SlideShare uma empresa Scribd logo
1 de 9
Google– Internet Web Browser
             http://www.google.com/                                              Giggle Search

  Google




                                      [ Hack The hacker before they hack you ]
Your Page Name – Internet Web Browser
              http://www.google.co.in/group-d%504128%slide%index=114212%search/   Giggle Search

  Search results



                   Who is a hacker?




                    In the media the word "hacker" is often used, for what I would call a
                    "cracker", someone that breaks into systems to damage it, or for the
                    purpose of getting illegitimate access to resources.


                     Now the question arises that what do you mean by hacking or cracker?

                     Hacking is the practice of modifying the features of a system, in order to
                     accomplish a goal outside of the creator's original purpose.
Your Page Name – Internet Web Browser
              http://www.google.co.in/group-d%504128%slide%index=114212%search/   Giggle Search

  Search results



                   Hacking Types Index




                     Well there are many types of hacking but we will tell you about three of them
                     which are as follows :->

                     1. Windows Hacking
                     1. NetBIOS
                     2. Cracking Windows Passwords
                     3. Countermeasures

                     2. Programming
                     1. Do I really need it?
                     2. Where should I start?
                     3. Best way to learn

                     3. Passwords Hacking
                     1. Password Cracking
                     2. Phishing
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                                             Giggle Search

      How to hack with Gitesh and Arun




                                                                       Windows Hacking
                                                                           How to use Net Bios



                                  1.Open command prompt ( start > run > cmd)
                                  2. In the command prompt use the “net view” command
                                  Example: C:>net view 59.43.45.212
____________                      3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios
    Index                         command which makes it possible to hack remote drives or printers.
                                  Example-1:
1. Windows Hacking
                                  C:>net use D: 59.43.45.212F
  1. NetBIOS
 2. Cracking Windows
                                  Example-2:
Passwords                         C:>net use G: 59.43.45.212SharedDocs
 3. Countermeasures               Example-3:
                                  C:>net use I: 59.43.45.212Myprint
2. Programming                    4. After succeeding your computer will give a message that “The command completed successfully“. Once
1. Do I really need it?           you get the above message you are only one step away from hacking the computer.
2. Where should I start?          [ad code=1 align=center]
3. Best way to learn
                                  Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can
                                  open it and access remote computer’s Hard-Drive. Y ou can copy files , music, folders etc. from victim’s hard-
3. Passwords
                                  drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.
Hacking
1. Password Cracking
                                  You can access files folders quickly through “Command Prompt”.
2. Phishing
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                              Giggle Search

      How to hack with Gitesh and Arun




                                                                Windows Hacking
                                                                  Cracking windows Password

                             1. Download Ophcrack LiveCD
                             2. This program is now an ISO image. Just burn it with Nero or whatever you’re already using for
                             burning images( for burning only ISO images download this burning program – ISORecorder )
                             3. Now reboot your computer with the CD inside (if the CD will not boot you need to set the boot
                             priority inside BIOS, so that the CD-ROM is the first in the list)
____________                 4. A menu like this will appear:
    Index
1. Windows Hacking
  1. NetBIOS
 2. Cracking Windows
Passwords
 3. Countermeasures

2. Programming
1. Do I really need it?
2. Where should I start?     5. Hit <ENTER> or wait six seconds to boot into the Ophcrack Graphic mode. If something goes
3. Best way to learn
                             wrong and the screen won’t show the Graphics, restart and go into the Ophcrack Graphic VESA
3. Passwords                 mode. If this also fails, go into Ophcrack Text mode.
Hacking                      6. Once it ophcrack loads completely, it will automatically get your Windows password hashes and
1. Password Cracking         begin the cracking process.
2. Phishing
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                                Giggle Search

      How to hack with Gitesh and Arun




                                                                 Windows Hacking
                                                                              Countermeasures

                             There are a couple things you can do to prevent NetBIOS and Ophcrack password cracking attacks.

                             1. To keep computer from being a target of NetBIOS attacks, simply disable file and printer
                             sharing. In Windows Vista, it is disabled by default but you must do a little work in Windows XP.
                             • Go to Start -> Control Panel -> Network Connections.
____________                 • Double click on your active connection. In my case it is the Wireless Network Connection 2.
    Index                    • Click on Properties.
1. Windows Hacking
                             • If File and Printer Sharing is selected, deselect it and click
  1. NetBIOS
 2. Cracking Windows
Passwords
 3. Countermeasures

2. Programming
1. Do I really need it?
2. Where should I start?
3. Best way to learn

3. Passwords
Hacking
1. Password Cracking
2. Phishing
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                                            Giggle Search

      How to hack with Gitesh and Arun




                                                                       Programming
                                                                         Do I really need it? & where should I start?
                            Do I Really Need It?
                            You might be asking yourself, do I even need to learn a programming language? The answer to that is both yes
                            and no. It all depends on what your goals are. Nowadays, with all the point and click programs out there, you
                            can be a fairly good ethical hacker without knowing any programming. You can do some effective hacking if you
                            understand all of the security tools very well. Even if you understand what’s going on in the background of
                            these programs, most people will still classify you as a script kiddie. Personally I think you should learn some
____________
                            programming. Even if it’s the very basics, it’ll give you a much better understanding of what’s going on. Also,
    Index                   once you learn how to program well, you’ll be able to develop your own exploits, which is great in many ways:
1. Windows Hacking          1. You’ll be considered an elite hacker.
  1. NetBIOS                2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The
 2. Cracking Windows        black hat would be able to take down thousands of machines before anyone discovers and patches the
Passwords
 3. Countermeasures
                            vulnerability.
                            3. You will feel so much more satisfied having created your own program or exploit. I promise you this.
2. Programming              So my advice is, don’t settle for being a point and click hacker. Take some time to understand even just the
1. Do I really need it?     basics of programming and an entire new world of hacking will open up to you.
2. Where should I start?    Where should I start?
3. Best way to learn        Many people finally decide that they are going to begin learning a programming language, but don’t know
                            where to start. I believe that before you begin to learn a programming language, you should first master HTML
3. Passwords                (HyperText Markup Language). HTML is part of what makes up all of the website pages you see on the internet.
Hacking                     HTML is very easy to learn and it’ll get you used to looking at source code.
1. Password Cracking                                                                       From there I would suggest starting your
2. Phishing
                            programming life with C. C is one of the most popular languages, and it is what makes up the majority of the
                            exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out
                            there today.
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                                                Giggle Search

      How to hack with Gitesh and Arun




                                                                         Programming
                                                                           Best way to learn
                            Best way to learn
                            So how should I go about learning the programming language of my choice?
                            1. Purchase a beginners book on your programming language. Before you choose the book, make sure you read
                            the reviews to make sure it’s a good choice.
                            2. It is important that once you begin learning the programming language through your book, you don’t take
                            big breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest
____________
                            of the book.
    Index                   3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying
1. Windows Hacking          what you learn.
  1. NetBIOS                4. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead
 2. Cracking Windows        embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find
Passwords
 3. Countermeasures
                            someone that can help you.
                            5. Join a programming forum. Search for a website on your programming language that has a large user base.
2. Programming              There will be many professionals on there that will be able to help you when you get stuck.
1. Do I really need it?     6. Practice. Practice Practice. Think of ideas for fun programs that you could make and program them!
2. Where should I start?
3. Best way to learn

3. Passwords
Hacking
1. Password Cracking
2. Phishing
Google– Internet Web Browser
                  http://www.how-to-hack-with-arun.com/                                                            Giggle Search

      How to hack with Gitesh and Arun




                                                                       Password Hacking
                                                                             Password Cracking
                            Before we get into cracking passwords with programs, I will explain a couple old-fashioned ways to obtain
                            someone’s password.
                            Shoulder Surfing
                            When you type in your password make sure there is no one behind you attempting to peak. If there is, turn
                            around and drop kick him/her in the face. No not really. Also, make sure you don’t keep any sticky notes laying
                            around that have your password or password hints on them.
____________
                            Guessing
    Index                   To prevent this attack from happening, never use a password like your birth date, your mother’s maiden
1. Windows Hacking          name, your pets name, your spouse’s name, or anything that someone may be able to guess.
  1. NetBIOS                Dictionary Attacks
 2. Cracking Windows        Dictionary attacks are very simple to prevent. Don’t use a password that is in the dictionary. Some people may
Passwords
 3. Countermeasures
                            think that if they use a word from the dictionary but replace most of the letters with a number, then they are
                            safe. They are not. There are 1337 speak dictionary’s out there too. Basically what 1337 speak is, is changing a
2. Programming              word like “animal” to 4n1m41. For a secure password, I would recommend using a phrase such as
1. Do I really need it?     “doyoulikecheese?
2. Where should I start?    Brute-force Attacks
3. Best way to learn        Brute-force attacks may be prevented by creating a very long password and using many numbers and odd
                            characters. The longer the password the longer it takes for the hacker to crack your password. If after a few
3. Passwords                days the hacker hasn’t been able to crack your password through a brute-force attack, then he is very likely to
Hacking                     just give up. Like I said in the dictionary attacks, creating a phrase for your password is your best option for
1. Password Cracking        staying secure.
2. Phishing
                            Phishing
                            Phishing attacks are very simple to avoid. When you are asked to put your personal information into a
                            website, look up into the URL bar. If for example you are supposed to be on Gmail.com and in the URL bar it
                            says something completely different like gmail.randomsite.com, or gamilmail.com, then you know this is a fake.
                            When you are on the real Gmail website, the URL should begin with www.google.com anything else is a fake.

Mais conteúdo relacionado

Destaque

Paradigmes de Programmation
Paradigmes de ProgrammationParadigmes de Programmation
Paradigmes de Programmationmahfoudsam
 
Vers des langues de programmation ?
Vers des langues de programmation ?Vers des langues de programmation ?
Vers des langues de programmation ?Nicolas Dubois
 
IPv6 tartalomszolgáltatóknak
IPv6 tartalomszolgáltatóknakIPv6 tartalomszolgáltatóknak
IPv6 tartalomszolgáltatóknakJános Pásztor
 
Les langages de programmation
Les langages de programmationLes langages de programmation
Les langages de programmationPierre Tran
 
7 étapes pour emmener la programmation dans la salle de classe
7 étapes pour emmener la programmation dans la salle de classe7 étapes pour emmener la programmation dans la salle de classe
7 étapes pour emmener la programmation dans la salle de classeMartine Paquet
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Ashley Wheeler
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Yoram Orzach
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Table ronde "Programmation pour enfants" Eyrolles / Mozilla
Table ronde "Programmation pour enfants" Eyrolles / MozillaTable ronde "Programmation pour enfants" Eyrolles / Mozilla
Table ronde "Programmation pour enfants" Eyrolles / Mozillawebfaster
 

Destaque (17)

Paradigmes de Programmation
Paradigmes de ProgrammationParadigmes de Programmation
Paradigmes de Programmation
 
Vers des langues de programmation ?
Vers des langues de programmation ?Vers des langues de programmation ?
Vers des langues de programmation ?
 
IPv6 tartalomszolgáltatóknak
IPv6 tartalomszolgáltatóknakIPv6 tartalomszolgáltatóknak
IPv6 tartalomszolgáltatóknak
 
Les langages de programmation
Les langages de programmationLes langages de programmation
Les langages de programmation
 
Apprendre à programmer avec scratch
Apprendre à programmer avec scratchApprendre à programmer avec scratch
Apprendre à programmer avec scratch
 
7 étapes pour emmener la programmation dans la salle de classe
7 étapes pour emmener la programmation dans la salle de classe7 étapes pour emmener la programmation dans la salle de classe
7 étapes pour emmener la programmation dans la salle de classe
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Table ronde "Programmation pour enfants" Eyrolles / Mozilla
Table ronde "Programmation pour enfants" Eyrolles / MozillaTable ronde "Programmation pour enfants" Eyrolles / Mozilla
Table ronde "Programmation pour enfants" Eyrolles / Mozilla
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Último

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

How to Hack!

  • 1. Google– Internet Web Browser http://www.google.com/ Giggle Search Google [ Hack The hacker before they hack you ]
  • 2. Your Page Name – Internet Web Browser http://www.google.co.in/group-d%504128%slide%index=114212%search/ Giggle Search Search results Who is a hacker? In the media the word "hacker" is often used, for what I would call a "cracker", someone that breaks into systems to damage it, or for the purpose of getting illegitimate access to resources. Now the question arises that what do you mean by hacking or cracker? Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
  • 3. Your Page Name – Internet Web Browser http://www.google.co.in/group-d%504128%slide%index=114212%search/ Giggle Search Search results Hacking Types Index Well there are many types of hacking but we will tell you about three of them which are as follows :-> 1. Windows Hacking 1. NetBIOS 2. Cracking Windows Passwords 3. Countermeasures 2. Programming 1. Do I really need it? 2. Where should I start? 3. Best way to learn 3. Passwords Hacking 1. Password Cracking 2. Phishing
  • 4. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Windows Hacking How to use Net Bios 1.Open command prompt ( start > run > cmd) 2. In the command prompt use the “net view” command Example: C:>net view 59.43.45.212 ____________ 3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios Index command which makes it possible to hack remote drives or printers. Example-1: 1. Windows Hacking C:>net use D: 59.43.45.212F 1. NetBIOS 2. Cracking Windows Example-2: Passwords C:>net use G: 59.43.45.212SharedDocs 3. Countermeasures Example-3: C:>net use I: 59.43.45.212Myprint 2. Programming 4. After succeeding your computer will give a message that “The command completed successfully“. Once 1. Do I really need it? you get the above message you are only one step away from hacking the computer. 2. Where should I start? [ad code=1 align=center] 3. Best way to learn Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. Y ou can copy files , music, folders etc. from victim’s hard- 3. Passwords drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. Hacking 1. Password Cracking You can access files folders quickly through “Command Prompt”. 2. Phishing
  • 5. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Windows Hacking Cracking windows Password 1. Download Ophcrack LiveCD 2. This program is now an ISO image. Just burn it with Nero or whatever you’re already using for burning images( for burning only ISO images download this burning program – ISORecorder ) 3. Now reboot your computer with the CD inside (if the CD will not boot you need to set the boot priority inside BIOS, so that the CD-ROM is the first in the list) ____________ 4. A menu like this will appear: Index 1. Windows Hacking 1. NetBIOS 2. Cracking Windows Passwords 3. Countermeasures 2. Programming 1. Do I really need it? 2. Where should I start? 5. Hit <ENTER> or wait six seconds to boot into the Ophcrack Graphic mode. If something goes 3. Best way to learn wrong and the screen won’t show the Graphics, restart and go into the Ophcrack Graphic VESA 3. Passwords mode. If this also fails, go into Ophcrack Text mode. Hacking 6. Once it ophcrack loads completely, it will automatically get your Windows password hashes and 1. Password Cracking begin the cracking process. 2. Phishing
  • 6. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Windows Hacking Countermeasures There are a couple things you can do to prevent NetBIOS and Ophcrack password cracking attacks. 1. To keep computer from being a target of NetBIOS attacks, simply disable file and printer sharing. In Windows Vista, it is disabled by default but you must do a little work in Windows XP. • Go to Start -> Control Panel -> Network Connections. ____________ • Double click on your active connection. In my case it is the Wireless Network Connection 2. Index • Click on Properties. 1. Windows Hacking • If File and Printer Sharing is selected, deselect it and click 1. NetBIOS 2. Cracking Windows Passwords 3. Countermeasures 2. Programming 1. Do I really need it? 2. Where should I start? 3. Best way to learn 3. Passwords Hacking 1. Password Cracking 2. Phishing
  • 7. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Programming Do I really need it? & where should I start? Do I Really Need It? You might be asking yourself, do I even need to learn a programming language? The answer to that is both yes and no. It all depends on what your goals are. Nowadays, with all the point and click programs out there, you can be a fairly good ethical hacker without knowing any programming. You can do some effective hacking if you understand all of the security tools very well. Even if you understand what’s going on in the background of these programs, most people will still classify you as a script kiddie. Personally I think you should learn some ____________ programming. Even if it’s the very basics, it’ll give you a much better understanding of what’s going on. Also, Index once you learn how to program well, you’ll be able to develop your own exploits, which is great in many ways: 1. Windows Hacking 1. You’ll be considered an elite hacker. 1. NetBIOS 2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The 2. Cracking Windows black hat would be able to take down thousands of machines before anyone discovers and patches the Passwords 3. Countermeasures vulnerability. 3. You will feel so much more satisfied having created your own program or exploit. I promise you this. 2. Programming So my advice is, don’t settle for being a point and click hacker. Take some time to understand even just the 1. Do I really need it? basics of programming and an entire new world of hacking will open up to you. 2. Where should I start? Where should I start? 3. Best way to learn Many people finally decide that they are going to begin learning a programming language, but don’t know where to start. I believe that before you begin to learn a programming language, you should first master HTML 3. Passwords (HyperText Markup Language). HTML is part of what makes up all of the website pages you see on the internet. Hacking HTML is very easy to learn and it’ll get you used to looking at source code. 1. Password Cracking From there I would suggest starting your 2. Phishing programming life with C. C is one of the most popular languages, and it is what makes up the majority of the exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out there today.
  • 8. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Programming Best way to learn Best way to learn So how should I go about learning the programming language of my choice? 1. Purchase a beginners book on your programming language. Before you choose the book, make sure you read the reviews to make sure it’s a good choice. 2. It is important that once you begin learning the programming language through your book, you don’t take big breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest ____________ of the book. Index 3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying 1. Windows Hacking what you learn. 1. NetBIOS 4. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead 2. Cracking Windows embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find Passwords 3. Countermeasures someone that can help you. 5. Join a programming forum. Search for a website on your programming language that has a large user base. 2. Programming There will be many professionals on there that will be able to help you when you get stuck. 1. Do I really need it? 6. Practice. Practice Practice. Think of ideas for fun programs that you could make and program them! 2. Where should I start? 3. Best way to learn 3. Passwords Hacking 1. Password Cracking 2. Phishing
  • 9. Google– Internet Web Browser http://www.how-to-hack-with-arun.com/ Giggle Search How to hack with Gitesh and Arun Password Hacking Password Cracking Before we get into cracking passwords with programs, I will explain a couple old-fashioned ways to obtain someone’s password. Shoulder Surfing When you type in your password make sure there is no one behind you attempting to peak. If there is, turn around and drop kick him/her in the face. No not really. Also, make sure you don’t keep any sticky notes laying around that have your password or password hints on them. ____________ Guessing Index To prevent this attack from happening, never use a password like your birth date, your mother’s maiden 1. Windows Hacking name, your pets name, your spouse’s name, or anything that someone may be able to guess. 1. NetBIOS Dictionary Attacks 2. Cracking Windows Dictionary attacks are very simple to prevent. Don’t use a password that is in the dictionary. Some people may Passwords 3. Countermeasures think that if they use a word from the dictionary but replace most of the letters with a number, then they are safe. They are not. There are 1337 speak dictionary’s out there too. Basically what 1337 speak is, is changing a 2. Programming word like “animal” to 4n1m41. For a secure password, I would recommend using a phrase such as 1. Do I really need it? “doyoulikecheese? 2. Where should I start? Brute-force Attacks 3. Best way to learn Brute-force attacks may be prevented by creating a very long password and using many numbers and odd characters. The longer the password the longer it takes for the hacker to crack your password. If after a few 3. Passwords days the hacker hasn’t been able to crack your password through a brute-force attack, then he is very likely to Hacking just give up. Like I said in the dictionary attacks, creating a phrase for your password is your best option for 1. Password Cracking staying secure. 2. Phishing Phishing Phishing attacks are very simple to avoid. When you are asked to put your personal information into a website, look up into the URL bar. If for example you are supposed to be on Gmail.com and in the URL bar it says something completely different like gmail.randomsite.com, or gamilmail.com, then you know this is a fake. When you are on the real Gmail website, the URL should begin with www.google.com anything else is a fake.