OceanofPDF - Com HACKING 2 Books in 1 - Mark Anderson
OceanofPDF - Com HACKING 2 Books in 1 - Mark Anderson
Book 1
Book 2
Tips and Tricks to Get Past the
Beginner’s Level
OceanofPDF.com
Hacking:
Introduction
Chapter 1: Introduction to Hacking
Chapter 2: Ethical Hacking vs. Criminal Hacking
Chapter 3: Passive and Active Attacks
Chapter 4: Mapping Out Your Hacks
Chapter 5: Basic Spoofing and Man in the Middle Attack Techniques
Chapter 6: Hacking Passwords
Chapter 7: Hacking a Network Connection
Chapter 8: Popular Tools for Hacking
Conclusion
OceanofPDF.com
Introduction
To get instant access to this book and more awesome resources, check out
the link below:
CLICK HERE
As an added bonus, subscribers will be given a chance to get exclusive
sneak peeks of upcoming books on Computers and Technology and
discounts that will not be available to the general public. You will also have
the opportunity to obtain free copies of my subsequent books with no
strings attached. Don’t worry, we treat your e-mail with the respect it
deserves. We will not spam you and that’s a promise!
What You Will Find In this Hacking Book
The world of hacking is interesting and also exceedingly complex. This
guidebook will take a look at hacking and all the various components that it
entails. We will look at what hacking is, how it has evolved since the 1960s
and the different manners in which hacking has been utilized over time.
CLICK HERE
CLICK HERE
CLICK HERE
If you check out our Programming Library, you WILL increase your
earning capacity and marketability at any company dramatically. You will
confidently walk into any interview knowing that your skill sets will be
valued and you have something unique to bring to the table. So don’t miss
out!!
You don’t need to have a degree in computer sciences or have worked with
computers all your life in order to get started on hacking. Some people do
have those things under their belt and while it is certainly an advantage, it is
not a prerequisite. You simply need to have an interest in computers and the
ability to learn. So let’s get started with learning about hacking and how to
put it to good use for yourself to successfully achieve your desired
outcomes.
OceanofPDF.com
Chapter 1: Introduction to Hacking
We have all heard about hackers thanks to our media and the way that
Hollywood likes to portray them in movies. We think of someone who is
smart and sits in their basement while getting onto any network that they
choose. It is exciting when we watch movies and the media portray hacking
in their own ways, but neither Hollywood nor the mainstream press really
shows the true story of hacking.
The term hacker came up during the 1960s and was originally used to
describe a programmer or someone who was able to hack out a computer
code. These people were able to see future ways to use a computer and
would create new programs that no one else could. They were basically
innovators in their fields at the time and they would ultimately end up being
the ones who led the computer industry to where it is today.
These early hackers were interested in their work. They were excited to
create a new program, but they wanted to learn how other systems worked
as well. If there happened to be a bug in another system, these hackers
would be the ones who would create patches that could help fix the
problem.
While at first these people were visionaries that helped to create programs
and even fix what wasn’t working for others, things started to change once
the computer system started going over into networks. Then the term hacker
would expand to be seen as someone who was able to get onto a network
where their access was restricted. Sometimes this hacker may have been on
a particular network because they were curious to find out how it worked
and other times it was for more malicious intents and purposes.
As you can see, there is a big difference between what was seen as a hacker
a few decades ago and what is seen as a hacker today. Some of this
confusion exists because there are two sides to hacking- which we will
analyze in more detail later- and each one will work slightly differently to
either expose or protect the network in question.
The process of hacking is something that is often in the news, but most
people don’t understand what it is all about. Basically, hacking is the
process of modifying the software and hardware of a computer to
accomplish a goal that was outside its original purpose. It can also include
any time that someone enters into a network that they are not allowed.
Those who engage in this process are known as hackers and they are often
able to get onto computers, systems, and find access to information they
may not be authorized to.
While the media may lead us to believe that all hackers are up to no good,
for the majority of them, this is just not the case. Some just see it as a
challenge and an adrenaline rush to get onto a system, even if they
shouldn’t. Others enjoy learning about computers and figuring out what
they are able to do. Most of the hacking that goes on today is not meant to
be destructive or criminal at all, although the law may look at these things
differently.
Since many hackers are considered computer prodigies, there are actually
quite a few corporations in America who employ them on their technical
staff. These hackers are able to work with the company to figure out any
flaws present in the security system, making it easier to fix these problems
before a criminal hacker gets in. These individuals can help stop identity
theft, protect the organization, and so much more.
In addition, computer hacking has led to other developments in technology.
One such example is Dennis Ritchie, a former hacker, who created the
UNIX operating system, which had a big impact on how Linux was later
developed. Shawn Fanning, who is the creator of Napster, is also known as
a computer hacker as well as a leader in technology.
Of course, it is those with less noble motives for hacking that are the ones
that get the most intention. Some are out to steal your personal information,
break into a company’s information, and get onto a network without the
proper authorization. This is a criminal offence and can land you in jail for
20 years as well as have you paying many hefty fines. These are the types
of people that have brought about heavier laws against hacking, more
stringent anti-virus and malware, and more.
As you can see, there are many sides to the hacking world. Most hackers
are just really interested in computers and have the ability to put this
knowledge to work in the technology field while others are less noble and
will work to get onto networks and steal information that is not theirs.
Another misconception that you may come across is that all hackers are
young, either they are teenagers or in their early 20s. While there are some
hackers who fit into this age range, hackers are anyone who knows a lot
about computers and how to get into places they may not be allowed in.
Often younger hackers are the ones who are caught doing illegal hacking
because they are younger with less experience, but anyone of any age can
be a hacker.
Security software will stop hacking
Having a security system in place may help to keep your computer safe
from some threats, but it is not always a safe way to protect from all
hackers. Hackers are often able to get through this software in order to get
your sensitive information. Plus, often the issue isn’t because of the
software, but because the user does something wrong. Hackers are going to
use tricks and other ways to convince you to let them in to your system,
regardless of the software you have on your computer.
For example, you may have the best security system on your computer, but
if you click on a link and hand over the information, the hackers still won.
Many times hackers will send emails or information looking like someone
else, like your bank, and request this personal information. Those who
aren’t paying attention will send out the information and expose themselves
to the hacker, regardless of their security software.
Hacking Needs, a lot of software
Thanks to Hollywood, there are many rumors and misconceptions that
come with hacking and one of these is that you need special software,
sometimes obtained illegally, in order to hack onto other systems. But in
reality, you only need some simple tools to get it done. For example, you
can use a Web application for hacking that will take a look at different
websites and find the vulnerabilities that are on them. White hat hackers
will use these to help find the mistakes and make the website safer, but the
black hat hackers will go through this to exploit the website.
For the most part, hacking is about trying lots of different things, just a bit
differently, until you find a way that breaks the system. You won’t need the
most exotic software to do this, but you will need some horsepower on the
computer and a lot of patience to get it done.
Becoming a hacker does not require years of education. In fact, many of the
best hackers have never gone to college at all, or at least not for a computer
related study. You just need to have a love for computers and the ability to
learn how they work. You can easily learn how to do a lot of the work with
hacking from your own home and many of those who get into the hacking
field go this way rather than through college.
Each of these worlds will work the same when it comes to hacking and
using the same tools, but they will do so for different reasons. While the
media will spend most of their time looking at the black hat hacking- those
who get in trouble for their endeavors- there is a whole world of ethical
hacking that is doing a lot of good in the world and saving people a lot of
money, time, and headaches in the long run.
Ethical Hacking
Ethical hackers are going to use a lot of the same techniques and methods
as criminal hackers to get past the defenses in place for a network, but they
are going to do so for different reasons. Ethical hackers go past the security
systems in order to document these loopholes and provide some advice on
how to fix these issues. Many of them will work for the corporation that has
the website so they can make the documentation and help to put a plan in
place to fix the issue. Others may just find out about the loophole and will
notify the company, without having any affiliation with them.
The idea behind ethical hacking is to check out the security of a network.
The company understands that there are hackers out there who may want to
get on the network and steal personal information. When it comes to online
stores, hospitals, and other companies, there can be a lot of personal
information for a wide range of clients. If a black hat gets in, this
information is freely available and thousands of people could be affected.
Knowing this information, companies will hire white hats to help locate any
vulnerabilities that will be in their system. They will also spend time trying
to figure out whether any malicious activities could happen within the
software in the future. These vulnerabilities are often going to be found in
improper system configurations, such as a software flaw, and the white hat
will work to get them fixed up to protect that valuable information.
Pretty much any company that has their connection over the internet and
holds personal information of their clients on the database should consider
having a white hat help them out, or at least someone who has knowledge
of basic hacking. This will help them take care of the vulnerabilities a bit
better and will make it easier to protect their customers.
While hacking has been around for a bit, it wasn’t until the 1970s when the
first ethical hacking process began. The United States realized that they
were in possession of a lot of personal information and that black hats
would love to get this information. The government decided to call in
experts, who were known as red teams, to hack into the computer systems
and find where any vulnerabilities were. This soon became a big industry
within the information security market and many big corporations now
include this kind of work in their infrastructure to keep safe.
Now that so much personal information is being shared over the internet,
there are various standards in place that require all organizations that
connect to the internet to have a penetration test. This is basically a test that
the organization has to go through to ensure that their information is safe
and that the loopholes are all taken care of. Smaller organizations may hire
an ethical hacker to help out with this on occasion to keep up to date and
bigger companies will have whole teams that work for them full time to
keep intruders out.
There are many ways that an ethical hacker can help out their clients and it
is becoming a growing field. While many people still feel that a hacker is
someone who is only up to mischief or interested in stealing information,
there are many more hackers who work in an ethical way to help keep
computer networks safe. They may use some of the same techniques as
their black hat counterparts, but they use them for good rather than evil.
Ethical hacking has grown in popularity and has been a great way for
organizations to take their security into their own hands. A white hat hacker
will work for the company to go through the hacking process to help keep
clients’ information safe from unscrupulous people. Some security
professionals go by different names because they don’t like the correlation
with “hacker” but they work in a similar manner- for the purpose of helping
out.
Criminal Hacking
The other side of hacking is a bit darker. Rather than trying to protect the
personal information of others and to help a company stay safe, a criminal
hacker steals the information for their own personal use. They may get into
a company’s network in order to steal emails and credit card numbers to use
as their own. They may send a virus around or ask for information,
pretending to be someone else, to harm the other person and help
themselves.
Basically, criminal hacking is any act that is committed by someone who
has a lot of knowledge of computers who will then use their information to
accomplish various acts of intellectual property theft, identity theft, credit
card fraud, vandalism, terrorism, and other crimes on the computer. It will
often infringe on the privacy of the other person or groups of people and
can even cause some damage to a computer based property. There are a lot
of reasons that criminal hacking will happen, but often it is to see a
financial gain for the hacker.
There are several ways a criminal hacker can get onto the network and find
personal information they can use maliciously. Viruses are a popular option
that can get on your computer and will send the information back to the
original sender. Trojan horses will get to your computer because they look
like a legitimate program but are often providing an easy backdoor for the
hacker to get into your system. Other programs can quietly add on to your
computer and will document your keystrokes in order to figure out your
username and passwords to emails, banking sites, and more.
Another method that many black hat hackers will use is to send emails.
These emails will look like they come from legitimate sites, such as your
bank, and will have links inside. If you click the link, you may end up with
a virus or another issue on the computer. Some will even go so far as to
send you a form asking for personal information. If you provide the
information, you will find that it goes straight to the hacker and the request
was never from your bank or the source it claimed.
There is a lot of damage that can be caused by black hat hackers, especially
if an individual or company is not taking the right steps to ensure there is
computer safety around them. People could lose a lot of money, have to
deal with identity theft, and so much more. It is a good idea to always keep
a vigilant eye out to find when these breaches could be happening.
There are some cases of famous hackers over the last few decades. For
example, David Smith is one of the most notable of these cases when he
launched the Melissa Virus in 1999. This virus was able to get to 1.2 million
computers and businesses in Europe and the United States lost $80 million.
Once he was caught, Smith was convicted of criminal hacking and had a
sentence of forty years. He was released after just shy of two years in prison
after agreeing to work for the FBI.
This is just one of the cases of criminal hacking and most of them will not
happen so widespread as the one above. Still, they cost millions of dollars
in financial losses each year to many businesses when a “black hat” hacker
is able to get onto a computer and take this personal information.
There is basically a race between the black hat and white hat hackers. The
white hats are working to close up all the loopholes and back doors that
they can find on networks and other computers and the black hats are trying
to get in before things are closed or find a new way to cause a mess.
Sometimes the white hats win and can keep people out, but there are many
times when a black hat will be able to beat them to it and will do their
damage.
White hat and black hat hackers will use a lot of the same techniques in
order to take over a computer system. They will be able to get onto the
systems in the same way, look at the information, and complete the same
tasks. The difference in that an ethical hacker is going to do this in order to
find vulnerabilities in a network in order to fix them while a criminal hacker
is more interested in finding out personal information, causing loss for a
company, and causing other mischief with their work.
OceanofPDF.com
Chapter 3: Passive and Active Attacks
There are many different attacks that a hacker can perform on your
computer. It is often going to depend on the kind of information they would
like to get from the network and how active they are planning on being in
all the work. Here are some of the ways that a hacker can attempt to get
onto the system.
All types of attacks that a hacker can perform will fit into two categories;
passive attacks and active attacks. Passive attacks are often seen as research
since the hacker will get onto the system but won’t cause any damage until
later after they have time to look around. Active attacks are the ones where
the hacker has learned about the system and is ready to do their damage.
Let’s look at the differences between these two attacks and how the hacker
will work with each one.
Passive Attacks
A passive attack is when where the hacker is going to wait for the right
opportunity to get onto your system and cause havoc. The hacker may get
onto your system, and then waits a bit before performing their attack. This
is usually a good way for the hacker to get onto and then observe your
network, the software that is used, and what security measures you have in
place before starting their attack.
The passive attacks are the ones that will happen when a hacker will
monitor to find the vulnerabilities in a system without making any changes
in your system. It is basically a way for the hacker to research your system,
without you knowing, so their attacks are more effective. There are several
different types ways that you can classify these types of attacks.
1. Active reconnaissance—by using port scanning, the intruder is
able to listen to the targeted system and then engage it to find
where any weak points are. It is effective for finding the
vulnerable spots and then the hacker will be able to engage these
weak points and exploit them.
2. Passive reconnaissance—this is when the hacker is going to sit
back and just study the system without actively engaging the
system. It can include masquerading, dumpster diving, and war
driving.
These are two tactics that are great tools when the hacker wants to find the
vulnerabilities in a computer system so that you can prevent the attacks
later on. Once you use the reconnaissance tactics, you will be able to see
where any weak points are located. You may also find that installing an
intrusion prevention system, or IPS, will help to protect your automated
methods, port scans, and more on the system.
Active Attacks
Active attacks are meant to get onto a system and take over the information.
They can cause more immediate harm to the system because the hacker is
actively trying to get information and take things that don’t belong to them.
The network often won’t know that the hacker is there, but the hacker will
be able to get in and cause whatever issues they would like. Some examples
of active attacks that are common include:
Masquerade attack
With this attack, the hacker is going to pretend to be a user of the network.
They will be able to trick the system into thinking they have authorization
to gain access to private files and information. Sometimes the hacker will
be able to do this through back door methods but often it is from gaining
passwords and user IDs or exploiting a security flaw.
Once the hacker is able to get onto the system, they will be able to do
everything that a regular user can on the system. They can make changes to
the software, delete files, kick out other users on the network, and more.
Session replay
With this attack, the hacker is going to get onto the system to create
automatic authentication each time the target goes onto a particular website.
This attack will be able to exploit the nature of the web for storing URLs,
cookies, and forms in a browser. When the hacker gets this data, the hacker
can then do a session replay attack the hacker can effectively work of the
system like everyone else.
The session replay attack is not going to happen on real time so this can
make it hard for the legitimate user to catch. Often, it is only found when
the user fins there are discrepancies on their account of some kind. Often, it
is only found once identity theft has occurred and the user will have to go
through and try to get it all fixed.
When one of these attacks is going on, it is similar to noticing that your
internet connection is slow. You may feel that the performance of the
network is really slow and you are not able to access any of the websites
that you want. Luckily, there are a few ways you can see if you are a good
target for one of these attacks. If you are getting a lot of spam or a lot of
traffic that seems a bit unusual, it may be time to check out some signs of
being hacked.
OceanofPDF.com
Chapter 4: Mapping Out Your Hacks
When you start with hacking, you should create a plan of attack. Every
hacker needs to have a good idea of what they want to do and where they
may find vulnerabilities in the system. Before you start learning some of the
strategies that can make hacking successful, lets learn a bit more about how
to map out your hacks.
When you are looking to find vulnerabilities, you will not need to check all
of the security protocols that are on your devices all at one time. This is just
going to make things confusing and sometimes it can cause more problems
than it is worth because you will have to deal with too much at once. This
means that you need to break up all the testing into parts that are more
manageable for you.
Many times, it is best to just start with one system or application that you
would like to check out first and then slowly go through the list, doing it
one at a time, until you reach the end. When determining which system you
would like to work on first, ask these questions:
You may have to run a variety of tests in order to get it all taken care of and
how many tests that you run will really depend on the amount of systems
and devices that you need to take care of. For example, on a small network,
it is easier to test everything without wasting a lot of time in the process.
Luckily, when you go through this process, there is some flexibility so you
should just choose to spend your time on what seems to make the most
sense.
So, make sure to find a time that will not cause too much disruption. Many
time doing the tests after hours is best so that you aren’t bothering anyone
and you have plenty of time to fix mistakes if they happen to come up.
Also, before getting started on any of the tests, make sure that everyone else
on the system knows about the tests and has information about when you
will perform them, how long they will take, and other pertinent information.
Once you are done with this, there are other searches that you can do
online. Take the time to search for:
Contact details that will point right towards people who are
connected with your business. You can do some background
checks through ZabaSearch, ChoicePoint, and USSeach.
Recent press releases about changes in the organization.
Previous mergers and acquisitions of the company
SEC documents
Any trademarks or patents associated with the company.
Incorporation filings. These are often found through the SEC.
This may take some time, but it gives a good idea of what others are able to
see and find out about your company. At times, a simple keyword search is
not going to be enough to bring out all the information, so make sure that
you do a more advanced search to catch everything. Now that you have an
idea of what searchers are able to easily find about the company online, it is
time to do a map of the network and look where the vulnerabilities may be.
A good place to look to see who has access to your network is to look on
Whois. This is a tool that is often used to see whether a domain name is
available or not, but you can also use it to look at the registration of a
particular domain. If your domain is on there, it increases the chance that
your contact information and email addresses are already being broadcasted
online.
Whois can provide information about DNS servers that are on your domain
as well as some details about the tech support of your service provider.
Make sure to look at the DNSstuf which will be able to provide information
like:
The information on which host will handle the email for that
domain.
The location of all hosts
General information about your registration for the domain
Information about whether this host has been listed as a span
host.
There are other sites that you can get this information from and you may
want to check out a few different ones to check that your information isn’t
popping up in other places on the internet. Whois is a great place to get
started, but it should not be your ending point.
Privacy Policies
Your website probably has a privacy policy that will let anyone who gets
onto it know the information that you may collect and how it will be
protected when they come to the site. While this is good information for the
client to know and understand before giving away any personal
information, your policy should not go to the extreme of divulging other
information that could help out a hacker who is trying to get into the
system.
For those who are starting out their website for the first time or who wants
to have someone write the privacy policy for them, you should be careful
about not broadcasting any personal information about the company and
how it works to anyone else. If you put information about your security
protocols, for example, or about the firewall in place, you are giving
criminal hackers some clues on how to get around it. Even if the privacy
policy has been in place for some time, you will still need to go through it
and make some changes if it is giving out personal information.
OceanofPDF.com
Chapter 5: Basic Spoofing and Man in the Middle
Attack Techniques
Whether you are an ethical hacker or a criminal hacker, there are many
different things that you can do to get onto a system. They need to be good
at researching and have the patience to wait until a vulnerability shows up
in a system or network so that they can make their move. But with some
time and work, they will be able to get into the network through a variety of
means and make the network collect the information that they want. There
are a variety of masquerading and spoofing techniques that will make this a
bit easier.
Spoofing
Spoofing is one of the first and best techniques that a hacker will be able to
use. Spoofing is a technique where a hacker is able to pretend to be another
website, software, organization, or person. The idea is that the hacker will
pretend to be someone allowed access to the network in order to get through
the security protocols and to get access to private information that could be
useful to the hacker. The system will believe that the hacker should be there
and the hacker can just walk through and get whatever they want. There are
several different techniques of spoofing that a hacker would love to use
including.
IP Spoofing
With this technique, the hacker will be able to mask their IP address or
change it so that the network is fooled to think that the hacker is a
legitimate user. The hacker could be in another part of the world and will
convince the targeted network that it is one that can use the system. The
hacker can do this by imitating another IP address that has met the criteria
set up the network administrator. Once they are on, the hacker has the
ability to take over the network, change files, and so much more without
being detected.
This spoof technique is going to work because it is able to find a trusted IP
address. Once the trusted IP address is found, the hacker will be able
change their headers to fool the network even more so that it feels that the
hacker is allowed to be there and they will gain full access. The hacker can
look at personal information, change files, and even sent harmful packets to
the network without any trace back to the original hacker.
DNS Spoofing
Another spoofing technique is known as DNS spoofing. This method is
going to trick a user who is trying to get onto a legitimate site. The hacker
will take the IP address and then when a user clicks on it, they will be sent
to a malicious website where the hacker has complete control. Sometimes
the hacker will take over a legitimate website and turn it to their use, but
often they will change around a letter or two to trick people. Users who
aren’t paying attention or who type in the address wrong will be sent to a
bad website and the hacker can take credentials and private information
from the user.
Often the user will not realize that they are being tricked. They will get onto
the website and figure that it is just where they want to be. They can put in
private information, send payment, and more while the hacker is collecting
it all privately.
For the hacker to get this to work, they need to have the same LAN as their
target. This requires the hacker to search for a weak password on one of the
machines that is on the network, something that is possibly even from a
different location. Once the hacker accomplishes this, they will be able to
redirect all users to their website and easily monitor the activities that are
done there.
Email Spoofing
With phone number spoofing, the hacker will use false phone numbers or
area codes in order to mask the identity and location of the hacker. This is
really a way for the hacker to get into your voicemail messages or to send
out text messages using this spoofed number, or even mislead the target
about where the call is located. For example, if the hacker is able to have a
number similar to a government office, the target may be willing to hand
over personal information.
The biggest issue with these attacks is that most network administrators are
not able to easily spot the attacks and the hacker will get to stay on the
network and cause a lot of damage in the process. The hacker is able to go
through the network easily because of the security protocols and the
possibility that the hacker can interact with all the users on the network. The
hacker is then able to conduct more man in the middle attacks as well.
The first thing that the hacker will need to do is find out the data that they
need to get started. Using a toll such as Wireshark can help with this. Firing
these tools up will allow the hacker to see the traffic that they can connect
with through wired or wireless networks and can give them a good starting
point.
Step 2: Use a wireless adapter and then place into monitor mode
To get started, take out the wireless adapter and make sure it is on monitor
mode. This allows you to see what traffic is going into the connection, even
if the traffic shouldn’t be there. This method works the best for hubbed
networks because there isn’t as much security as switched networks.
If you know the types of information that is being sent to the other users on
a switch, or you want to bypass it completely, you can attempt to make
changes to the entries on the CAM table that will map out the MAC and IP
addresses that are sending information to each other. When you change
these entries, you can get ahold of the traffic that is meant to go to someone
else. For this to work, you will need to do an ARP spoofing attack.
This is the point where you will bring out the Backtrack software. You will
need to pull up the Backtrack and then pull up all three terminals. Next, you
will replace the MAC address from the target client with your personal
MAC address. The code for doing this is: arpspoof [client IP] [server IP].
Once you do that, you will need to reverse the order of the IP addresses in
the string that you just used. This is going to tell the server that your
computer is the authorized one so that you are allowed to get onto the
system and perform other tasks. You are basically going to become the
server and the client so you can receive packets of information and change
them how you wish. It also goes the other way around.
For those who are using Linux, you can use the built in feature known as
ip_forward, which will make it easier to forward the packets you are
receiving. Once you turn this feature on, you will be able to go back into
Backtrack and forward these packets with the commandecho 1
>/proc/sys/net/ipv4/ip_forward.
This command is going to make it easier to be right between the client and
the server. You will get all the information that goes between these two and
as the hacker, you can use the information as you wish. You could look at
the system, take personal information, or change anything you want about
information that is shared.
At this point, you just need to wait to see the client log on to the right
server. Once you do this, you are going to be able to see the username and
password right in front of you. Since the administrators and the users will
use these credentials on all of the computer systems and services, you will
be able to use the credentials as well. This will make it simple to get onto
the system and see whatever you would like. You are right in the middle of
the information, have the credentials to get onto the system, and are pretty
much invisible so you as the hacker will have full range mess around with
the system and make changes at that time.
OceanofPDF.com
Chapter 6: Hacking Passwords
The biggest target of hackers is to get passwords, mainly because they are
really easy to get. Most people think that they just need to come up with a
longer password in order to protect themselves, but there is more to it than
that. If the hacker is able to use some of the tricks we stated earlier in this
chapter, it does not matter how long your username and password is, they
will still have it sent directly to them.
Confidential log in information, including passwords, are considered the
weakest links in security because the only thing it relies on is secrecy. Once
the secret is out, the security is pretty much gone. This is why it is such a
big deal when a big company is hacked and all the username and passwords
are leaked. The hacker is now able to get onto the system and use your
information however they wish. Sometimes, the user themselves will
inadvertently give out their own password for hackers to use.
So how do you hack a password? There are several ways that the hacker can
do this including a physical attack, social engineering, and inference. There
are also a few different tools that are used to crack passwords including:
OceanofPDF.com
Chapter 7: Hacking a Network Connection
Another exploit that you can try to take on is hacking a network connection.
By doing this, the hacker is able to conceal their identity, enjoy bandwidth
for bigger downloads, and have an easy way in to conduct illegal activities.
Once the hacker is inside, it is really easy for them to decrypt the traffic for
the user and capture them. Just imagine all the different things a hacker is
able to do or get ahold of when they are on a Wi-Fi connection and all the
trouble the target may have to sort out later.
Before doing a test hack over an internet connection, you must first
understand that there are different levels and types of security that are
around when protecting the wireless connection. This is going to make a
difference on the level and type of attack that could be performed on the
network. For example, if you have very little security over the wireless
connection, it is not going to take that much work for the hacker to get on
the system and do what they want. But for those with more encryption and
security, the hacker will have to be a bit craftier before taking over. Some of
the basic wireless protocols you may run into:
The evil twin hack is an access point that will act like the access point that a
user connects to, but it is manipulative. The target will just see their regular
access point and think it is safe to get on, but this manipulative access point
is used by a hacker to send the target to the hackers’ premade access point,
where the hacker can then start a dangerous man in the middle attack.
As a beginner hacker, you may need some practice doing the evil twin
attack. Some basic steps to try out include:
OceanofPDF.com
Chapter 8: Popular Tools for Hacking
Whether you are a criminal or ethical hacker, there are many great tools that
you can use to help protect your personal system, help protect a larger
system, or attack a system. These tools are going to help to make things
easier and can help you to find the vulnerabilities in the system. Many of
them are crowd-sourced through the internet and you can look through
forums and other hubs online that are devoted to hackers.
As an ethical hacker, you should use some of the common tools to detect
these vulnerabilities, administer hacks, and even conduct tests. Some of the
most popular hacking tools you can use either as a criminal or ethical
hacker include:
Burp Suite
Ettercap
Another tool that is really efficient is Ettercap. This one is used by hackers
who would like to launch man in the middle attacks. The whole idea is to is
to convince two systems that they are talking to each other, but the hacker is
in the middle as a relay person. One system may send a message, but the
hacker will take over the message and relay something different. This is a
great tool that helps to steal or manipulate transactions so that the data is
transferred differently between the systems. It is also a great way to
eavesdrop on conversations between the networks.
When it comes to using brute force to crack passwords and get into a
system, the John the Ripper tool is one of the best. Many hackers don’t like
using brute force because these tactics can sometimes take too much time,
but Jack the Ripper is one of the most efficient if you are trying to recover
passwords that have been encrypted. It is a good way for new hackers to
start with finding passwords and getting onto a new network or can be
added to your other choices to get into the network.
Metasploit
This tool is widely celebrated among hackers because it is really efficient at
helping an ethical hacker. Metasploit will be a good way to help identify
security issues that may be present in the network. Beginner hackers can
use this as a network planning tool to check if someone is on their network,
if they are authorized, and where a criminal hacker may try to get on to the
network.
These are just a few of the tools that you can use to help get started with
hacking, whether you are working as an ethical hacker or a criminal hacker.
It is important to keep up on the industry to find out which new products are
coming out. Even as an ethical hacker, you need to look on hacking blogs
and forums in order to find out which new tools are coming out. If you
aren’t looking and keeping up with the new tools, a criminal hacker will use
them against you. There are always new tools that are coming up and they
can make it easier to find vulnerabilities in your system and to protect
yourself and your network.
OceanofPDF.com
Chapter 9: How to Hack a Website
One popular place that hackers like to attack is websites. They are able to get onto a website and then
when someone else comes to visit what looks like a legitimate site, they will be able to attack the
computer. Here we will look at a few of the attacks that are available when trying to take over a
website.
The directory is basically the folder that the web designer would have used in order to store the files
for the website. This means that a directory traversal attack is when the hacker is able to get into this
directory and navigate through all of the files that are inside. There are a few sensitive files for your
website that can be located in these directories include the confi, htaccess, and root files.
Now, if you want to be able to get access to a text file, let’s say that it is called abcdefg.txt and it is
located in the directory file called John, you would need to type the command “….abcdefg” in order
to move to the area where it is stored. Notice that there are four dots that are in front of it to ensure
that you are able to move up two folders (the two dots is just to move up one folder and then the four
dots would be to move up two folders).
A directory traversal attack is going to be an HTTP exploit that is aimed at getting ahold of some files
that are restricted or even viewing some random files that are on the webs server, such as the SSL
private keys and the password files. Most of the time, hackers are usually going to want to get into
the root directory of the server, and with the help of the dot slash technique, they will be able to do
this. This is a vulnerability that many web servers need to work on to keep the web servers safe.
A hacker is able to perform searches in order to figure out which types of files are considered
publicly accessible inside of the website directory. The hacker may want to use the HTTrack website
copier, which is a spider program, that is able to find all of the files that are publicly accessible. This
tool is free to use and really easy since you will just need to load it up, give the project a name, and
then instruct the software which website it needs to mirror. It may take up to a few hours, but the
HTTrack will be able to show you all of the records and files that the website will contain and will
make sure that they are all stored inside of your drive C: My Websites.
Many of the sites that you will check out will contain information that is sensitive and shouldn’t be
viewed publicly, such as the source codes and even the application scripts. You should take some
time to watch out for any .rar or lzip files in the websites servers. Even pdf and .html files can
contain some of this sensitive information that the hacker would want to get ahold of.
Another way that the hacker is able to search through to find some public files is to go through
Google. You will be able to bring out the advanced queries in Google in order to expose some of the
sensitive information, as well as webcams, critical server directors, credit card numbers and more.
This is because whenever Google goes through and searches a website, it is going to store all of these
records in files that are in its cache, making them easy for hackers to find. In fact, these are even
easier to use because the hacker doesn’t need to mirror a specific website and then manually search
through the files to find what they want.
There are a few queries that you are able to use in Google in order to get the information that you
want including:
Site:hostname keywords: when you use this query, Google is going to search for any
keyword that you want. You could type in the keyword or the website that you want to
get the information that you would like. For example, you could tpe in something like
site:www.bigmoneyspeaker.com credit card and see what Google has in store for you.
Filetype: file-extension site: hostname: when you are using this query, Google is going
to look for a type of file on the website that you want to target. You can look for db,
rar, pdf, zip, and doc files based on what you would like to find. A good example of
how to write this out includes filetype: pdf site: www.madhatter.com.
These are just a few types of operators that you are able to use in order to get the information that
you want out of your website. This is why it is so important for you to be careful with the
information that you are putting online because if the website is not careful with your information,
the hackers will be able to get ahold of it when they want.
It is up to the website developer to make sure that they are protecting the website from these types of
attacks. There are three countermeasures that are the most successful with these issues including:
Avoid storage private, confidential, or old records on the service. You want to make
sure that only the DocumentROot or the htdocs folder is only containing the files that
are needed in order to make the website run properly. You should also make sure that
the files never contain any information that is sensitive.
Prevent Google and some other search engines from going onto the site and storing
data that is sensitive into their cache. You are able to do this by configuring your
robots.txt file.
You can also make sure that the web server you use is configured to only allow certain
directories to be accessible by the public. You can also set up a minimum privileges to
help control how much public access there is and then only allows access to the
directories that is needed to help the site run the right way.
Another option that you may want to consider is to use the Google Hack Honeypot. This is a tool that
is able to attract malicious hackers while you get a chance to see how they are hacking into your site.
You will then be able to make some changes to ensure that they stay away from your website by
putting in the right countermeasures.
Hackers are often looking for ways to get onto a website and get personal information from the
clients that are on that website or to use it as a way to attack others who come through and use the
website. Learning how the hacker is able to make the attack and then using the right countermeasures
will ensure that your website stays safe and that the hackers never reach any personal information
that may be stored on there.
OceanofPDF.com
Conclusion
OceanofPDF.com
Hacking:
Tips and Tricks to Get Past the Beginner’s Level
OceanofPDF.com
Table of Contents
Introduction
Chapter one: Ethical Hacking and Criminal Hacking
Chapter two: Password Hacking
Chapter three: Network Hacking
Chapter four: Techniques That Assist Hackers in Hacking
Chapter five: Step by Step Guide on How to Hack
Chapter six: Protection is Key
Chapter seven: Mistakes are Made, But They Can be Fixed
Chapter eight: Let’s Make it Easier With Some Tips and Tricks
Chapter nine: Think Like a Hacker
Chapter ten: Captain Crunch
Chapter eleven: Steve and Steve
Conclusion
OceanofPDF.com
Copyright 2016 by Mark Anderson- All rights reserved.
This declaration is deemed fair and valid by both the American Bar
Association and the Committee of Publishers Association and is legally
binding throughout the United States.
Introduction
The following chapters will discuss more advanced techniques that are
going to be utilized to take your beginner level skills to a whole new level
in hacking.
You know the basics of hacking, and you purchased this book so that you
can learn more about it. Wise decision! As I’m sure you can see just by
turning on CNN, Hacking is a very mainstream topic nowadays.
Throughout the entire 2016 American election cycle it was discussed by all
the pundits. There were claims that the Russians may have hacked the
election. And now, the CIA officially came out and announced (with no
evidence) that the Russian government was involved in hacking the US
election to help Donald Trump attain the presidency. Only time will tell if
these claims are accurate or not. Nonetheless, this is no doubt a topic that
deserves further analysis and has piqued many people’s interest.
Hacking is going to take a lot of patience and time, so if you cannot
contribute the time that is necessary to get into a system, then it is not wise
that you begin to try until you find that you have the necessary time to
devote to this endeavor. You are going to be advancing yourself
professionally with your new hacking skills.
CLICK HERE
Hacking has its place in the world, but hacking is highly illegal! If you are
hacking into an unauthorized system and get caught, not only can you end
up with a hefty fine, but you may find that you are spending time in jail.
Please, if you are going to use your newfound hacking skills, you need to
make sure that you are only getting into systems that are either your own set
up through virtual environments, or into someone else’s system that not
only knows that you are trying to hack into it, but has given you written
permission to get into their system. An example could be a company you
are working for that has authorized you- in writing- to hack into their
system to locate vulnerabilities and security threats.
Written permission is going to protect you in the event that the system’s
administrator tries to take you to court, because you are going to have the
proof that you need to say that you were allowed to do what you did.
Please, be safe in hacking, think about your future and think about the
system that you are hacking. Be picky when it comes to what systems you
try to get into and what you do once you have gotten into that system.
- PHP: not only will this help with web hacking, but it is going to
be on the server side of the program.
- SQL: is a language that is going to communicate with the
different databases that are on the internet so that you can get into
them.
- C and C++: these are also high level programming but it is going
to be used more for shell codes and exploit writing.
-Java, VBScript, CSharp, Visual Basic: these ones are going to have
other uses for you when you are hacking into systems depending on
the situation that you are in
The good news is that a quick visit to our Amazon Author Page will provide
you with numerous guides that you need to master these programming
languages:
CLICK HERE
CLICK HERE
CLICK HERE
CLICK HERE
If you check out our Programming Library, you WILL increase your
earning capacity and marketability at any company dramatically. You will
confidently walk into any interview knowing that your skill sets will be
valued and you have something unique to bring to the table. So don’t miss
out!!
Now without further ado, let’s get into the meat and potatoes of this book.
It’s time for you to improve your Hacking skills and vastly surpass the
Beginner’s Level.
OceanofPDF.com
Chapter one: Ethical Hacking and Criminal Hacking
With the beginner’s guide, you learned that there are two different kinds of
hackers. Ethical hackers, and criminal hackers. Each hacker is going to use
techniques that are going to be similar to get into the system that they want
access to. However, there are some major differences between the two
besides just the definition of their names.
Ethical hackers can be referred to as white hat hackers because they are
using their hacking skills to get into a system for good. They are not getting
into the system to harm a company or an individual. Instead, they are going
to find all the weaknesses in the system and therefore they are going to be
helping people to add extra security so that others cannot get into the
system.
You should get the certification that is for A+. Having other certifications
and experience in the technical field are going to be a major plus for you.
The higher up in the position that you can get, the more experience you are
going to have obviously because you are going to be proving your skills
over and over again and demonstrating that you can handle more
responsibility and technical challenges.
There are security certifications that you should look into getting as well
that will then help you get a position with information security. In the
position that you obtain in information security, you should strive to get
through the testing that is offered for penetration of systems while you are
getting used to using the tools that are needed for hacking.
The next thing that you are going to want to do is work towards the
certification that is going to label you a Certified Ethical Hacker that the
International Council of Electronic Commerce Consultants offers.
At the point in time that you have gotten all of the certifications and
experience necessary, you can now annotate that you are an ethical hacker
on your resume and begin looking for a job in the field.
You are not just going to need to have technical skills to be a hacker, you
also need to have skills with people, the ability to manipulate programs, run
programs, be good at solving problems, and have a work ethic that is going
to stand out among others that may be trying to get jobs as ethical hackers
as well.
To remain an ethical hacker, you need to be sure that you are not falling into
any hacking activities that are going to be considered illegal.
Criminal hacking
Just like with ethical hacking, criminal hackers are known as black hat
hackers. They are the ones that are going to use their hacking skills to harm
others.
As a criminal hacker, you are going to use the same tools that are going to
be used for ethical hacking, the only difference is that you are not going to
get the education or certificates that will label you as a hacker that is out
there to help others.
Criminal hackers are going to be using their skills for fraud, theft,
vandalism, and terrorism. All these crimes are going to be done on a
computer and will most likely involve the internet in one way or another.
And, criminal hackers are not going to limit themselves to hacking into
companies or the government, they will also try and get into personal
computers as well because they are going after any information that is
going to help them and harm the person that they have targeted.
The tools that are used for hacking will be used in order to complete these
tasks. Trojan horses are going to be used to appear as a program that is
legitimate, but instead it is going to give a criminal hacker access to the
system as a backdoor, but the user of the system is never going to know that
they put a virus on their computer until it is too late.
Criminal hackers do not always get away with the crimes that they commit.
Many actually end up getting caught and end up spending time behind bars
as well as having a fine that they have to pay for what they have done.
Believe it or not, there are some very famous names that have contributed
to the advancement of technology that first started out as a criminal hacker
but then turned their lives around and helped with the technological world
that we enjoy today.
Punishments
- If you are found hacking in India which means that you are
tampering with a computer or destroying files you are going to be
fined up to 20000 rupes which is $294.85but you will also be placed
in prison for up to three years at least. You may end up getting a
longer sentence depending on what you were doing and what the
situation is.
- It is also in India that if you hack into a website to tamper with it
then you are going to also get up to three years in prison, but your
fine is going to be 50000 rupees. That is $ 737.12.
- In the Netherlands, hacking is known as having any work that is
going to intrude upon the automated work that is going to go against
the law. Any intrusion is going to be using log ins that you stole,
sending out false signals, or even breaking past security measures.
You will end up with a year in prison and a fine with a mark on your
record that is a felony in the fourth category.
- The United States is going to forbid any use of a computer that is
not authorized if it is protected. Most of the protected computers in
the United States are those that are used for the government or
financial institutions.
You do not have to just break into these computers, you can use a computer
to interfere with foreign communication whether that computer be located
here in the United States or somewhere else. You are tampering with
government relations.
Passwords are one of the easiest ways to get into a computer without people
knowing that you have been in their system. In this chapter, you are going
to get the experience you need to get into a system with an administrators
account as well as how to hack passwords on mobile devices.
Administrator Accounts
Step one: you need to get into the administrator account. With this account,
any password that is on the computer can be changed and there are not
going to need to be any tools used for this.
Many times, this account is not going to have any password. And, if you are
the only user, or the main user to a computer, then your account is already
going to be the administrator account.
Step two: now you need to go to the control panel and go to the user
accounts. On Windows 8 you will press the windows button and x at the
same time to get to the menu.
Step three: after you have gotten to where you can make changes to the
accounts on the computer, you will pick which account it is that you are
wanting to get into.
Step four: at this point you are going to be able to change the password to
this account. Normally a button is going to be in a list so that you can select
it to change the password. If you want to remove the password you will
either leave it blank, or select the button that says remove password.
Step five: once you have completed all the other steps, you are going to
have access to the account! You can now log in and do what you are
wanting to do. Be careful though because if the person is not able to get
back into their account, they are going to know that you changed their
password and wonder why you were in their account in the first place.
Step one: open Cydia so that Aircrack can be installed. You can use
ihackmyi.com/cydia or you can do a repo that is going to install the
application that you need.
Step two: in this step a computer has to be utilized so that the permissions
for the files that are in the application can be set to allow you access to use
the program.
Step four: at this point, a code is going to need to be entered into the
program so that you are able to go back to using your mobile device.
Step five: back on your phone, you will open the program. If you have not
already installed the program on your phone, this is a good time to install it
because you are going to need to use it.
Step six: once the program is installed, the terminal has to be launched and
there is going to be a log in that is going to enable you to get into the
program.
All files that you work with can be put onto your pc so that you can work
from that if you want to.
Step one: not all Android devices use a WPS PIN to be hacked. Each device
will be different and you will need to have a rooted Broadcom chipset.
Step two: install bcmon so that you can monitor the chipset that you have
chosen to use. The chipset and bcmon is going to be how you will crack the
pin to the device. The APK file is going to be free and can be found on a
code website on Google.
Step three: bcmon should be run once the APK file is installed. There are
going to be tools that you are going to be prompted to install and you
should install them. After their installation has happened, enable the mode
that is going to allow you to monitor.
In the even that your application crashes, just reopen it and try again. If it
crashes more than once, you are going to need to find a different device to
use.
Step four: now run your terminal. The terminal is going to look a lot like the
Linux system. you can enter codes and have the command be executed once
you hit enter.
Step five: figure out where the access point is that you are trying to get into.
There are going to be multiple access points for you to select from when
you are using the encryption from WEP.
Step six: the MAC address needs to be correct. This is going to be the
address to the router and if you do not have the correct one, then you are
going to end up not getting into the Wi-Fi that you are wanting access to.
It is recommended that you write down the address to the router so that you
are absolutely positive that you are getting on the proper channel.
Step seven: the channel that you have selected to use needs to be scanned so
that data can be collected. This is going to take several hours before the
password can be cracked.
Step eight: after the appropriate number of packets has been collected, you
are going to need to try and crack the password to the network.
Step nine: the password should not be a hexadecimal after you have
finished. Once the cracking process has been completed, a message is going
to be displayed that is going to be followed by a form that is in
hexadecimal. You need to make sure that the password is going to work
because the key that you have is not going to work after the code has been
cracked. The key that you have is not going to have the colons in it instead,
the numbers are going to be entered in sequence so that there are no spaces
separating them.
OceanofPDF.com
Chapter three: Network Hacking
There are several things that you can do to get into a network using your
hacking abilities.
Ping
Every Wi-Fi has an IP address that is assigned to it. Even the computer that
you use to hack into someone else’s system is going to have an IP address.
To convert the address, you are going to use the ping option. The DNS is
also going to help to get the name of the domain. Ping is going to stand for
packet internet groper and is going to be on all versions of Windows that
their clients are going to use.
After you have logged into the internet, you are going to need to need to
open up the shell for DOS and then insert a command for ping. This is
going to look for the domain name and then display it on the computer that
you are using.
The use of ping is going to usually be the first step that you are going to
take when you are trying to hack into a network. The ping is going to reach
out to your target and tell you if it is online or offline.
Ping sweep
This is going to involve ping, but instead of using it to get into a system, it
is going to search the IP addresses that are open in a specific area around
you. Using this is only going to be useful when you are not sure where you
want to attack therefore you are going to know where you can get into
without necessarily knowing who the target is or even where they are
located.
Tracert
This program is another tool that is going to get information about the host
no matter how remote. It is going to use ICMP.
Tracert is going to locate data by sending out packets from the source
computer to the computer that is the target. The computer that is being used
for hacking is going to get an IP address sent back to it after connecting and
is thus going to reveal all of the stations that are going to start with the
connection that you have to the internet.
Should the name not be able to be revealed with ping, then this program is
going to be able to give it, or even the last station that the attacker visited.
This can end up causing concern when it comes to the name of the internet
provider that the hacker is using and where they are located.
Port scanning
At the point in time that the system that has been targeted is listed online,
the next thing to do is to scan the system for any open ports that can be used
to get in.
The port scanners that you can choose from is going to be numerous and
they can be found online. However, most of these scanners are going to use
techniques that are going to end up getting the hacker caught because they
are outdated.
Nmap is not going to only scan all the ports that are open on a system, it is
also going to tell you the operating system and the version numbers of the
programs that are being used on that computer.
Common ports
There are some of the more common ports that are going to be opened for
hackers to get into and in this list, you are going to find not just the port
name, but the service that normally runs it.
OceanofPDF.com
Chapter four: Techniques That Assist Hackers
Anonymity
As a hacker, you are not going to want to be discovered. Therefore, you are
going to need to make sure that you can get into a system without leaving
any traces. There are some ways that this can be done.
- Telenet which will hide the actions that are done on a system.
- Proxies
- Programs that are written in C language
- Secured tunnels
- Another person’s username and password
- Software that is going to hide the IP address that they are using
When you hide your true identity then you are making it harder for people
to know who you are when they are trying to trace your IP address back to
your computer so that they can figure out who is hacking their computer.
Getting out
Traces should not be left in the system that you enter. If you leave a trace,
then you can be tracked and then get into trouble. Do not mess with the files
because the system administrator is going to know when the files have been
messed with. A back door should also be left open so that you have a way
out but also a way back in should you want to get back in it.
Be sure that you are not leaving too big of backdoor open for you to get
back in. You do not want your target knowing where you got into their
computer or where you are going to be getting back in. If they figure that
out, then they are going to be able to close it before you can use it again.
Hacking requires that you know all about your target. The more that you
know, the easier it is going to be to get into their system.
- You will want to know any data that you think is going to assist
you in getting in to your target’s system.
- The IP address that they are using.
- Telenet or Tracert so that you can check to see if the computer is
online. You are not going to be able to get on the system unless it is
online.
Keystroke log
You can learn their entire identity but logging their keystrokes long enough.
The keystroke programs can be purchased online or a thumb drive with the
program on it. This program is going to create a list of every key that the
user hits so that you are able to get the information that you want.
Passwords
Passwords are going to be the best way to go when hacking a system. there
are programs that will run algorithms to try and figure out the correct
combination that you need to get the password. This will also be a trial and
error so it is best that you use methods that are going to be more likely to
get you the password.
Be careful though because there are some systems that will lock you out of
the system if you try too many passwords that are not correct.
There are some steps that you can take so that you can get someone’s
password.
Step one: Use the information that you have gathered on that person.
Sometimes if you already know the person’s password for one site, then it
may be the password that they use on other sites.
Step two: Look through their computer if you have access to it. There may
be a folder or a file that holds all of the information that you need to get into
any account that they have on their computer. Make sure that you look at it
so that you can see if you can find their passwords and make sure that you
use the proper password that they have written down.
There are times that someone will use the same password but change it up
just enough to make it different on another site.
Step three: Try the password forgotten button. If you have access to
someone’s email, all you are going to need to do is hit that you forgot the
password and follow the instructions in the email.
You are going to need to make sure that you delete the email that you get
from the site that is going to help you to restart the password process or else
they are going to know that someone has gotten into their account therefore
they are going to change the password to something that is harder for you to
use or they will delete the entire account.
If you are on their computer, Then you are going to need to save the
password to their browser so that they do not know that you have gotten
into their account. The more time that passes that they do not know that
you’ve gotten into it, the more time you are going to have to get in and get
any information that you want.
Step four: There are some common passwords that most people use because
they do not think that anyone is going to guess it, but because so many
people use them, it is easy for people to figure out the password and get in.
Password
123456789
Jesus
Monkey
Letmein
Ninja
Ashley
Trustno1
Welcome
Master
Step five: People use personal information for passwords all the time. Try
using names, important dates, or zip codes to get their password. The more
you know about them, the easier it is for you to determine what is important
to them.
Step six: Be blunt. If you are trying to get into a friend or family members
account, they may give you the password. But, you may also find that you
lose their trust because they are going to feel like you are violating their
privacy.
In most cases, you are going to be asked what you want with their password
and you will want to have a good reason as to why you are wanting their
password.
Step seven: Find someone who may know the password. A spouse or best
friend who knows the password. Catching them off guard may get you their
password because they are not thinking of the accounts privacy.
Viruses
There are codes that can be entered onto your victim’s computer that are
going to enable you to get into a system without ever needing a password.
Emails
Programs have been developed that are going to direct emails to you so that
you can read them before they ever get to their destinations.
Zombies
Firewalls
Proxy servers are a good target for when you are hacking.
Search engines
Search engines are going to be the place that you are going to find the tools
that you need for hacking. They can be downloaded to your computer so
that you have instant access to them when you are hacking.
Left behind
On a victim’s computer, you do not need to modify their files, but you do
want to leave a file or two that is going to let you back into the system.
These folders should not be ones that are going to easily be found or else
you are going to lose your access to that computer.
OceanofPDF.com
Chapter five: A Step by Step Guide on how to Hack
Hacking can be done in different ways, but there are some main steps that
you are going to want to follow so that you can get into the system that you
have targeted.
The process
- For any commands that you enter, a nix terminal should be used.
Programs such as Nmap or Cygwin are going to have nix terminals
that will be perfect for you to enter your commands.
- Secure your computer. Should your machine not be secured, you
are going to be traced easier and that will end up resulting in things
such as jail time or a lawsuit.
- If you do not have the confidence that you need to hack into a
different system, set up a virtual laboratory so that you can hack your
own system.
- Use a ping tool to see if you can even get into your victim’s
computer. The results that you get are not always going to be able to
be trusted because the system administrator can turn their computer
of which is going to end up making you lose your target.
- Ports need to be scanned with pOf or Nmap. The ports are going
to be displayed as active which if they are, then you are going to have
the ability to use that one to get in.
- Most ports use FT or HTTP which will cause them to have less
security. Not just that, but they are going to be easier to discover with
your scans.
- Brute force can be used when you are trying to hack passwords.
- When other nix machines are being targeted, root privileges need
to be established. The files are going to be open for you to see once
you have acquired the proper privileges and most of the time this is
going to be a super user status.
These are just the basics of hacking. There are more specific steps that you
should follow when you are trying to hack into specific areas.
Logins
Remote hacking
OceanofPDF.com
Chapter six: Protection is Key
Protecting your computer is a big thing that is going to ensure that you are
not going to be hacked. There are some ways that are kind of obvious and
others that you may not know about.
computer
DropBox and OneDrive are just two places that are online
against viruses.
- Security settings
All the cookies on your computer should be erased
your activity
- Antivirus applications
There are new viruses that are being created each and
these
- If an email arrives that is not from someone you know and it has
an attachment, it should not be opened.
Viruses could be attached to the email and it will get into
someone that you know but are not expecting from, just
The internet is a good place for hackers to try and get into
your system and if you are not connected to it, then you are
protecting yourself.
- When you are creating passwords, you should never use the same
one.
Some sites offer a two-step authentication where a second
incorrectly.
Other sites are going to ask you for a code before you can
you should update it with the sites that you are using as
well.
- The only sites that you should use are the ones that have HTTPS
before the URL
- Your home network should have a password that only you and
your family know.
The majority of routers are going to have a sticker that has
the WPA-2
Try and avoid WEP and WPA because these are going to
find it.
They were put out with these flaws because the companies
need to do what you can so that you can protect not only
Password Managers
Two-factor authentication
Backing up data
Linked accounts
Security questions
Misinformation
- Putting out information that is not true on the internet is not too
uncommon.
- One of the most powerful tools that you are going to have to
protect yourself against hackers is to use misinformation.
- The key to all the things that you need to put on the internet can
be changed from the truth so that a hacker cannot simply look the
information up online and get ahold of your data.
You can change your birthday, birth location, where you
currently live, and even who your family members are.
- On social media, you do not need to tell others who your family
they know who they are and the entire world does not have to know
If you tag your mother as your mom, then a hacker is
going to have instant access to what your mom ’ s maiden
name is.
Password protection
- When you get a new device, you should always put a password
that only you know on it.
A computer is going to be the easiest way for a hacker to
have access to all of your personal information.
Should your computer get stole, if there is no password on
it, you are inviting a hacker to get onto it and steal any
information that they so desire.
- This is not only going to protect you, but those that you are in
contact with as well.
- When someone hacks into your account, they are going to go for
your contacts firs before they do anything else.
Credit cards
- Your bank can give you a card number that is only going to work
temporarily
They may also be able to give you a card number that will
only work one time.
- A credit card number is going to be tied directly to you so with
that number, any other data that is yours can easily be taken.
- Hackers only need the last four of your card to be able to get your
identity.
- Multiple cards that are all linked to the same account are going to
cause all the cards to be compromised should one be stolen.
Privacy on websites
OceanofPDF.com
Chapter seven: Mistakes are Made, But They Can
be Fixed
Back up of files
If you do not back up your files before you start hacking into someone’s
computer, when they trace the line back to you, then you are going to be
found out faster. Not only that, but you are also becoming a target for other
hackers.
Should your compute be shut down by someone because they found out you
hacked them, then you are going to lose everything that is important to you.
This is one of the best ways that a hacker can get into a system. But, it can
also come back to bite you in the butt. If you do not read what you are
agreeing to, you may be putting something on your computer that is going
to make it to where you can easily be traced and therefore get in trouble for
what you are doing.
So, read what you are agreeing to before you continue. Where most people
get caught, is in the fine print.
Hacking is not going to be like writing code where you can lose an entire
program if you do not save your work, but it is still important that you make
sure that the changes that you make to programs is saved or else your
program is not going to work like you want it to.
Imagine if a program crashes in the middle of what you were doing and you
have to go back in and change everything back to what it was before so that
you can do what you were doing.
This is just going to take up a lot of time and therefore you are going to lose
valuable time getting into the system. So, save your work!
So, do not turn your computer off just to stop something because you are
going to end up doing more harm than good and you may find that you have
ruined your computer for good.
Email attachments
Just like you are sending out emails to put viruses on a victim’s computer,
does not make you immune to someone trying to do it to you. So, follow the
rule and do not open anything from someone that you do not know. You
may not only open yourself up to being attacked, you are opening yourself
up to being discovered as a hacker.
Installing
Most of the programs that you are going to use as a hacker are going to be
downloaded off the internet. Be sure that you are getting the programs from
a source that you trust or else what you think is a program that will help
you, is going to end up destroying your computer because someone else has
put a virus in it and duplicated the program for people who do not always
pay attention to what they are downloading.
Up to date
Keep your computer up to date so that you are not running on outdated
software. Should your computer be slow, you are going to be able to be
tracked a lot faster because your computer is not as fast as it is supposed to
be.
OceanofPDF.com
Chapter eight: Let ’ s Make it Easier With Some
Tips and Tricks
You already know how to hack, and some of the information that you have
read may seem redundant but it is going to help you. So are having some
easier ways for you to know how to get into a system.
If you have some tips or tricks in your back pocket, you are going to find
that hacking is going to be ten times easier than you believed it to be.
OceanofPDF.com
Chapter nine: Captain Crunch
At a young age, Draper built a home radio station from the discard military
components. Draper also received psychological treatment due to what
people thought was a chemical imbalance.
In 1964, Draper enlisted into the Air Force and was stationed in Alaska.
While there, he gained access to a local telephone switchboard in which he
used to help his fellow servicemen make free phone calls home.
After being re-stationed in Maine, Draper made a pirate station but was
forced to shut it down when a legitimate radio station objected to his
station. After being discharged from the Air Force, Draper moved to Silicon
Valley where he worked as an engineering technician as well as being
tasked with working on the early cordless phones.
In order to gauge his stations reception, Draper drove around testing a pirate
radio transmitter that he built himself. While doing this, he broadcasted a
telephone number. One of his callbacks was from a man named Denny that
was later identified as Denny Teresi. Meeting Teresi introduced Draper into
the world of phone phreaks.
Due to a large percentage of phone phreaks being blind, they wanted Draper
to build a multifrequency tone generator. This later became known as the
blue box. The purpose behind the tone generator was so that they could gain
access into the AT&T system easier using the tones. In doing this, they
would not have to use an organ and cassette recordings in order to get their
free calls.
A boy who used the name Joybubbles had the gift of being able to perfectly
match the pitch of the frequencies that were being used. This boy was
informed that a toy whistle would emit a tone that was exactly 2600 hertz,
which was the same tone that AT&T used to indicate that a trunk line was
open and ready to route the next incoming call. The tone frequency would
enable the trunk line too close down one end of the line but leave the line
connected in operator mode so that it could be used to make calls. Draper
experimented with the blue box and the tones that it emitted in order to
make other tones that the phone companies used.
Draper and others discovered that they were limited to call-routing switches
that relied on in band signaling. New equipment relied almost exclusively
on out of band signaling. With the use of separate circuits, the equipment
was able to transmit voices and signals. Unfortunately for Draper, they were
no longer be able to use the Cap’n Crunch whistle that Draper had
developed. Now, the whistle is a valued collector’s item.
In 1972, Draper was arrested for toll fraud thanks to the help of the 1971
Esquire article. For his crimes, Draper was sentenced to five years on
probation. Wozniak actually sought Draper out and it was in Wozniak’s
dorm room that Draper began to teach Wozniak and Jobs in the ways of
phone phreaking, passing his skills down to the boys.
In 1977, Draper provided services to Apple as an independent contractor.
This is where Draper was able to create the “Charlie Board,” a phone
interface board that was used in Apple II personal computers. The Charlie
Board could instantly identify phone lines and signals –just like the ones
used to make free calls-. This was something that a modem would not be
able to do for many decades.
The technology that Draper provided Apple would later be used to tone
activated things such as voicemail, calling menus, and various other
products.
Draper never marketed his Charlie board due to the fact that it would be a
prohibitive cost with an AT&T approved connection. With the industrial
suppression by AT&T, his previous arrest, as well as the hostility between
Jobs and Draper, marketing the Charlie Board became almost impossible
without Draper most likely ending up in prison.
But, Wozniak would later use the BASIC cross-assembler that Draper wrote
in the development of Apple I and Apple II.
Between 76 and 78, Draper served two prison sentences, both for phone
fraud. While serving his sentences, two psychiatrists that were court
appointed to examine Draper found two different findings. One found that
Draper was fine and there was nothing wrong with him, while the other
found that he was psychotic and had an underdeveloped sense of people.
While serving his third prison sentence, Draper wrote the first word
processor (EasyWriter) for Apple II. Thanks to a work program, Draper was
able to gain access to a computer where he was able to code most of
EasyWriter, but, he did take copies of it “home” –back to his cell- every
night in order to continue his work.
In later years, Draper beat Bill Gates out for the IBM contract where he was
able to port EasyWriter. This deal helped Draper by a Mercedes as well as a
house in Hawaii.
After his company Capn’ Software posted less than $1million in revenue in
six years, Draper sued his software distributor for an unauthorized version
of EasyWrite being released without Draper’s permission. Thankfully, they
were able to settle outside of court.
Due to the criminal record that he held along with his eccentricities, Draper
found it hard to be hired by many corporations, even though Draper had a
pedigree and could easily demonstrate his qualifications. The last major
corporation that hired Draper was Autodesk in the late 1980s.
In the 1990s, Draper became immersed in the burgeoning rave scene. This
helped support his itinerant lifestyle and he wrote code in Australia and
India as well as developed websites. It is rumored that a rave website
located in Sydney got reports from Draper on some of the rave events that
he had attended while in Sydney.
Between the years 1999 and 2004, Draper worked for ShopIP as their Chief
Technical Officer. This was a computer security company backed by
Wozniak which featured an OpenBSD based firewall.
ShopIP was the first security company that would feature hackers as
security consultants as well as the first to use OpenBSD. Draper as well as
the company were featured in The Register and The New York Times.
Once again Draper was the Chief Technical Officer only this time it was for
a company called En2go from 2005-2010. As senior developer, Draper also
worked for a VoIP client called Kan Talk!.
All of Draper’s software history includes:
There is an often repeated story that Draper got on a public phone and
“phreakd” his phone call around the world. At no charge to him, Draper
routed his call through phone switches in Japan, Russia, England, and
several other countries. It wasn’t until his call was routed through at least a
dozen countries that he dialed the phone next to him and it began to ring.
Picking the phone up, Draper spoke into phone A only to hear his voice on
phone B moments later. His voice was heard faintly, but it was still there.
This was a trick that Draper repeated at parties that he attended.
Another story is that Draper and one of his friends placed a direct call to the
White House while Nixon was in office. It wasn’t until they gave the
operator the president’s code name –Olympus- that they were put through to
talk to someone that sounded just like Richard Nixon. In order to see how
far they could push their prank, Draper’s friend went on to tell the man
about a supposed toilet paper shortage in Los Angeles. At this point in time,
the man on the other end got extremely angry and asked them how they
managed to get connected to speak to him.
During an episode of The Rockford Files Draper is being chased down for
his involvement in a murder investigation.
Even in the book Read Player One by Ernest Cline Draper is used as the
key to unlocking one of the mysteries that are mentioned in the story.
OceanofPDF.com
Chapter ten: Steve and Steve
Wozniak and Jobs used hacking in order to help improve technology. In this
chapter, you are going to learn how they were able to do this.
Just like in a previous chapter, Jobs and Wozniak used a popular way of
hacking in order to break into different computers.
Even though they used their hacking for good, what they were doing was
still illegal!
Back in the 60s the term hacker was used to describe someone who was an
expert at programming. As the years went on and more people got into
hacking, the skills used in order to gain access to a system have gone from
being “completely innocent” to having people who use it for illegal activity
on the computer. Either way you look at it, the ones who use their skills to
program a computer and make it better, or the ones who use their skills in
order to gain access to a person’s private information, they are both skilled
individuals. Some of the biggest names in technology today started out
“hacking” back in the beginning days of computers.
Today, phone calls are a series of connections that place you through to who
you wish to talk to. Back in the beginning, this was done by a human
operator who would help you get through to the person you wanted to speak
with. When the automatic exchanges came into place, they route your call
to its destination by communicating with one another. The automatic
exchanges use a series of audible tones known as signaling which came
around in the 60s and 70s.
The tones that phones used proved to be the weak spot that hackers
exploited.
The blue box emulates the signaling tones used by telephone exchanges.
When these tones are played through a speaker that is connected to the
phone’s handset, the automatic exchanges are fooled into believing that they
are receiving a signal. Anything became possible once the hacker
understood all the signaling tones that were used.
A hacker could figure out how a call was routed by billing the processes,
overriding the charging, and this would help them to overcome any
blocking restrictions that a phone company had put in place. In the early
1970s this is what Jobs and Wozniak designed and began to sell. Using false
names, (Berkeley Blue and Oaf Tobar), Jobs and Wozniak entered into the
illegal world of Phone Phreaker.
Wozniak and Jobs started with Phone Preakering because they were
interested in the challenge it gave them to take something apart and figure
out how it works, and then find ways around it. By the time that they did
figure it out, they also figured out that they could make money off of it, and
that is when they began the illegal action of selling their work.
Now motivated by the new technical challenges that were coming out with
the advancement of technology, Wozniak and Jobs abandoned their life of
crime and moved on to different challenges. In an interview with Jobs, he
claimed that if it hadn’t been for the Blue Boxes that he and Wozniak
experimented on, Apple would not exist today.
Blue Boxes became extinct when the telephone companies began to adopt
an out of band signal that would spate and dedicate the connections that
were used for exchange to exchange any communication.
But, since they learned a lot thanks to the use of their blue boxes. Without
having dabbled in the darker side of hacking, Wozniak and Jobs would have
never created the worldwide company that we all know and enjoy today.
OceanofPDF.com
Conclusion
Thank for making it through to the end of Hacking, let’s hope it was
informative and able to provide you with all of the tools you need to
achieve your goals whatever they may be.
The next step is to take what you have learned here and either put it to good
use or begin to work towards a career in hacking.
Just remember that hacking is not going to be looked upon favorably and
that you should never try and gain access to a system without permission.
Everything that was written in this book was for educational purposes only.
Additionally, please visit our Amazon Author page for more great info and
resources.
CLICK HERE
You will find all the books you need to learn about:
Python Programming, SQL, JavaScript, and even TOR if that’s something
you fancy!!
Last but not least, if you enjoyed this book and thought it was helpful, we
certainly won’t say no to a 5-star review on Amazon.
Thank You and Best of Luck in Your Hacking Endeavors!!!
OceanofPDF.com