Breaking News
Loading...
Saturday, March 15, 2014

Hacking Lessons For beginnners Part 1



This is Class-1 for Hacking introduction

Usually a beginner have two questions when they going to learn hacking...

Q .I want to be a hacker, but I don't know where to start Sad ?
Ans.Well, you're in luck, because the best place to start off is right here!

Q.What is Hacking?
Hacking is a process to bypass the security mechanisms of an information system or network.
Or
In common usage, hacker is a generic term for a computer criminal, often with a specific specialty in computer intrusion. While other definitions peculiar to the computer enthusiast community exist, they are rarely used in mainstream context. ..
Or
Hacking is an unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems,it now has negative implications.)
Hacking started way too far when the microsoft DOS was designed. Hacking is basically finding out the loop holes and trying leak some information out of it, which may lead you to get some critical information like passwords, credit card details. Sometimes hacking is done just because of the personal offenses.


Defining Hacker..
Hacker is a word that has two meanings:
Traditionally, a hacker is someone who likes to tinker with software or electronic systems.


Hackers enjoy exploring and learning how computer systems operate
The good-guy (White hat) hackers don’t like being in the same category as the bad-guy (Black hat) hackers.(These terms come from Western movies where the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) 

Whatever the case, most people give hacker a negative connotation. Many malicious hackers claim that they don’t cause damage but instead
are altruistically helping others. Yeah, right. Many malicious hackers are electronic thieves.




Top 5 Most Famous Hackers of All Time:

1. Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at the age of 16 . In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off." James also cracked into NASA computers,stealing software worth approximately $1.7 million.

2. Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to make his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."

3. Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.

4. Kevin Poulsen: Also known as Dark Dante, he gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items.His hacking specialty, however, revolved around s.

5. Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act..

<------The decision------>


Firstly, you are going to need to know the difference between Blackhats and Whitehats.

White-hat (ethical): Someone who uses his/her knowledge for good/to help others.

White hat hacking examples: 
Penetration tester - Using your skills to do penetration tests. (usually paid work) 
Helping others - Community/forum based usually. 
CEH - Certified ethical hacker. 
And more!

Black-hat (un-ethical): Someone who uses his/her knowledge for personal gain/malicious reasons.

Blackhat hacking examples: 
Keylogging - Keystroke logging, basically logs what the person that you have infected is doing. As to what they are typing and basically what they do on their computer. 
DoS (short for Denial of Service attack) - a type of attack designed to disable networked systems usually by sending a huge amount of external requests thus flooding the system or making it work slowly.
DDoS (short for Distributed Denial of Service attack) - Similar to DOS in almost every way except with DOS the attack comes from one source, but with DDOS the attack comes from multiple sources. To achieve this you will need a botnet/hostbooter(or other methods) which I will not go into deep discussion about in this tutorial. 
RAT - (Short for Remote Administrative Tool) or sometimes referred to as (Remote Administration Trojans) - These are somewhat similar to keyloggers, but they are also a lot different. RAT'S basically will give you control over the other person's computer (the person you have infected). 
Social Engineering - Basically a way to get someone to give you the information you want. You could attain this by posing to be someone you are not and using manipulative skills to get information from a person you know has the information.

So choose your self who you want to be an helper or a criminal behind the bars...


Hackers Three Stages:
1.Script kiddies - these are beginners for hacking,these are the people who makes people looks bad.script kiddies have doesn't have any hacking skill.they use hacking tools developed by others without any knowledge what the going behind the scenes.

2.Intermediate hackers - these people have good knowledge about computer hardware,networks and programming knowledge to understand what can a script do.?,but like script kiddies they also use pre-developed hacking tools

3.Elite hackers - These are the skilled hackers.they are the one who develop hacking tools and exploits they can break into system and hide there tracks.
You should eventually got to this level .. ;)


Q . Did i really want to learn Programming language for this ..?
Ans. Yup you should want to go through this because you cant what going behind the scripts and hacking tools so you should want to learn programming language..
I recommend to you first start with HTML because its a basic language if you masters in HTML then you can understand how webpages works
After that you can go for C language because its most popular language in world also there are many powerful hacking tools or exploits you can make from C..


Resources For learning HTML urself -
1.HTMLDOG
2.W3SCHOOLS
3.Google Code
4.Mozilla developer network

Languages for hacking:-

1.C
2.C++

3.Python
4.Java

Resources For learning C language urself -
1.Learn code the hard way
2.Notes on programming in C
also use books like - The C programmming Language,ANSI C, etc


I have various resources for programming languges and other stuff if you want reply below or PM me on Facebook...

0 comments:

Post a Comment

Copyright © 2012 DzireZOne All Right Reserved
Designed by Pirate Rex