Hacking the system

System hacking

Information gathering from previous phases is required to perform the hack.From footprinting and scanning attacker gather information about the target and finds the vulnerability.Now using the same vulnerability, in the phase of system hacking, attacker performs the actual HACK.

Password Cracking

Password cracking attacks are of following types: 

  • Passive online Cracking :

      In this, an attacker tries to authenticate into a system by cracking the passwords using brute force, dictionary attacks or rainbow tables.There is no surety of getting successful and this method is quite complex and time-consuming.
    • Active online cracking :

      In this, the attacker generally guesses the password in order to gain access to the system.Generally, bad passwords and open authentication points are vulnerable to active online cracking.Although it consumes a lot of time and is a less efficient way.
  • Offline attacks :

    In this, an attacker tries to exploit Lan manager hash (LM hash), they are much vulnerable because of short length and short key they used.they are also time-consuming.
    generally, in offline attacks, attacker performs dictionary, hybrid or brute force attack. 

    • Non-electric media attacks :

      This generally required technical medium.
      Generally, Shoulder suffering, dumpster diving, and social engineering are used to gain the password.Hardware keylogger can also be used to stiff each and every type of keyboard.This is commonly used in non-electric media attacks. 


      Default password database :

      Many websites contain the database of default usernames, passwords, ports and various information of networking or other devices.

      some websites are as follows :

      • www.defaultpasswords.com



  • https://cirt.net/passwords

  

 

 

 

Manual hacking cracking:

  1. Ping the target network to check whether it is live or not.
  2. Make a list of all the possible passwords(easily available online).
  3. Define the priority of each password on the basic of key defined.
  4. Try to get access using password, in case of failure.again try with a different password. 

keyloggers

keyloggers are specially designed softwares or hardwares which are use track keystroke activities of the target system.They may also track every activity of the target system depending on the various keyloggers.

 They are of two types:

  • Software-based keyloggers :

    Software-based are installed on a target system.They have the ability to run into the background without getting caught by antivirus.They track every keystroke and anonymously send all the data to the attacker on a fixed interval of time.

    • Hardware-based keyloggers :

      Generally, a hardware is connected to keyboard and CPU, this intermediate hardware device track every keystroke typed and save them into proper log files, which is accessible by an attacker. 



       Types of hacking:

      white hat :

      A white hat hacker is someone who has non-malicious intent whenever he breaks into system and whatnot.In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security ciphers and shields or even penetration testers specifically hired to test out how vulnerable or penetrate a present protective setup currently is.A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker.

      Black hat :

      A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, Phone number, or computer and without authorization.His malevolent purposes can range from all sorts cybercrimes such as piracy, identity theft, credit card fraud, vandalism, and so forth.He may or may not utilize questionable tactics such as deploying worms and malicious sites to meet his ends.


      Grey hat :

      A grey hat hacker is someone who exhibits traits from both white and black hats.More to the point, this is the kind of haker that is not a penetration tester but will go ahead and surf the internet for vulnerable systems he could exploit.like a whitw hat, he will be inform the administration of the website of the vulnerabilites he found after hacking through the site.Like the black hat and unlike a pen tester, he will hack any site freely and without any prompting or authorization from owners whatsoever.He will even offer to repair the vulnerable site he exposed in the first place for a small fee.

      Elite Hacker :

       As with any socity, better than average people are rewarded for their talent and treated as special. This social status among the hacker underground, the elite (or, acco9rding to the hacker language the eventually devolved into leetspeak, 31337) are the hacker among the hackes in this subculture of sorts.They are the master of deception that have a solid reputation among their peers as the cream of the hacker crop.

      Script Kiddie :

      A script kiddie is basically an amateur or nonexpert hacker wannabe who breaks into people's computer systems, not through his knowledge in IT security and the ins and outs of a given websites, but through the prepackaged automated scripts, tools, and software written by people who are real hackers,unlike him.he usually has little to known knowledge of the underlying concept behind how those scripts he has on hand works.


      NEXT WILL BE HOW TO MAKE VIRUSES (PRACTICAL)


       

       

      THANK YOU........

       

footprinting(hacking part 1)


So finally after a long time a practical blog.
In this blog, I will give you the knowledge of hacking.
Hacking is done with steps, it is just like stairs i.e step by step.So before attacking someone or hacking someone, we must have all knowledge of the victim.
  1. Footprinting.
  2. Scanning.
There many more but these are just basic ones.
Foot-printing means information gathering like victim's IP address, email address, Name, Ph no. etc.
This information means 50% work done.
And second comes Scanning ports, no let me explain you about ports:
Now port, like in the communication we have Starting and ending points so basically port is the ending point like if we start the computer server it has receiving and sending i.e starting and ending.

We know about Airport, it is a place where airplanes end its journey same as a seaport, all the ships end there journey there, so the port is the ending point.

It also uses in differentiating services like now every service has there particular port like we surf HTTP its port number is 80.These ports help in entering victim's server.

So today is the practical of foot-printing means the first step means info gathering:

 

So in this practical video, we collect information from the website named www.whois.sc this website gives all the information of the target i.e IP address, e-mail, phone number, location etc.
if on this site you entered someone's website suppose www.google.com then it will give all the information about it and all means all.
This website can even search the IP address.
This is totally legal work there is nothing like illegal here, everyone, anyone can use it at any time.

And in it we also talk about the PING, this is the tool or command used in cmd to known wether the target is active or not.
This is clearly understood by its working in the video, in this if a total number of packets send=total number of packets received then there is 0% loss means a target is online.

This is also mandatory that the target is alive at rhe prestent moment because inactive of the target may causes many problems like unsufficient or impartial tranfer of the packets in which a person get known about the spy this is the biggest problem to known about it ,because once the target know about the hack he/she will get to known about the hack ,and the next attack will became unsuccessful.

After all of this here comes the Scanning, scanning plays the vast role is hacking.
Scanning generally means scanning the ports these ports are to be scan and from this ports the attacker sends the information or the trojan to it and effect the system or server.

This what the main basic of hacking and all these help in the hacking and even cracking.
this plays wise role in the information of things.  

Now lets talk about IOT or internet of things,
all the technology contains iot can hack some or the other way.
things which is non-iot can hack to some limits.
but in the day to day life, nowadays the countries becoming developed and nowadays the home is also also based in it .now what this means .in America the homes are built with the iot like if we say "off " then the lights or the fans is off this is what the iot means.

There is the course of iot 
iot also contains cyber security, which has high scope nowadays.
now btech introduced the new fields i.e BACHELOR OF TECHNOLOGY (computer science)(iot)
 

After all this, it becomes the vast field of it.



hence this is what i want to explain to you all 
 thank you for today will meeet you soon with the nwe blog and videos tutorial so stay tuned.


 

TOP 4 HACKING TOOLS



 so here comes something interesting,today i will tell you top 4 hacking tools,i know many people have heard about it but many are unaware about it.So lets start:
  1. Metasploit:This tool ranked 1st in 2017 and this is the most powerful tool.From this tool yon can hack website with the help of exploits.This tools also helps in making your own hacking tools i.e custom exploits.I know many must be thinking that what are exploits???so this is just the introduction i will be explaining you with the help of practical so don't worry.
  2. Acunetix:So this software helps you to find out the Vulnerabilities in the website.so let me tell that vulnerabilities are the weak points of the website.so here black hat hacker will hack the website with help of this vulnerability whereas white hat will make this fill up this weak points.so this is the main work of black and white hat hackers.
  3. Wireshark:This basically helps in wi-fi hacking,this helps in capturing packets which are Shared.This tool is the second most powerful tool.
  4. Nmap:This is also know as mapper because this helps in collecting the information of the target.like ports,email address,IP address etc.
so this is only the introduction,as i said i will explain it with the help of practical videos.



Hacking can be done on any devices but with the limitations.Now what does limitations means?
  like we can start hacking with various operating system i.e windows,mac,android but at certain limit because there are limited features in it.
But with help "LINUX" you can hack everything.
And the very best part of LINUX is that it can make you completely anonymous. 

There are many more things you should know about it like footprinting, scanning, port scanning, email hijacking ,bypass email, bypass phone number, proxy server, Dos, Ddos, ping of death, and many more things. 
These tools are so powerfull that if done with perfection it will even hack google server or apple server.
And the best thing of hacking is that the hacker becomes master of computers and have all kind of knowledge.
Hence became expert in it.which is very benifitial for upcoming days.
The best way of excellence take one tool and become master in it, became  the one that no one is.
there are many more tool like system toolkit in linux for phishing
and many more.
LINUX is very simple its just like learn basic of it and you learn advance by yourself.It is basically hacking operating which contain all hacking exploits and tools.
it has so easy interface .


so this is the small blog with some information for any question comment below.
and can follow me on Instagram @gauravludhwani_


And yes recently i made an app to hack Facebook accounts,will share you soon.


And let me clear that this is just for educational propose,don't misuse it.Do not use it for malicious purpose because it is illegal and have high risk.

and soon starting hacking coarse so stay tuned....

THANK YOU


More about hack(CAREER OPTION)




So in this as i told that we will discuss about road to the hacking.
Firstly,let me clear ethical hacking has it many part or we can say that ethical hacking is the part of cyber security.
There many more courses apart from this.some are mentioned below:  
    
  
  •     Certified Security Analyst (ECSA).
  •     Computer Hacking Forensic Investigator (CHFI).   
  •     Certified Network Defense Architect (CNDA).
  •     Certified Encryption Specialist  (CES).   
  •      Licensed Penetration Tester  LPT – Master.
  •     Securing Windows Infrastructure.
  •     Advanced Mobile Forensics and Security.
  •     Hacking and Hardening your own Corporate Web App/Web Site.
  •     Advanced Network Defense .
  •     Certified Chief Information Security Officer  (CCISO).
  •     Certified Secure Computer User (CSCU).
  •     Certified Incident Handler (CIH).
  •     Certified Secure Programmer (CSP – JAVA).
  •     Certified Security Specialist (CSS).
  •     Disaster Recovery Professional ( DRP).
  •     Certified ethical hacking (CEH).
  So these are some programs apart from hacking every program has similar work but not same,
  these can also be chosen as career option.
but let me clear that these are not DEGREE programs these are certification programs.

DEGREE PROGRAMS ARE:
  • Bachelor of Science in Cyber security.
  • Graduate Certificate Program.
 The certification program can be done only after graduation,it is not mandatory that you have complete your bachelor with cyber security.
Any graduation is acceptable but for pursuing for these certification program you should experience of minimum 3 years.
 so now the Question is how to do this?from which institute?
and answer is as simple as that  a international site EC council conduct all programs with internship too , so n visit for more information. link is here  www.eccouncil.org 


And now comes scope:

According to survey, in the future at-least 90,000 hackers are required but we only have 19,000 only.
now this field is start growing day by day because of "DIGITIZATION OF INDIA". Due to this many virus are created daily and to stop this we need hackers more and more.

Nowadays companies are hiring person with the knowledge of cyber security more over computer engg.
So in this field "DEMAND IS MORE BUT SUPPLY IS LESS SO INDIRECTLY  MONEY IS GOOD IN THIS".



 And now come salary:


So this part is completely depend on your talent,knowledge and skills.
It is not compulsion that every hackers has good salary some are unemployed too,so its directly proportional to your skills. 

But basic salary of hacker is 4 lac's to 7 lac's in starting because in starting company test your skill, knowledge and examine your trust over company,but after working 2 years it becomes 10 to 12 lac's due to experience.
NOTE:Person with experience have more value.



And now at last road to it:

I already mentioned the programs and way above but let me clear it is not important that only science stream can pursue in it.
person from Any stream can pursue in it.
Like for Commerce "BACHELOR OF COMPUTER APPLICATION" is best degree option
and same for arts.
After BCA, one can persue for MCA and he will called as computer enggineer.
or even can go for MBA and if related to science stream then even MTech.
BCA and Bsc-cs
BCA is technical whereas Bsc-cs  is non technical both are related to computers,both has difference in it.
and the another one comes is bsc-it it is also computer oriented 
in this only software parts comes no hardware so this field has less scope compairativly to bca and bsc-cs.




So hopefully all this information will help you,for any queries comment me down or follow on Instagram  gauravludhwani_



And next blog will help you more and please do comment for queries or any topic u need to know about.



 THANK YOU.
 

START TO HACK




  So everyone knows about hacker and hacking.
So basically i will not bore you with the brief description of hacking or hacker.
Ya ya!!! there are many types of hackers like black,grey and white etc.
I am also not a pro hacker ,m just in a age of learning.



So first of all i will tell you some basic and important points:  
  • Hacking is not difficult thing to learns but to learn it and do excel in it you must first need to note down that you must required INTEREST, NEVER GIVE UP SPIRIT, AND SOME BASIC SKILLS.
  • Everyone can hack but again interest and skills matters.
  •  It is very vast and deep too.in other way we can say that in this there is never ending learning, wait let me clear you with an example:suppose we do any degree like BBA,B Tech,B.Com in this after degree we just do jobs means after it we dont have to work much on it anymore but on the other hand this hacking field requires all time learning spirit because daily there are millions of virus created and we have to learn how to get over these viruses.
  • It doesn't only required computer languages like C++,java, python etc,there are many who knows many more language apart from this but don't "H" of Hacking.
  • India is full of hackers but its shocking that most of them (like 90 in 100)are just belong to  Facebook hacking or gmail hacking, and left unemployed because of there own mistake,as they think that it is enough for them, so please if you thinking to learn hacking for just hacking your friend's account so i will advice you to not to think for pursuing in it because it will left you unemployed.
  • Dont use the all your talent to harm any one because this is only legal at some places only.
  • There can be the risk doing this because it can make a person life and even ruin it,depends on the person.
  • The white hats are known as hackers whereas the black onces are known as crackers.
  • Many peoples thinks hacking is crime, yes it is but it also have vast future in it if done with non malicious intent.
  • Hacker can also get there career in teaching and the fees of the teacher of hacking is 30000 INR per 15 days.so this can also help in this.
so these are the basic info that a beginner should know ,apart from this a beginner must have knowledge of basic computer too .And remember that this is for only education purpose not for any illegel uses. so be safe and dont use for harm.


So in the next upcoming blog will tell you about the;
  • Scope of this field
  • Salary 
  • Institution
  • Road to it.


so this is my First blog and little part of what i know,i m again admitting i m not a "pro" or "certified" , i am just sharing my knowledge with everyone and if you know more about it please tell because i believe in learning no matter who is teaching.

HOPE YOU LIKE IT.


THANK YOU.   

NOTE:In the upcoming blogs will teach you how to crack and hack too so stay turned.

Featured post

Hacking the system

System hacking Information gathering from previous phases is required to perform the hack.From footprinting and scanning attacker gathe...