Friday, October 4, 2013

Lesson 1 - Types Of Hackers




(Hacking) You can't learn to hack by 5 mins or 5 hours.. 
You need some practice.  So, Don't miss any lessons. Hold on to be Perfect!!! 

Types Of Hackers

White Hat Hacker 

* Instead of a White Hat Hacker Ethical Hacking computer guy. This vehicle is usually security experts and 
hackers hacking information, and to use this knowledge to find security vulnerabilities, and who
measures against sources.


* Also known as an Ethical Hacker or a Penetration Tester. They focus on the safety and protection of IT

Systems.
Black Hat Hacker

* A Black Hat hacker performs Unethical Hacking computer guy. This is criminal hackers or 
crackers
Who uses their skills and knowledge of illegal or malicious. They enter the breach or
malicious remote machines, system integrity.


* This is also known as an Unethical Hacker or a safety broken. They focus on Security Cracking 

and Data play.

Grey Hat Hacker
* A Grey Hat Hacker sometimes good intentions, sometimes acts legally, and sometimes a 
computer guy.
Hack for personal gain or malicious intentions, usually, but do not have or undertake from time to
 time crimes during the technological exploits.


* They are a hybrid between White Hat and Black Hat Hackers ..

Lesson 2 - Types of Malware

                               
                                
Now let's start some familiar things.
Types of Malware

Under specified malware , there are some types in various formats malwareyaygın


1 . Trojan Horse - is one of the most common types of Trojan viruses or Trojan horse malware ,

 Trojan virus from infecting files on your computer are mostly the victims of the victims instead of the 
computer used to control or destroy . Once the victim of a Trojan horse installed on the computer that a hacker
 can access your computer at full . The most dangerous forms of malware are Trojans .


2 . Computer Viruses - A computer virus infects a computer it replicates itself or reproduce more than once ,

 a malicious program developed to infect a computer . Just like a parasite and a virus to infect a computer you 
need to add another host


3 . Worms - Worms computer viruses do not need to add another host to infect a computer only 

difference is that , unlike almost similar to computer viruses . Once a worm infects a computer that replicates
 itself . Computer worms are a significant threat to large networks .


4 . Keylogger - A keylogger every keystroke , screenshots , chats, etc., followed by a hardware or software 

device that is typed on the computer . A keylogger program that does not require physical access to the 
user's computer . Any person with a basic knowledge of computer use keylogger


5 . RATS - RAT "Remote Administration Tool" malware is short and it really is one of the most dangerous

 types . This is very similar to a Trojan . An attacker could then install a RAT files, etc. from infecting a
 computer , a computer shutdown, such as installing a keylogger can do virtually anything on the remote
 computer


6 . Adware - Adware is a short form of ad-supported software . Adware is designed to display ads on

 the most common computers . However, some of these adware knees computer system can contain 
harmful viruses and spy programs .

Lesson 3 - Keyloggers -
 Easiest Way Of Household Hacking

Wait, You will surely like it! :)

Keyloggers

Keyloggers can be classified into two main types:

1. Hardware Keylogger
2. Software Keylogger

Hardware Keyloggers

In addition, key logger, keyboard plug and the USB or PS / 2 hardware keylogger is connected
 between the socket port, and a USB keyboard work with a PS / 2 keyboard, keylogger hardware used
Written by the victim is just a normal USB drive or internal memory hardware can not doubt that the
 keystrokes, keylogger keylogger to store other computer peripheral equipment, such as keylogger.


Software Keyloggers

The hardware keyloggers are extremely useful only in case if you have physical access to the
 victim computer, but what if you do not have physical access to the victim computer and 
sometimes the victim would notice.
This is where software keyloggers come into play, software keyloggers can be classified into 
two types:

1. Local Keylogger
2. Remote Keylogger

Local Keylogger

Local Keyloggers are used to check local computers (May your own desktop), 
they are very easy to install and are completely undetectable and it's really hard to 
figure out when a keylogger is installed on a computer behind because usually keyloggers
 hide task manager, Windows registry etc. If you want to see logs, screenshots etc you
 just need a shortcut pressure (ex. Shift + Ctrl + F10).
There are hundreds of keyloggers available now days, but some of them are user friendly
 and actually be able to hide once they are installed, some of the popular local Keyloggers are:

1. Spyagent
2. AllSpy Keylogger
3. Refog keylogger


Remote Keyloggers

Remote keyloggers are used for the purpose of controlling an external PC, 
once a remote keylogger installed on the computer the attacker can record your
 keystrokes, your webcam shots, chat logs etc are in a part of the world.
You can find on the website, tons Remote keyloggers but many of them are either
 not capable of properly recording keystrokes or they have a high antivirus detection. 
But those're the best ever.

1. Sniperspy

2. Winspy

Lesson 4 -RATS
 (Remote Administration Tool)

RAT is the short form of "Remote Administration Tool". It is very similar to a Trojan horse. 
Once a RAT is installed in a computer the attacker can do almost anything on the remote 
computer such as installing a keylogger, operating a computer, infecting files etc.

Commonly Used RATS

1. ProRat
2. Turkojan
3. Cybergate

PRORAT
ProRat is a Remote Administration Tool (RAT). Prorat opens a port on the infected 
computer that allows the customer to perform. Various operations on the infected computer 
Once Prorat is installed on a computer it is very difficult to remove without an 
updated antivirus program.

Turkojan 

Turkojan is a remote administration and spying tool for Microsoft Windows operating systems.

Cybergate

Cybergate is an advanced remote control solution. It is designed to control a large number
 of servers so that the network administrator easy control. Cybergate is only available now
 for Windows platforms as a native application, without any Framework (like. NET), Virtual
 Machine (such as Java Virtual Machine) or an additional dynamic link libraries or shared libraries
 are a step forward in innovation and advantage with respect to other applications on the market
 that have reduced installation and usability.

Tired Or Bored?
 Let's Do Some Hack

To be an hacker, We should Think More. First, Do a simple hack.
We use Passwords in the Internet. Then, Those Passwords Should Stored In Internet Too. (Am I wrong?)
Here, the First 'Working' methods to be a hacker. Only you need is Google.

This is a Security Hole in Gmail.

1. Copy this Code: ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e

2. Visit www.Google.com, or use your favorite search engine.

3. Now paste the code in the search field. Now Search.

4. You can see many results. Visit any of them.

5. Now you can see lot of Usernames & Passwords
Ex: If the line is (57, 'Jhon', '1c63129ae9db9c60c3e8aa94d3e00465', Username is Jhon.
Password is 1c63129ae9db9c60c3e8aa94d3e00465.

6. Passwords are in Hash format. (Ex: 1c63129ae9db9c60c3e8aa94d3e00465) Don't worry.
We can Convert (crack) them into Passwords. Copy the Hash code you want to Crack.

7. Visit www.hash-cracker.com or other hash cracking website. Now Get the password.
 Now you can use it for login.

HOW was That? You Won! :)


                           


0 comments:

Post a Comment

PLEASE DONATE US TO [GET A DOMAIN]

FB recommend

FB Comments

GLOBAL VIEWERS

Blog Archive