HackCave:Basics Of Hacking-How To Become A Hacker

Views:
 
     
 

Presentation Description

Hack Cave We share news regarding Information Security,Ethical Hacking VAPT and promotes cyber security awareness. You can get all latest technology updates and news on gadgets,computers,sceince & Technology. We also provide Online reputation Management,Search Engine Reputation Management(SERM) and SEO Services to small businesses. Visit:http://www.hack-cave.com

Comments

Presentation Transcript

How to Become A Hacker?:

How to Become A Hacker? Basics Of hacking www.hack-cave.com By Hack Cave

Types Of hackers:

Types Of hackers A hacker is someone who likes to tinker with electronics or computer systems. White Hat – These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats. Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites. www.hack-cave.com

Hacker Hierarchy :

Hacker Hierarchy Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes. Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level. www.hack-cave.com

Hacking & Programming Skills:

Hacking & Programming Skills Is programming skills necessary to be a hacker? The answer is no but with programming skills- 1. You’ll be considered an elite hacker. 2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The black hat would be able to take down thousands of machines before anyone discovers and patches the vulnerability. 3. You will feel so much more satisfied having created your own program or exploit. www.hack-cave.com

Where To Start?:

Where To Start? F irst master HTML ( HyperText Markup Language). HTML is part of what makes up all of the website pages you see on the internet. From there start with C. C is one of the most popular languages, and it is what makes up the majority of the exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out there today. Then start learning Python Ruby and shell scripting www.hack-cave.com

How to learn programming?:

How to learn programming? 1. Purchase a beginners book on your programming language. Before you choose the book, make sure you read the reviews to make sure it’s a good choice. 2. It is important that once you begin learning the programming language through your book, you don’t take big breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest of the book. 3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying what you learn. 4. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find someone that can help you. 5. Join a programming forum. Search for a website on your programming language that has a large user base. There will be many professionals on there that will be able to help you when you get stuck. 6. Practice. Practice Practice . Think of ideas for fun programs that you could make and program them! www.hack-cave.com

Next: Get Used to Linux:

Next: Get Used to Linux Linux is a free, open-source, UNIX-like operating system. As you continue to learn how to hack, you will realize how important it is to learn how to use the Linux operating system. Need some convincing? Here are a couple facts: 1. Millions of servers on the internet run on the Linux operating system. You must learn the operating system to be able to penetrate these web servers. 2. Some of the best hacking programs only run on Linux. Start with user friendly versions like Ubundu and later switch to advanced P entesting distributions like Kali Linux www.hack-cave.com

Next: Get Used to Linux:

Next: Get Used to Linux Linux is a free, open-source, UNIX-like operating system. As you continue to learn how to hack, you will realize how important it is to learn how to use the Linux operating system. Need some convincing? Here are a couple facts: 1. Millions of servers on the internet run on the Linux operating system. You must learn the operating system to be able to penetrate these web servers. 2. Some of the best hacking programs only run on Linux. Start with user friendly versions like Ubundu and later switch to advanced P entesting distributions like Kali Linux www.hack-cave.com

Password Cracking: Basic Methods:

Password Cracking: Basic Methods A few old-fashioned ways to obtain someone’s password. Social Engineering – Social engineering is when a hacker takes advantage of trusting human beings to get information from them. Shoulder surfing – Shoulder surfing is exactly what it sounds like. The hacker would simply attempt to look over your shoulder as you type in your password. The hacker may also watch weather you glance around your desk, looking for a written reminder or the written password itself. Guessing – If you use a weak password, a hacker could simple guess it by using the information he knows about you. www.hack-cave.com

Password Cracking: Advanced Techniques:

Password Cracking: Advanced Techniques Some Advanced techniques to crack someone’s password. A dictionary attack is when a text file full of commonly used passwords, or a list of every word from the dictionary is used against a password database. Strong passwords usually aren’t vulnerable to this kind of attack. Brute-force attacks try every possible combination of letters, numbers, and special characters until the right password is found. Brute-force attacks can take a long time. The speed is determined by the speed of the computer running the cracking program and the complexity of the password. A Rainbow table is a huge pre-computed list of hash values for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm that transformed it into something absolutely foreign. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. Phishing is the process of stealing sensitive information, such as usernames, passwords etc. A fake login page which looks exactly like original is sent and when the victim enters their details they are redirected to the genuine website. www.hack-cave.com

Password Cracking Tools:

Password Cracking Tools Now that you know what password cracking is, you might be interested in learning some more of the popular cracking software I have listed below: Can and Abel John the Ripper THC Hydra SolarWinds RainbowCrack www.hack-cave.com

Network Hacking :

Network Hacking Footprinting is the act of gathering information about a computer system and the companies it belongs to. Footprinting is the first step hackers take in their hacking process. Footprinting is important because to hack a system the hacker must first know everything there is to know about it. P ort scanning is to detect its open ports the port’s listening services. Once all the services running on the server is known possible vulnerabilities an be found and exploited to take control of website . In the port scanning example we will use the most popular port scanner: Nmap . Banner Grabbing It is done to figure out what software and version the service is. One way to get this information is to telnet into service port. www.hack-cave.com

Searching For Vulnerabilities:

Searching For Vulnerabilities Now you have the name of the software being used and its version number,you would take that information and search a couple vulnerability databases for an exploit. If there’s an exploit available,it can be run against the server and take complete control. If you are lucky you will find some 0-day vulnerabilities. Some of the most popular exploit databases are: Exploit- Db • Milw0rm • SecurityFocus • osvdb W hy 0-days are worth so much? It’s very simple. Hacker + 0-Day + Company Servers = Bad Reputation = Loss of Money www.hack-cave.com

Common Attack Types:

Common Attack Types Denial-of-Service ( DoS ) – There are many types of DoS attacks, but they all have one purpose: to make the target server unavailable for legitimate users. The most common type of DoS attack is when the hacker sends a flood of information to the target server causing it to use up all of its resources, and in return pushing it offline, or causing it to deny requests from legitimate users trying to access it. Buffer Overflow ( BoF ) – A buffer overflow happens when a program attempts to store more data into a buffer, or a data storage area, then it was meant to hold. Because the buffer was only meant to hold a certain amount of data, the extra information overflows into other buffers causing them to be overwritten with malicious code created by the hacker. Once this code is executed, the hacker can receive full control of the server. 57 Local Exploit – To run a local exploit, you must first have access and privileges on the machine. Local exploits are usually used to escalate ones privileges to admin or root. In other words, it allows an ordinary user to gain root privileges. Remote Exploit – A remote exploit is pretty much the same thing as a local exploit except that it isn’t run locally, but launched from anywhere across the internet. www.hack-cave.com

Conclusion:

Conclusion Coming Up next:- Wireless( WiFi ) hacking Windows hacking Web Hacking Stay tuned Visit My Blog www.hack-cave.com Facebook Page www.fb.com/hackcave Twitter: www.twitter.com/hack-cave www.hack-cave.com

authorStream Live Help