Pages

Tuesday, July 17, 2012

Basic hacking techniques


Please this is meant for self-defence only

Before, getting the basic hacking techniques, you need to know that to catch a thief, one needs to reason like a thief so as to know his tacticts.

Naturally most hackers admire the write up of a convicted hacker called the mentor. The write up is called the hackers manifesto.

It is more or less the same way hackers think or some would like to think or act.

Trying this out, I'll advice you to get BlackICE as a personal firewall

What is the first thing a burgler makes sure of before making a move.

1) Anonymity.

He'll use any of these techniques to be anonymous

- software that hides his Ip address like, Easy-Hide-Ip

- An intruder will never use his real identity. But would always get other peoples usernames and passwords and use it. Like this.

and maybe programming in C like this

- He'll use proxies or secured tunnels

- And may use telnet for hiding and task execution.


2) Gather information about the target.

Gathering of information helps to know a lot of things about the target pc like, date, time, operating system so as to know its weaknesses and study the easiest ways of exploiting these weaknesses


- Get its Ip address .

This is very important! Employs either the use of tracert or Ping or dns query and it continues from there.

- Resourcefulness

Telnet and tracert and dns query, nslookup or dig utility can be used here to get as much information as he wants.


Telnet can be activated on ur pc like this



3) Getting out
computer security 1

- He'll leave files on the victim’s pc.
This makes it possible for another access. and also the possibility of setting traps and nailing him. You can get information about some tools in the tool section. Or just go toprotectivehacks.com shop


The best advise I’ll give here is that, anyone who wants to try these out would like to know a thing or two about programming and also check any of the tools in search engines like google.

The use of port scan has been debated a lot in courts. Its legality depends on what its used for.



source : http://www.protectivehacks.com

No comments:

Post a Comment