This is the first lesson in
the world hack. Further you can find and learn the elemntare things to
know every hacker beginner! Although there are some things you know not
complicated, they are very useful and I am sure that you will use and
further ahead in your hacker! Any hacker tools!
Here I
describe the arsenal of a hacker, even if it's beginner! I think these
tools will be useful in further!
- Brute Force - Port
Scanner - Security scanner - Joiner - Mail Bomber -
Breaking Windows passwords - View passwords - Trojan -
Keylogger - Hiding IP (proxy / socks)
So we start on row
...
Brute Force
Brute Force - Uses passwords to
downloading e-mail, ftp-servers and others ... There are several types
of brute force programs, giving them more common functions. When using
brute force connections to less than 56 kb that is dial-up download
passwords can be very long ... and when using ADSL, fiber optics or
satellite descarea takes place much faster, in turn eat the more
traffic. The optimal solution is to download the password through the
lists of passwords. Hacker draw up a text file in which passwords are
located all possible target, the program connects to the server and
pointed to choose the start line of the fillet text passwords with
passwords (list). Deasemnea these lists of passwords can be primitive,
that is when urmaeaza as the ab-abc-ABCD-ABCD ... up to a length of
10-30 GB! Also with dictionaries or lists of passwords, as they say in
May, is more difficult to nimereasca and password, but it is very
effective! If the attack takes place on an e-mail, it is necessary to
point brute force the server data entry. Eg if we want to break postal
address - e-mail server of the data entry will be: pop.hacksome.md. And
if not break e-mail address but www.hacksome.md site, then you have to
show program brute force ftp-server of this site: Brute Force
ftp.hacksome.md programs still have many useful features like password
if you know the person is 5 caractrere the first letter is L, then you
can use the password after downloading mask: L ####. Among the best
programs are Brute Force: AET2 Brutus, wwwHack and others. For example,
today more email service programs have brute force, hackers created
especially for them!
Port Scanner
Programs that scan a
range of IPs with an open port indicated is called port scanners. If the
scanner will find an IP address with that port open, it will be added
in your list also, there is only scanners intervals ip addresses. Where
to use these scanners? Sometimes creators will include a Trojan scanner
port their creations. This is because the server heap (fillet must stay
in the target computer) in reaching your sacrifice, open a port in
system, whereby the customer receives commands (hackers). For those who
still do not know: if you know which port is lagatura with our wall,
with ports scanner wondering after every computer IP address if the port
is open or not. When the scanner finds addresses to open the port means
that the computer that already sit in a heap of our sin is we can
connect to it! Among the best scanners and the alpha Essentional Net
Tools and a simple but very useful - Angry IP / Port Scanner.
Security Scanner
All the Internet there are two main types of
websites: static [html] and dynamic [php]. If the pages are written in
html page where the content does not matter to ordinary users and always
remain unchanged - static. Pages dynamic process data received from
users, that is if you can think to express. Hence we conclude that
static pages can not be any security holes. These holes exist only in
dynamic pages. The most widespread vulnerabilities are XSS. To find
security holes, using scanners securiatii. The best time to be XSpider
and Shadow Security Scanner.
Joiner
In English, means to
unite join, connect. Joiner is a program which enables to join or glue
several fillets in a single file system have changed the icon. Thus,
using hacker Joiner can paste a server with a heap of useful file system
inmine of its target. In turn, or when launching the target program
that thinks it is useful to automatically launch and wall ... Through
Joiner you can join in a file up to 255 fillets! Joiner is a minus - it
can be detected by antivirus. The problem can be solved if you buy a
private Joiner because joinerele public are not so good!
Mail
Bomber
This type of program is to bombard the e-mail .. that is
sending several hundreds or even thousands of letters to a postal
address! Bomber mail programs are used widely by spameri. Thus, when
sending too many letters (can reach hundreds of thousands and
thousands!), Post the target can not process information venita suddenly
and in large quantities, so the error or even delete this address. I
personally against spamerilor! But if you will need, you can use Ganja
Spammer or any other .. Only in exceptional cases!
Breaking
Windows passwords
I think the best programs for handling
passwords are PasswordsPro, MD5Inside, PWLInside, SAMInside. All these
programs are produced by InsidePro. But to invelege better, I read a
little to write about them. SAMInside - a program to break fillets
SAM. Windows 2K/XP, all passwords are kept in windows \ system32 \
config, and is called SAM and SYSTEM - without extension. To copy them
to decipher them, you need dos or another .. To begin to figure out, you
need copies of them. Later they open with SAM Inside indicated
descifrarii way and wait. Soon you will read the password! PWL
Inside - is practically the same as the previous program, only that is
used to decode fillets from Windows 95/98, where passwords are fillet
with a. Pwl Windows directory. MD5Inside - with its passwords can
decode MD5-hash that is used in many systems of authorization. After
decipher the password hash you have time. For example, in forums such
Invision Power Board hash contained in cookies. More about cookies read
on our website. PasswordsPro - is a very powerful tool for working
with passwords. Are all functions MD5Inside, generates hash, passwords
can view what is under the stars ***. It is very useful for any hacker!
View password
If you what your colleague has the password, it
is very easy to learn. When you are in hospitality at it, send to make a
coffee, and you in this time, remove programs that shows all the
passwords from messengere, mail and more! I think that magic?)) It
consists in the fact that for more convenience, was made after approval
your password is saved in the browser, icq, messenger or mail. This
vulnerability is a pretty big! There are many programs that show all
types of passwords saved in your computer. To view the passwords of
Internet Explorer and Outlook Express, use PSPV program. For TheBat -
TheBat PasswordViewer for ICQ / Trillian / Miranda and others - Advanced
Instant Messenger Password Recovery or AIMPR. Thus, without any
problems to put hands on passwords!
Trojan
Here I come
to you and more interesting. This type of program hack, was so called
because it works like famous Trojan horse. Once inside the target
computer, couch and sit there quietly. He does absolutely nothing if you
do not receive the command from the creator or (hacker who sent). But
he gets terribly when it starts to come hacker commands from the network
(LAN) or Internet! It can send all your passwords hackers if it
receives the order or work with your fillets or register. I understand
the idea that it can have very high although all have different ways!
Most popular today are Trojan: Pinch, Xinch, a311 and many others ...
Keylogger
Keylogger is a spy of the keyboard. It records all
keyboard and push them into a file. When the connection to the Internet,
this file is sent to hacker or save them in there somewhere on your
hard disk. It is an ideal tool if you want to know what type your friend
via icq or messenger.
Proxy
If you do something not
legal, I do not think you want to leave your real IP address .. then you
find you easily. But those did so in case? There are so-called proxy
servers and socks servers. The trick is that this proxy you change your
ip real. I mean, you connect to the proxy server, and all orders do not
go directly to that site but the first proxy server, which fulfills the
order and send you only the result here! Thus, leaving the proxy server
is working for you, and you stay anonymous! Also, if you have your ip
address banned by prozy come without problems! In general, if you have
problems because of IP address, use the proxy and everything is solved!
Good programs to work with the proxy are: A4proxy, ProxySwitcher.
|
0 comments:
Post a Comment