How to hack
Author Information
In this article, hacking sources before hacking
In the past, there was a time when it was called hacking simply by removing any information from the IT system. But nowadays, because of the villains in some movies, there is an image that hacking is bad. On the contrary, in reality, hackers are testing how robust the system is and whether there are security weaknesses. Hackers know how to use their skills in the right direction, and they are getting a lot of money. Read this article to learn how to start hacking study.
Way
One
Before hacking
1
Study programming languages. You do not have to study just one language, but there are some recommended languages.
C and C ++ were used to develop Windows and Unix. Studying these languages and assembly languages can help you learn about the computer memory structure, an important technique for hacking.
Python and Ruby are high-level, powerful scripting languages used to automate many tasks.
Perl is also worth learning, and PHP is a must if you want to deal with web hacking. Many websites are written in PHP.
Studying the Bash scripting language is also a must. Once you know how to handle the Bash scripting language, you can write Unix / Linux system scripts and do a lot of work quickly and easily.
Assembly language is also required. This language is the language used by the CPU of the computer, and there are many kinds. If you do not know the assembly, you can not hack the program and get rid of the information.
2
Investigate the system to attack. The process of investigating a system to be hacked is called an enumeration. The more you know, the less likely you are to be embarrassed by unexpected circumstances.
Way
2
Hack
1
Let's use a Unix / Linux terminal. Cygwin allows you to use Unix / Linux terminals in Windows environments. In case of Nmap, you can use WinPCap without Cygwin. But Nmap does not work well on Windows, because there are not many raw sockets. So it's a good idea to try Linux or BSD, a more flexible system. Most Linux distributions come pre-loaded with useful tools.
Alternatively, you can install and use bash in the Microsoft Store after the Windows 10 Fall Creators Update, which was applied in 2017. Let's take a look at this article.
2
First of all, let's safeguard against the computer you use. First, you must have a clear understanding of the skills needed to protect yourself. Let's start with the basics. Try attacking your computer's network, asking your administrator if you can attack any system, or create a virtual machine to create a lab space. Just be aware that attacking any system is illegal and you may be in a difficult situation.
3
Let's try the attack target. Let's make sure that the remote system is reachable. You can use the ping tool (which is installed by default on almost all operating systems) to see if the target is connected to the network, but the results are not always reliable. Ping is a system based on the ICMP protocol. If you are a system administrator, you may have turned off related programs.
4
Check your operating system. Scan the port using p0f or nmap. This will allow you to check in advance what ports are open on your system and which firewall or router to use. If you are using nmap, you can use the -O switch command to check your operating system.
5
Look for open ports or paths in the system. Well-known ports, such as FTP (# 21) and HTTP (# 80), are well protected and may have security problems that are hard to penetrate.
Make sure things like telnet or various UDP ports for online games are not open.
Opening port 22 means that you are using SSH (Secure Shell), which sometimes brute force you through the security issue.
6
Let's look at the password and the authentication process. There are a number of different password hacking methods, including a way to put all the values. When you fill in all the values, put all of the frequently used passwords included in the program.
- Nowadays, when you sign up, it takes a long time to check the weak passwords and sort them all. But this is also evolving.
- The majority of hash algorithms are weak, so using these weaknesses will shorten the hacking process. (For example, if you cut MD5 to 1/4, you see a huge speed improvement.)
- Some of these technologies utilize the computational capabilities of the graphics card. Thousands of times faster.
- If you want to break your password, try Rainbow Tables. Just remember that it is better to use password punching only when you have a hash value.
- It is not a good idea to send all possible passwords to a remote server. In many cases, login is prohibited because it is judged to be an illegal input by the hacking detection system. Otherwise, hacking can take several years or more to succeed.
- You can also get an unencrypted ID and password through hacked tablets, TCP scans, and uploading WiFi signals.
- In many cases it is much easier to penetrate the system in other ways without hacking the password.
7
Obtain superuser privileges. If you are using a Unix / Linux operating system, gain root privileges. If you are using a Windows system, you should get administrator privileges.
- Very important information is usually well protected and you need to get the appropriate rights to get that information. If you want to see all the files, you need superuser privileges. A superuser means a user with the same privileges as the root user on Linux or BSD systems.
- On the router (if not changed) means "admin" account. On Windows systems, this means the Administrator account
- Accessibility means that you can read everything and it does not mean that you can change it. Only superuser, administrator, and root accounts are allowed.
8
Let's try some tricks. One of the most popular techniques for obtaining superuser privileges is buffer overflow. This is because you can dump the memory contents, insert the desired code, or perform unauthorized tasks.
On Unix-like systems, if the setuid bit is set on a buggy program, the program may run as another user, such as a superuser.
You can use this technique only if you have installed or found such an unsafe program on the computer you want to hack into.
- On Unix-like systems, if the setuid bit is set on a buggy program, the program may run as another user, such as a superuser.
- You can use this technique only if you have installed or found such an unsafe program on the computer you want to hack into
9
Let's make a backdoor. If you have full control over a computer, it is a good idea to be prepared to come back easily later. Generally, you can use a SSH server to create a backdoor that can be returned to. However, these backdoors are usually removed during the system upgrade process. Hackers have a backdoor in the compiler that allows the compiler to get back to whatever program they are building.
10
Let's pack it like it's not hacked. Let the system operator notice that the system is hacked. Do not change the contents of the website (if you have a website), create files more than necessary, or add users. Let's get things done as quickly as possible. If you've hacked an access program like SSHD, put your password in hardcoded. And if someone else is trying to log in with that password instead of you, the login succeeds, but you should not expose any important information related to hacking
tip
- Unless you are an expert on hacking, using hacking techniques against famous companies or government computers can be a challenge. Those sites are better protected by experts who know better about hacking than you and use it to eat and live. In such a case, the attacker may observe the intruder process before proceeding with the legal process. In other words, you may be pleased that you have succeeded in hacking, but in fact it was a trap, what you were doing was observed, and you could be disconnected at any time.
- Internet, Linux, and those who created open source software are hackers. Remember that hacking is professionally knowledgeable enough to handle important things in the real world, so it can be fully respected.
- Do not forget that hacking skills are a result of your security being less concerned. If everyone in the world had a little more interest in security, you would not have had a chance to practice. So do not mistake yourself as the world's strongest hacker. Do not aim for the best in the world, but let's aim at getting better day by day. If you have not learned anything new, you have just wasted a day. We will do our best and strive to be the best. Let's try it a little, but do not try. I remember the saying that Star Wars' Yoda said, "Just decide one or the other, there's no such thing as an attempt."
- There are safe sites where anyone can practice hacking in a legitimate way, but unfortunately, it is difficult to become a hacker unless you try to do something that might be illegal. Even if you take the risk of being caught, you will not be able to build up your skills if you can not find a problem on a working system. Let's remember.
- The purpose of hacking is not to break into a computer, make a lot of money, sell out the information on the black market, disable the security system, and do not create jobs to do. Be an expert in security.
- Let's read a lot about TCP / IP networks.
- There are differences between hackers and crackers. Crackers are people who work to accomplish malicious purposes (usually money), and hackers like to get knowledge and information through various explorations, such as bypassing the security problems of existing systems. Just as hackers do not have the means to accomplish their goals, there are parts that are not legitimate.
- First, let's practice hacking with your own computer..
warning
- Be very careful if you find vulnerabilities or mistakes in very easy security. Some system management experts have installed honeypots to bring in hackers.
- Do not erase all the logs. Instead, let's just erase the logs from hacking. Another thing to consider is whether the log files are backed up. What if the system administrator finds the difference by looking at the backed-up log and finds out that it is hacked? Let's think about what you always did. One solution is to randomly erase other logs, including logs from hacking.
- It may be illegal to penetrate someone else's system. If you have permission from the owner to do the hacking, or if you are confident that you will never get caught, it is worth doing.
- Let's not do anything for fun. Network hacking is not a game. It is the power that can change the world. Let's not lose power in childish things.
- Aside from the usual advice, let's not help other programs or systems patch security vulnerabilities. The hacking community sees this behavior as very bad behavior and is likely to be snatched out. Especially if you've disclosed the vulnerability that someone else has found, the person will be hostile to you. And he will know better about hacking than you do.
- Misuse of the information in this article can cause legal problems. This article provides information on hacking and is written hoping that hacking will be used for ethical and illegal purposes.
- If you are not confident in your skills, do not infiltrate your company, government, or military network. Even if they have weaknesses, they have enough money to track and bother you. If you find a weakness in such a place, let's take it to a trusted and skilled hacker to use it for good purposes.
What you need
- A PC or laptop connected to the Internet. The higher the performance, the better.
- Proxy (optional)
- IP scanner program.














Nice article
ReplyDelete