious program bound inside a desirable program. Trojan gives you unauthorized entry into a system. Trojans are considered lame and gimpy because it is an automated way to gain unauthorized access. Some famous Trojans:
- SubSeven
- Back Orifice
- Bifrost
- Poison Ivy
- Nuclear RAT - How do I infect someone with a Trojan?
Okay, firstly, it is lame and it propagates script kiddieness. Anyway, if you insist… Trojans comprises of two distinct tools, namely, Server and Server Builder. The Server Builder lets you affix your friends IP address, add features such as Fake Error-Generation, Key-logging etc. After creating the server, you would make a Server. The Server has all your desired options. Now, you could either bind it with another desirable application or make it undetectable by using your hex editing skills. Once you are done, execute the file in the victim’s computer and enjoy skiddie-like status. - I have executed the Trojan in my friends’ computer, but it isn’t working. Could you tell me why?
It is because your friend is smart enough to keep a well-configured firewall or IDS, or a port blocker. - What are Viruses?
Viruses are malevolent programs that are able to replicate themselves and corrupting or I may say, crashing the entire system. They are usually used to create computer-related havoc. - What are virii-coders?
Virii-Coders are programmers who code viruses. - In what language are good and effective viruses written?
ASM/Assembly, that is. - What are spywares?
Spyware is a piece of software that exists in several websites. They are installed in your system without your knowledge. They track down your web surfing habits, so that the vendors are able to demonstrate desirable advertisements. - What is Denial of Service?
In a Denial of Service or DoS attack, the attacker launches an attack where crafted packets are sent to the victim’s system. It is uncommon and unsuccessful because packet crafting can be easily filtered. - What is Distributed Denial of Service?
In this type of attack, the attacker launches attack from multiple systems to make the attack more intricate and potent. Usage of distributed computing methods is often deployed to trigger DDoS attacks. Example: Botnets - How can I stay anonymous on the Internet?
Using a proxy server. There is nothing much fruitful other than a proxy server, you own or build yourself. It is because you have access to the logs. - Could you elaborate proxy servers?
Proxy server is a system allows a network to invoke indirect network connection to other networks. The proxy server either establishes an indirect connection via another network in its hub or by utilizing the available cache data. - What are the most common types of proxy servers?
The traditional HTTP proxy server and the over-rated CGI proxy. The former either utilizes the cache or hooks up the request to another network through redirection. The latter is nothing but a CGI script that allows the server to forward the requests to the browser. It proves to be useful during proxy tunneling. - Now, what is Proxy tunneling?
It is a method by which one can tunnel his/her own network to another network by means of a terminal emulator and a remote port. - What is a port?
A port receives and regulates data sent over the network in the form of network traffic. - What is port scanning?
Port scanning is a reconnaissance technique. It is used to probe all the available ports in a network. - Which is the best port scanner?
Nmap is by far the best port scanner. It is available for both POSIX and Windows. - What is a daemon?
Daemon is a system service or a process that runs in the background. - What is Banner Grabbing?
Banner grabbing is a method to request information from a system. The information can be of a daemon of a specified port. - What is TCP?
It is the acronym for Transmission Control Protocol. It’s a standard protocol used to transmit data from one network to another. It is a part of the TCP/IP suite and the OSI model. TCP helps in propelling bug-free data through the network. - What is IP?
Internet Protocol is an address comprising of a sequence of a numbers, used to identify a particular system or a domain in a network. - What is IRC?
IRC alias Internet Relay Chat is a type of real-time instant messaging in the form of conferencing. A conference can be initiated via channels. Private messaging can do one-to-one messaging and file transfer can be done via DCC (Direct Client-to-Client). You need to be equipped with a IRC client, in order to unveil the pleasure of IRC. - Which IRC client do you recommend?
For GUI, Xchat would be enough. Moreover, for CUI buffs, there is nothing better than irssi. - How do I stay anonymous on IRC?
You could use Vhost alias Virtual Host to remain anonymous. Vhost’s allow you to switch to a different hostname, instead of the real one. This ensures privacy for those who hate getting WHOIS’d. You could subscribe to BNC AKA IRC Bouncers to go to IRC. In addition, you could use SOCKS proxy server to connect to IRC. Every client has the option of implementing SOCKS settings. - How do I spoof my IP address?
Spoofing IP address is a cumbersome process because it mostly deals with blind-trust relationship with the network you are dealing with. However, with the knowledge of RAW socket and C/Perl, one could spoof his/her IP. - What is encryption?
Encryption can be defined as the process of converting data into non-readable code. - How do I encrypt my Email?
Using PGP, GPG, SSL Tunnel or any other OpenPGP application. - How do I get my friend’s IP?
Well, there are innumerable ways to get your friend’s IP. If you are on any common Instant Messenger, you could first establish a direct connection with your friend, then, Reverse Engineer your Instant Messenger, make an IM debugger. With your debugger, you could get the socket ID’s, that is, the IP address, whenever you have a direct connection. (Hint: Yahoo Instant Messenger’s debugger is freely available on the net)
If you are an IRC buff, you could use “/whois” command to get your friend’s IP. If you are having faith on Emails, then, you could use Email Headers to acquire the IP. If you own a website, you could always create an IP grabber in 3 lines via PHP. - What is RFI?
RFI alias-Remote File Inclusion is web application vulnerability that helps the attacker to upload a Web Shell remotely by executing a malicious URL string through the browser. Example:
Code:www.anysite.com/index.php?page=www.anysite.com/webshell.php?cmd=ls - What is LFI?
LFI alias-Local File Inclusion is also a web application vulnerability that allows the attacker to view local files by executing a malicious URL string that triggers unsanitized variables.
Code:www.anysite.com/index.php?page=../../etc/passwd - What is XSS?
XSS also called as Cross Site Scripting attack is a web application exploit method by which the attacker can steal information from the web server by inserting malicious scripts in the URL via the web browser. Example:
[url=http://www.anysite.com/cgi-bin/tools.cgi?page=<script>alert(‘XSS’)</script>]Code:www.anysite.com/cgi-bin/tools.cgi?page= - What is SQL Injection
SQL Injection is a web application exploitation method by which the attacker can infuse malicious link in the URL to generate sensitive database information. One can also insert Injection strings in forms to bypass restrictions. Privilege Escalation Error-Generation through SQL Injection also proves to be dangerous, as sometimes, the database generates errors containing significant information.
Power of SQL injection can be experienced by the usage of stored procedures and database tools such as osql. - What are Botnets?
Botnet is a network of systems that has been compromised by an attacker. These systems can be used by the attacker to launch various kinds of malicious activities such as DDoS, by the help of distributed computing. Botnets are usually automated through IRC channels, P2P networks or Torrent lines. - How do I get the registration code of software?
By using a debugger, a hex editor and some good ASM skills. - How do I hack my friend’s email account?
Hacking or Cracking an email account is definitely not an easy job to do because nowadays well-known email providers have armoured their servers with strong IDS systems and hardcore scripts. However, vulnerabilities still exist. I will suggest you to try out the following things:
- Bugs: You could exploit existing bugs or you could find your own bugs. You can try out web-application exploit methods such as SQL Injection, XSS, Cookie Stealing, RFI, LFI, CSRF etc. (Hint: Yahoo’s got a PG source variable bug that allows the attacker to get Yahoo passwords in seconds)
- Phishing: You can create a fake login page that redirects the login information into your mailbox.
- Social Engineering: You can use Social engineering techniques to acquire passwords. This method has been very effective.
- Using a Keylogger: You can use a keylogger to log all the keystrokes that have been processed in a system. This is an effective way to acquire passwords, but remote infusion of keyloggers is difficult unless you compromise the victim’s system. You should try out Aradamax Keylogger or S-C Keylogger or code one in C.
- Password Guessing: The least effective technique.
No comments:
Post a Comment