Hacking is difficult, but with the right tools it can be a helpful and interesting experience. This is an in-depth article of the tricks and secrets of Hacking. edit Steps 1 Use a *nix terminal for commands . Cygwin will help emulate this for Windows users. DOS is worthless in this area. The tools in this article can be found for Windows based machines. Nmap particularly, uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systemsdue to the lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible and more reliable. Most Linux distributions come with many useful tools pre-installed. 2 Try your first . Make sure you fully understood all common techniques, including the way to protect yourself. Start with basics - found a server which hassite about racism, homophobia or other bad activities? Try to hack it, any way you can. Yet again, don't change the site, just make it yours. 3 Know your target . The process of gathering information about your target is known as 'enumeration'. Can you reach the remote system? You can use the ping utility (which is included in most operating systems) to see ifthe target is 'alive', however, youcan not always trust the results of the ping utility, as it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators. 4 Determine the operating system (OS) . This is important because how can you gain access to a system if you don't know what the system is? This step involves running a scan of the ports. Try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you canplan a course of action. You can activate OS detection in nmap by using the -O switch. 5 Get super user (root) privileges . Try to get root privileges if targeting a *nix machine, or administrator privileges if taking Windows systems. Most information that will be of vital interest is protected and you need a certainlevel of authentication to get it. To see all the files on a computeryou need super user privileges. This is a user account that is given the same privileges as the"root" user in Linux and BSD operating systems. For routers this is the "admin" account by default (unless it has been changed), for Windows, this is theAdministrator account, etc. Just because you have gained access to a connection doesn't mean youcan access everything. Only a super user, the administrator account, or the root account cando this. 6 Create a backdoor . Once you have gained full control over a machine, it's best to make sure you can come back again. edit Tips Read books discussing TCP/IP networking. Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and requires a lot of professional knowledge to do anything serious in real environments. Although it's great there are many legal, safe training grounds available for anyone, there is a sad truth that you won't become any near "medicore" if you won't start doing illegal actions. You can't become anyone if you won't find real problems on real systems, with the real risk of getting caught. Keep that in mind. Find information online related to hacking, or to even attend an"underground" hacking event, visit these sites: enigmagroup.org A legal and safe network security resource whereusers test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and activeforums, and guides and tutorials. insecure.org Hacking tools and other software. [1] Learn to hack, keep yourself safe, and many other useful computer skills. securityforest.com Tools, papers, exploits, and other reference material. Attend college and start a careerin software, to learn the most about hacking. edit Warnings Misuse of this information may be a local and/or federal crime. This article is intended to be informational and should only be used for ethical purposes. Do not delete entire logfiles. Instead, just remove the incriminating entries from the file. What do you think would look more suspicious; logs with a few entries missing, or the entire log file destroyed? But other question is, if there is a backup logfile? What if they just look for differences and find the exact things you erased? Always think about your actions. Best thing is to delete random lines of log, including yours. Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. A security professional that protects that system may be trying to track you or may be setting up a honeypot . Although you may have heard theopposite, don't help anyone to patch their programs or systems. This is considered extremely lame and leads to being banned from most real hacking communities. And if you would release private exploit someone found, he can become your enemy - and he's probably better than you are. Never do anything "for fun". Remember it's not a toy to hack into network, but it's a power to change the world. Don't waste that on childish actions. Again, don't change anything in the system to mark it as "owned" or anything that silly.
0 komentar:
Posting Komentar