hacking_ how to hack - ultimate hacking - harry jones

Upload: abu-tamam

Post on 06-Jul-2018

249 views

Category:

Documents


5 download

TRANSCRIPT

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    1/38

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    2/38

     

    A Basic Guide of How to do Hacking – 

    for Beginners

     

    Table of Contents 

    Introducing Computer

    Hacking………………………………………………………….3

    History of 

    Hacking………………………………………………………………………...4

    Security Threats that may affect Your Computer

    Systems…………………………….5

    Understanding basics of tools for ethical hacking and skills required by the

    Hacker………………………………………………………………………………

    6

    Social Engineering behind

    Hacking……………………………………………………….8

    Learn measures to crack Password of an

    http://www.guru99.com/how-to-hack-using-social-enginering.htmlhttp://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.htmlhttp://www.guru99.com/potential-security-threats-to-your-computer-systems.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    3/38

    Application……………………………………9

    Understanding Trojans, Viruses and

    Worms…………………………………………….11

    Simple guide to Networks

    Snifffer………………………………………………………..13Learn How to Hack different

    Networks………………………………………………….15

    DoS

    Attacks………………………………………………………………………………

    15

    Wireless

     Networks…………………………………………………………………………..18Web

    server………………………………………………………………………………….

    Website………………………………………………………………………………

    Linux

    System…………………………………………………………………………………

    25

    Understanding SQLInjection………………………………………………………………26

    Extract of the

    Book………………………………………………………………………….26

    http://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    4/38

    © Copyright 2016 - All rights reserved.

    In no way is it legal to reproduce, duplicate, or transmit any part of this document in

    either electronic means or in printed format. Recording of this publication is strictly

     prohibited and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved.

    The information provided herein is stated to be truthful and consistent, in that any

    liability, in terms of inattention or otherwise, by any usage or abuse of any policies,

     processes, or directions contained within is the solitary and utter responsibility of the

    recipient reader. Under no circumstances will any legal responsibility or blame be

    held against the publisher for any reparation, damages, or monetary loss due to the

    information herein, either directly or indirectly.

    Respective authors own all copyrights not held by the publisher.

    Legal Notice:

    This book is copyright protected. This is only for personal use. You cannot amend,

    distribute, sell, use, quote or paraphrase any part or the content within this book 

    without the consent of the author or copyright owner. Legal action will be pursued if 

    this is breached.

    Disclaimer Notice:

    Please note the information contained within this document is for educational and

    entertainment purposes only. Every attempt has been made to provide accurate, up to

    date and reliable complete information. No warranties of any kind are expressed or 

    implied. Readers acknowledge that the author is not engaging in the rendering of 

    legal, financial, medical or professional advice.

    By reading this document, the reader agrees that under no circumstances are we

    responsible for any losses, direct or indirect, which are incurred as a result of the use

    of information contained within this document, including, but not limited to, —errors,omissions, or inaccuracies.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    5/38

    Introducing Computer Hacking 

    What is computer hacking?

     

    In the cyber security era, the professional who is able to find out the weakness in the system and can exploit it to

    accomplish his objectives is called as Hacker and this process is called Hacking.

     

     Now a days, people think that hacking is just hijacking any account of exploiting any website, although it is also a

     part of hacking but it can’t be considered as main part of hacking.

     

    So now need to think that what exactly hacking is and what should anyone do to become a professional hacker.

    Self-interest is the main point to become the hacker and you should always be keen to learn and create something

    new.

     

    Here are the different kinds of hackers in the cyber security world.

     

    Script Kiddies

    Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. Now it is

    easy to say that the person, who doesn’t know the working of the system can also exploit it with the already

    available tools.

     

    White Hat Hacker

    There are some good guys in the hacking world who work for defensing are White Hat Hacker. Their main

     purpose of is too find the security flaws and fix them which in turn improve the security of the system. They work 

    for an organization or individually to make the cyber space more secure.

     

    Black Hat Hacker

    There are some really bad guys too who have malicious intent are called cyber criminals. They are known as

    Black Hat Hacker. They have the objective to steal money and infect systems with malware. They use their 

    hacking skills for illegal purposes.

     

    GreyHat hacke rs

    There are some hackers whose work depends on the situation. They may work offensively or defensively. They

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    6/38

    are actually don’t have bad intentions but still they like to break into third-party system for fun only or to just show

    the existence of vulnerability.

    Hacktivists

    Few hackers are there who use their hacking skills to protest against injustice. They attack a targeted system or 

    website to bring the justice. One of the popular hacktivists is Anonymous and RedHack 

     

    History of Hacking

     

    In this computer security world, who specially focuses on the security mechanisms of computer and network 

    system is called hacker. Mass media and popular culture are there who seek access despite these security

    measures can be included in the list of hackers who always tries to strengthen such mechanisms. Although media

     portrays the ‘hacker’ as a villain, but some of part of the subculture see their objective is to correct security

     problems and they take this word in positive sense.

     

    The name White Hat has been given to the ethical computer hackers, who use hacking in a helpful way. For 

    Information security field white hackers have become mandatory part. They work under the guidelines which

    suggest that the breaking into other people’s computer is bad, but it is still an interesting activity to discover and

    exploit security mechanisms and break into computers that can be done ethically and legally.

     

    The subculture around such hackers is known as network hacker subculture, or computer underground. This

    subculture surrounding was initially developed in context of phreaking during 1960s.

     

    The word “hacker” was first used in the title “The Hacker Papers” in an article in the month of August in 1980 in

    Psychology Today (With commentary by Phillip Zimbardo). It was the part of the discussion held by Stanford

    Bulletin on the addictive nature of computer use. In the 1982 film Tron, Kevin Flynn clarifies his intentions to break 

    into ENCOM’s computer system by saying that “I have been doing a little hacking here”. He uses the software

    called CLU to do this activity. Although inn 1983, hacking was already been used as computer jargon in the sense

    of breaking the computer security but public awareness was not there about such an activity. This matter came

    into public awareness at the time of the release of the film WarGames that year, which raised the belief that

    computer security hackers could be a threat to national security.

     

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    7/38

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    8/38

      Phishing  Spyware  Key loggers  Distributed Denial of Service Attacks  Un-authorized access to computer systems resources such as data

      Denial of Service Attacks To get rid of above mentioned threats, a company has to take some security measures.Some of them are defined below: 

    To protect against the Virus, Trojans, Worms etc, a company should not onlyimplement the anti-virus in their computer systems but also should avoid the use of external storage devices and visiting websites which can download unauthorized

     programs.

    Authentication methods should be implemented to get rid of unauthorized access of the computer system.

    To protect against the denial of service attacks, the intrusion detection systems can beimplemented.

     

    Understanding basics of tools for ethical hacking and skills required by the

    Hacker

    To achieve your desired goals within available time and resources you need to havethe skill. You need to grow your skills to get your job done. These skills includelearning how to solve the problem, how to program, keen to learn new things, use theinternet and take the advantage of existing tools

    What is programming language:

    The computer programs can be developed with the help of programminglanguage only. The computer programs have the wide range which can work othe operating systems or can operate on the network. 

    What is the need of learning computer programs:

      Hackers are the problem solver and tool builders. So it is verynecessary for a hacker to learn the programming to solve different

     problems.  To automate several things, a hacker must need a computer 

     programs. But these programs the job can be done in minutes whichusually take lot of time.  Programs can help you identify and exploit programming errors.

      There are already open source programs available over theinternet, so you don’t have to invent the wheel every time.

    There are different programing languages which can be useful for hacking.

    http://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    9/38

    HTML: This language used to write webpages. It is a cross platform programming language and this can be used for web hacking. Hackers canuse this language to write the code which can be used to exploit andidentify weaknesses in the code.

    JavaScript: This language is the client side scripting language and it is

    also a cross platform programming language. This language can be used toread the saved cookies and perform cross site scripting.

    PHP: This language is the server side language. This is also a cross platform programming language. This is the most commonly used programming language which can be used to make the changes in the webserver settings and make the server vulnerable to the attacks.

    SQL: This language is used to communicate with the database. It is also across platform language. This language can be used to bypass webapplication login algorithms, to delete data from database.

    C & C++: These languages come under high level programminglanguages. These are also cross platform languages. They are mainly usedfor writing exploits and shell codes etc.

    JAVA, C Sharp, VB: The use of these languages depends on your scenarios. Although these are also cross platform language exceptVB(Visual Basic).

    Different Hacking Tools:

    There are so many hacking tools available in the market. Few of them are given

     below:

    NMAP Project: This tool is used to explore networks and performsecurity audits.

    John the Ripper: This is a password cracking utility and it works cross platform.

    SqlMap: It automates the process of detecting and exploiting SQLinjection weaknesses. It is an open source and works cross platform.

    Nessus: This tool can perform different activities like password

    dictionary attacks, Denial of service attacks Etc. 

    Social Engineering behind Hacking

    The human brain is not safe from hacking. Social engineering is the art of trickingusers so that they perform certain harmful activities or reveal confidentialinformation to attackers.

    What is Social Engineering?

    As previously informed, Social engineering is an art which allows manipulation of computing system users in order to reveal secret data or information in order to gainaccess to un-authorized computer systems. This may include certain activities likeexploitation of human kindness, greediness, and his or her eagerness to get full

    http://www.guru99.com/how-to-hack-using-social-enginering.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    10/38

    authority to access restricted buildings or installing software’s from backdoor. Thisscience proceeds with following steps:

      Gathering Information about the victim: This is the foremost steptaken to get maximum information about the guilty victim. This informationcan be collected from company’s web sites, publications and many-a-time

    from the users itself.  Layout design: Hacker makes a plan to execute well-planned attack 

      Get desired Tools: This step includes gathering computer  programs, which will later be used to execute the attack.

      Final Attack : After step 1-3, hacker attacks the desired system.

      Gather required information: Data or secret information iscaptured detailing about the company owner’s pet names, date of birth,foundation day etc. in order to guess the password.

     

    Social engineering uses below mentioned techniques, to hack the required data

    or information.

    Exploiting Informally : It has been found that people are less suspicious of their fellow mates while looking for hacker’s .Hacker or an attacker can introduce himself or herself before applying social engineering on attack. Attacker is one amongst thegroup of friends you are surrounded with while taking meal, or may be your smokingcompanion or may be chit chat friend .This allows attacker to get information from

    you.

    Attacker tries to get your personal information by asking questions like where your first date was or when it was. How many kids you have and what are the names etclike tricks are used to grab your identity and later on your password hints. Computer User easily answers these basics questions as a friend .Hacker after gettingsuccessful answers to these questions tries hands on your Gmail accounts, or anyother confidential account.

     Asking Details in forcibly circumstances: Most of the People fear from heatedarguments that sometimes occur with the unknown people working around them.Attacker or Hacker creates circumstances where ,an unpleasant communication iscreated between the user and attacker and user ,then is forced to forge his details inorder to avoid any legal actions .This technique mostly used to refrain from securitycheck points. 

    Phishing: well-known and most common technique used by attacker to get

    information secretly from the user. This method is tricky and is bets for getting datafrom the users computer system. Attacker indulges in social engineering willimpersonate authentic website and then ask user to confirm his or her confidential

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    11/38

    details like account number, credit card number etc. like things. Hacker mostly usesPhishing to get credit card

     

    Tailgating: This technique involves chasing user when he or she enters the passwordrestricted zone.

     Making human more curious about things around him: This technique excites user for clicking some site or ads which inject virus through flash drive .This is a kind of 

     bate system where attacker throws a chocolate and user picks it up. This Flask Driveis mostly plugged in by the user or sometimes injected with a auto run option whichasks users to open a file like Employees Revaluation Report 2014.docx, a fake nameto infected file. 

    Exploiting human by money: This technique lures user with fake promises of giving

    money by filling online form asking details of credit card, debit card like confidentialfigures 

    Learn measures to crack Password of an Application

     We are all aware of the fact that data or Information is one of the most valuableresource for creating either data base or any secret file of an operation. This

    confidential data is kept secret and can be accessed only by the legitimate people.Authentication systems mainly provide security to this data.

    Password cracking is the process of getting access to un-authorized data using

    common passwords or techniques that can be easily guessed by the attacker.

    We are listing below some of the techniques that can help hacker in cracking password:

    Password Cracking

     Password cracking is a process or we say an art of getting access to un-authorizedsystems by means of cracking password using authentication method. Number of techniques is used to get this thing possible. Password cracking process mainlyworks on principle of comparing password from the stored list of words or thistechnique uses algorithms which create passwords matching data entered by thehacker. 

    Password strength

    This is a general term, which most of the people are familiar with. Password strengthis the method of obtaining efficiency of password in order to limit or resist theattacker from hacking your details. Computer system analyzes password strength by

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    12/38

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    13/38

    Techniques to crack PasswordAlthough, Hackers use number of techniques in order to crack passwords, we are listing down some of the most

    commonly used techniques:

    Dictionary attack  – This technique compares user’s passwords the word list stored in Dictionary.

    Brute force attack  – This technique is almost similar to the fir st one but differs fromthe fact that Brute force attacks uses algorithms which compounds alpha-numericcharacters with symbols in order to get passwords for attacking user computer .Taking an example password of some ABC user is of the value “Yogesh” which canalso be tried as y0ge$H using this technique.

    Rainbow table attack  –Method uses hashes which have been pre-computed in the

    system.Taking an example of password of value ”Yogesh hashes.” This method willcreate another data file containing Yogesh hashes passwords commonly used by theusers. This hash can later be compared with the data base stored in the system inorder to get the password.

    Guess – This method is basic and does not contain any science behind it. Commonlyused Passwords like 1234, qwerty, password, admin etc. are set as default .Many

     people keep them as same carelessly and give hacker an open chance to getinformation.

    Spidering – It has been seen that many organizations keep passwords related to their companyinformation, which is readily available on either their websites or on socialnetworking sites like facebook, twitter etc. Spidering captures information throughthese sources to get word lists, which is then used to create password using first twomethods. 

    Tools used to crack Password

     Many software developers have designed software programs to crack password from

    the users computer system. Many sites are available like www.md5this.com usingdifferent techniques to crack passwords. Especially this site, using rainbowtechnique. Many Tools are available in the online market. Listed down few of themwhich are commonly used by the Hacker: 

    John the Ripper Software Tool

    This tools uses command prompt in order to get passwords. Mostly suited to professional who are fluent enough

    working with commands. A well-defined wordlist is used to crack passwords. Hacker can easily get this program

    for free but only purchase that needs to be made is for the word list .Alternatively this software offers a free

    wordlist that can also be used.

    Cain & Abel Software Tool

    This tool runs only on windows platform in order to crack passwords for user personal accounts, Microsoft Access

    http://www.md5this.com/http://www.guru99.com/the-secret-to-social-network-marketing.htmlhttp://www.guru99.com/the-secret-to-social-network-marketing.htmlhttp://www.md5this.com/http://www.guru99.com/the-secret-to-social-network-marketing.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    14/38

     passwords; networking sniffing etc.like secret accounts. This tool is based on Graphical user Interface and is so

    user-friendly ad easy to use. This Tool being simple and easy to use, commonly used by newbies and script kiddies.

    Ophcrack Software Tool

    This tool works on Windows cross platform in order to crack password .Methodology used by the tool is rainbow

    tables .Compatible with windows, Linux and Mac Operating Systems. Many features integrated in these amazing

    tools makes it a all-time favorite of millions of hackers.

     

    Understanding Trojans, Viruses and Worms

    Hacker is not beginners and is mostly skilled with complete knowledge of  programming and computer networking. These skills are often used to get access touser computer systems. The main objective of stealing is to get sensitive informationof the company and cause harm to their computer controlled data. This objective can

     be achieved by Trojans, viruses and worms like threats detailed below in the

     book.This paragraph will detail you on some of techniques that Hacker can use togain access to users system.

    http://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.htmlhttp://www.guru99.com/unix-linux-tutorial.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    15/38

    Understanding Trojan horse?Trojan horse program attacks users computer system from a remote location.

    This program impersonates to be useful to the user. Once user is convinced andinstalls this fake program, hacker from remote location can easily install harmful

     payloads, and get an entry through backdoors, in order to install other extra and evenunwanted applications that will harm user’s company and etc

    Trojan horse threat gives attacker permission to do certain things like :

      This allows attacker to use user’s system as Botnet where he or shecan perform attacks related to distributed denial of services.

      This threat can damage user’s system by complete crash, blue scree

    etc like unpredictable things.  Trojan horse allows hacker to steal sensitive data related to

     passwords, details of credit card etc.  May Modify stored files of user’s computer   May cause accidental theft of Electronic money by allowing un-

    authorized access to money transactions  This threat may Log keys which user presses and sends the details to

    attacker sitting at remote location. This method can be used to get user ids,user name, passwords and other sensitive information.

      Users computer screen shot can be viewed by the hacker.  Browsing history can be downloaded

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    16/38

    Understanding worm?Worm is a malware program that runs on users computer system and repeat

    itself frequently over the computer networking system. Worm threat can be used by the hacker in order to accomplish below mentioned tasks;

      This threat may Install backdoors on users or victim’s computer.This backdoor, then creates zombie computers which sends spam mails or  perform unwanted actions like distributed denial of service etc. However,this backdoors can be prevented from spreading using other malware

     programs.  Worms consumes a considerable amount of bandwidth while

    replicating itself and so slows down the networking system.

      This worm can carry pre-installed harmful payload codes.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    17/38

    Understanding virus?Virus is again a dreadful program which runs on computer and attaches itself 

    like a suicide bomber in order to spoil programs and files without asking for

    user’s consent. Viruses like worm consume a lot of space, increases CPUProcessing time and hence delays the processing tasks. Program affected by virus is

    called infected one.Hacker use Virus to execute certain operations: 

    In order to get personal data like user id and passwordsAnnoying messages pop up to disturb user May corrupt stored data of your computer May log al keys pressed by the user in order to fetch password relateddetails.

     

    All these threats Trojan Horse, Worm and Virus involves social engineeringtechniques which deceives users to disclose harmful files which otherwise ,look alike normal ones. Once user open this files, execution of virus code takes placeresulting in harmful consequences set by the hacker.

     

    Network Sniffer Guide

    The main communication channel of the computer system is the network, from where

    it sends the data over the network to internal or external world. The networks can belocal area network (LAN) or Wide Area Network (WAN). Now the programs called

     Network Sniffer are to capture low level package data that is been transmitted over the network. Hacker can analyze this data to get the useful information such as ID,Account number, password.

    Here are some common network sniffing techniques and tools which we are

    describing for you:

    Introduction of IP and MAC address:The Acronym of IP is Internet Protocol Address. All the hardware which are used tocommunicate through network such as computer, printer etc. are being uniquelyidentified by IP address. There are two versions of IP addresses have beenintroduced

    IPv4 Address: This version uses 32 bit numbers. This address has been formatted into four groups of numbers separated by dot. It contains minimum value as 0 andmaximum value as 255.

    For Example: 234.214.9.10

    IPv6 Address: This uses 128 bit number. IPv6 has been developed because of the

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    18/38

    heavy growth of the internet. IPv6 addresses are formatted in the groups of sixnumbers separated by colon. The numbers in the groups are written as hexadecimaldigits.

    For Example: 2002:0db6:85a3:0000:0020:8a2e:0310:7334

    MAC (Media access control) addresses are basically used to uniquely identifynetwork interfaces at the physical layer of the network. It usually embedded intonetwork card. MAC address can also termed as Physical address.

    The command to get all these addresses on the window Operating system is

    Ipconfig /all

     

    What is Network Sniffing?

    The communication of the computers can be done by broadcasting the message by onecomputer over the network and the other computer with same range of IP addressreceives that message over the internet.

     Now network sniffers intercept these data packages and fetch the useful informationfrom it. Specialized software programs or hardware are being used to do thisactivity.

    So the main purpose of Sniffing is:

    To capture sensitive data such as account informationTo capture files being transmitted over the internet.Monitor and temper chat messages.

    Protocols that are defenseless against sniffing are listed below:

       NNTP  Telnet  FTP

      HTTP  SMTP  Rlogin  POP  IMAP

    In case user sends logging in details in text format, then chances of causing threatincreases. 

     Network sniffing is of two types: Passive and Active Sniffing. Lets understand thesetwo by the means of hubs and switches.

    A hub transmits data sent by one port to all other connected ports except the one who has sent the

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    19/38

    packet. The recipient port whose IP address matches with the sender, responds actively to the request raised by

    the sender port. This process is simple but all ports which are connected in between gets the message details. Hub

    works at physical layer of OSI Model.

    A switch on the other hand works on a different principle. It tracks IP/MAC

    addresses and takes data to the physical ports. Broadcasting message is first sent

    to the physical port where IP/MAC address configurations are matched in order tolocate the exact recipient computer. This means packet or message is received only atthe dedicated terminal. Switch operates at Layer no 2 and 3 of OSI Model.

    Passive sniffing basically involves intercepting packages sent over a hub whereActive sniffing does the same but on switch.

     

    Learn How to Hack different Networks-DoS Attacks, Wireless Networks, Web

    server, Website and Linux System Hacking techniques ------will go step by step andsee How to hack these networks.

     

    Dos Attacks

    Any business can be expanded and promoted by means of internet. Cutting off Internetis a kind of big loss to the company because Internet and Computer networks play acrucial role in promoting any business category. Especially online shopping businesscannot think of surviving for a second without proper internet connection. But there isone flaw behind these online shopping sites, users need to fill their credentials inorder to make successful payment. This gives attacker a opportunity to hack thedetails plus the company secret information .DoS is an acronym for Denial of Serviceattack which denies legitimate users to access any private resource like accessingwebsite of the company.

     

    What is DoS Attack?

    DoS or Denial of Service does not allow any stranger to access web site/app/service

    etc or like confidential details. Thisattack sends multiple requests to server at the

    same time and then attack the target web server or any other resource, which makes

    server weak enough to handle all requests in one go. This may decrease the

     processing speed of server or sometimes may lead to severe crash.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    20/38

    Dos Attacks are available in various types 

    Mainly 2 types of Dos attacks have been observed so far.

      DoS –This attack is intended for single host

      Distributed DoS – this attack targets same victim and mostly, attack is done by considerable number of compromised machines in order to createa flood of data packets in the network.

     

    See How DoS Attack-There are 5 common types that can be used to attack DoS 

    Ping of DeathCommand basically sued to check availability of the resources for the network is called ping command .This tool

    first sends small data packets to the network resources. Packet length is usually above the maximum length set by

    TCP/IP protocols ,which is then fragmented by TCP/IP into small packets .So, it is clear that this tool sends data o

    larger length so, system may crash,boot,rebooat or freeze in the middle

    Smurf 

    This attacking tool uses large-sized Internet Control Message Protocol (ICMP) which can ping traffic of target

    system at Internet Broadcast Address. Target or intended victim gets the spoofed IP address. All mails or replies

    sent by the target system are sent to the Hacker. It has been aid that a single Internet Broadcast Address can

    handle maximum of 255 hosts at the same time, and smurf attack amplifies this single host to almost 255 times.

    This slows down the processor and takes network to a stage when it stops working.

    Buffer ove rflow

    Buffer is awell-known term used for temporary data storage and is mostly located inside RAMwhich holds data

    firmly so that CPU can edit or modify it before copying it back to the disc. Although Buffers are limited in size.

    This attack overloads buffer more than its actual capacity. This results in overflow and so buffer is forced to

    corrupt the data, it is holding previously .Sensing emails with more than 256 character size is a perfect example of 

     buffer overflow attack.

    Teardrop

    This is another attack which uses large sized data packets. TCP/IP fragments these packets by breaking them intosmaller pieces which are later assembled again at receiver host. The Hacker mostly edits and manipulates the

    transmitting packets in order to overlap one over the other .When target system tries to reassemble the packets,

    system may crash resulting in potential DoS attack.

    SYN attack 

    SYN is an acronym for Synchronize attack which uses a unique three-way handshake technology in order to

    establish strong communication by the help of TCP protocol. SYN attack floods the victim’s system with

    incomplete messages which force target to use new memory resources which he or she has never used, ultimately

    leading to DoS attack.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    21/38

    Attacking toolsSome of the Tools that attacker can use in order to perform DoS attacks.

      Nemesy – this tool generates multiple packets randomly and iscompatible with Windows based operating system. This tool detects evenanti-virus as a virus because of fits nature and properties.

      Land and LaTierra – this tool is for IP spoofing and openingconnection based on TCP protocol

      Blast – this tool is one of the basic tools amongst DoS List.

      Panther- this tool floods target computer or network with UDP packets.

     

    Botnets – this tool comprises of compromised computers supportinginternet in order to perform Distributed DoS attack. 

    Wireless Network 

    Wireless networks, as we are all aware of ,are the networks that sues radio waves inorder to link one or more devices ,that can be accessed in the radius of router’stransmission zone, which makes them more prone to the attacks. Implementation ismostly done in the first layer that is physical layer of OSI Model. You might haveseen Hotspots in public places like hospitals, airports, restaurants, parks etc.

     

    How user access this Wireless Networks

    Initially user need to have a wireless network enabled device which can be anything like your Laptop, tablet, smart

     phones etc.in the transmission radius of Wi-Fi access point. Many a times, when you switch on your Wi-Fi

    network, you can see the list of networks that are available to the current network. These networks are mostly

     password protected and in case, you have not set any password, then any one, who comes under Wi-Fi

    transmission circle can access Internet without any hassle of entering password. However, in case network is

     password protected, no one can use Internet without filling in the password details.

     

    Authentication of this Wi-Fi Network 

    Wi-Fi network can be accessed by anyone coming under its radius, but if your network is protected, then users are

    restricted to access without asking password from you or hacking it using unfair means. Various authentication

    techniques are employed to make this network safe..

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    22/38

    WEPWEP or Wired Equivalent Privacy, compatible with IEEE 802.11 WLAN standards. Main goal of setting this

    authentication is to give security similar to that of wired networks. WEP use encryption and decryption to code and

    decode your information while sending from one end and receiving at other.

    Authentication techniques

    Open System Authentication or we call itOSA – this methods permits station based on access policy

    configured previously.

    Shared Ke y Authentication or SKA – This method first sends a challenge to the requesting station and the

    challenge is an encrypted one. Station then encrypts the challenge using key and then respond to it .Access is

    granted only when the encrypted challenge is matching with the AP value, else stands null and void.

    This paragraph will guide attacker to find the weakest area of wireless network 

    security system in order to hack the data or information shared or connected to thewireless terminology.

     

    Weakness of WEP

    WEP no doubt, is a strong piece of network but has some flaws and threats.

      Packet Integrity check using CRC32 ,Cyclic Redundancy Check 

    :Attacker can easily crack this code using at least two packets. Encryptedstream bit and checksum can be modified by the hacker easily and so,authentication system accepts packets from him or her without any hassle.This creates a feasibility of entering into users network. Hacker can take

     benefit of this system.

      Stream ciphers are created using RC4 encryption algorithm:

    Stream cipher is an input value made from initial value (IV) and aconfidential or secret key. It has been assumed that the expected length of theIVis24 bits and that of a secret key may be 40 or 104 bits long.Making a total

    length of almost 64 bits in case secret key is 40 bit or 128 bits long whensecret key is 104 bits .The lower the value of secret key is ,more are thechances of its cracking..

      In case Initial value is weak and cannot be encryptedsufficiently,chances of attack by the hacker increase.

      Since WEP is passwords based; making it more prone or vulnerableto dictionary attacks.

      Key management system not implemented properly: In case key is of long length, then its management becomes a tough task. WEP shouldincorporate a central key management system in order to make it stronger andmore secure.

      Possibility of using Initial values again and again makes this system

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    23/38

    more vulnerable to attacks. 

    These weaknesses forced user to switch to WPA authentication system.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    24/38

    WPAWPA or we call it Wi-Fi Protected Access, security protocol designed by Wi-Fi Alliance in order to remove

    weaknesses observed by the users in WEP. This System supports 802.11 WLANs standards, and uses longer 

    Initial values of almost 48 bits in place of 24 bits used in WEP uses. Temporary encryption packets increase

    security system.

    This WPA Protocol was developed to eliminate weaknesses of WEP ,but still has some limitations

      Attacker can easily broke collision avoidance implementationsystem of WPA

      Most susceptible to denial of service attacks  This protocol uses Pre-shares keys which in term use passphrases

    and if user selects any Weak passphrases then, chances of dictionary attacks

    increases.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    25/38

    Cracking Wireless NetworksCracking WEP

    Cracking is again a form of attacking or hacking which is done to get access to unauthorized information .WEPcracking in context to WEP means exploiting networks that use WEP systems in order to levy control systems for 

    security reasons. Two different cracking types are defined under WEP

    Passive cracking – This cracking is difficult to detect and has no effect until or unless it affects or cracks WEP

    security details.

    Active cracking –This cracking severely affects network traffic load. Can bedetected easily and is found to be more effective than Passive cracking.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    26/38

    Tools that ease WEP Cracking  Aircrack  – used as a powerful cracking tool for network sniffer and

    WEP .  WEPCrack  – Open source program developed for cracking 802.11

    WEP standard or secret keys, implements FMS attack.

      Kismet- this tool can detect visible and hidden wireless networks,sniffer packets and even intrusions.

      WebDecrypt – This cracking tool uses active dictionary attacks inorder to crack WEP keys, creates its in-house key generator, implementing

     packet filters.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    27/38

    Cracking WPAWPA as already informed used pre-shared keys almost 256 in numbers, or may use passphrase in order to provide

    authentication. Weak or Short length passphrases are more susceptible to dictionary and other attacks which can

    later be used to hack passwords.

    Tools used for Cracking WPA.

      CowPatty – this cracking tool cracks pre-shared keys (PSK)employing brute force attack.

      Cain & Abel – this cracking tool decodes captured files fromsniffing programs like wireshark. Captured files may be WEP or WPA-PSK encoded .

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    28/38

    Type of Attacks that user systems are more vulnerable to :Sniffing – this technique intercepts in between packets which are

    transmitted by the sender from one end , in order to retrieve data usingtools like Cain & Abel.

    MITM or Man in the Middle Attack  – this attaching technique involves

    special tactics to capture system’s sensitive information.

    Denial of Service Attack  – the Attacking technique denies access to

    legitimate users for using network resources.FataJack  tool is mostly used

    in this type of attack.

    How to crack keys of Wireless network WEP/WPA

     

    Hacker can easily crack WEP/WPA keys in order to gain permission to access wireless networks. This act

    requires hardware and software resources, not only this patience are a must thing. This attack will be successful or 

    not, mainly depends on the fact hoe active the user is when attacker is planning to target him or her.

    Basic Information is given below to start with cracking.

    Backtrack 

    Security operating system running on Linux platform, developed on the top of Ubuntu. This OS includes multiple

    security tools in order to gather information, know vulnerabilities and plan exploiting other things.

    List of backtrack tools includes;

      Aircrack-ng  Metasploit  Ophcrack   Wireshark    NMap

     

    Cracking is a slow yet smart process and requires lot of patience while using above listed tools. One more tool, that

    is definitely the perfect tool to backtrack data is a hardware one called wireless network adapter ,which hasenough capability of injecting packets .

     

    Basic Information about Hackers still to access Backtrack.

      Backtrack OS:Hacker should be aware of this operating system.

      Try to limit your range to the radius of Wi-Fi transmission. Incase user or target computer comes under the Wi-Fi zone, hacker can easilycrack it.

      Hacker should be fluent enough with working on Linux basedoperating systems and Aircrack  and many other scripts.

      Patience is the foremost thing, cracker should work with:

    http://www.wireless-warrior.org/detail/780/fatajack.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    29/38

    Cracking keys may sometimes be easy or sometimes take a bit of time inorder to implement number of factors on cracking. This may be a timeconsuming task and should e handled with patience by the hacker.

     

    Hacking web Server

    More Customers are now switching to online services or shopping like activities.This force them to enter their credit card ,email address and other details into thewebsite f the company. This makes their personal data more vulnerable andsusceptible to attacks. Many Defaced websites are available on the Internet whichfools people in the name of religion or political ideologies etc.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    30/38

    Vulnerabilities to Web Server ProgramsWeb server is and internet program that mainly stores data files as web pages and make them available

    through any network or internet. This program needs both hardware and software tools.Hacker usually

    targetssoftware programs to hit or get unauthorized access to the server. Attackers can take advantage of some of 

    the most vulnerable threats highlighted below.

      Default settings – Default user id and passwords are easy to guessand can be cracked bythe attackers. Default settings sometimes ask attacker 

     performing actions like running commands which are easy to exploit.

      Misconfiguration: Web server programs may be misconfigured interms of configuringoperating systems and other networks .Many other configuration which allow user to process commands that can be dangerous

    in case user have not set a strong password.  Web programs are vulnerable to operating system and web

    server bugs :In case these bugs are detected by the hacker, then it really

     becomes easy for him or her to access the unauthorized systems. 

     Not only the above mentioned threats, but Lack of security policy and procedures can affect hacker gaining

    unauthorized access: Practices such as updating software for antivirus, web server and patch up with operating

    system may lead attacker to gain access.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    31/38

    Web Servers can be of different types  Apache –most common web servers type being used on the internet.

    This type is compatible with cross platform but installed on Linux OS. PHPwebsites are mostly hosted on these servers.

      IIS or Internet Information Services ,developed by Microsoft andruns smoothly on windows OS .This type is the second web server typemostly used after Apache on the internet. Sites hosted under this type aremostly asp and aspx.

      Apache Tomcat – Sites hosted on this type are mostly Java (jsp)websites.

      Other web servers –Many other web servers are available

    including Novell's Web Server, Lotus Domino of IBM etc.

    http://www.guru99.com/java-tutorial.htmlhttp://www.guru99.com/unix-linux-tutorial.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    32/38

    Attacks that can affect Web ServersDirectory traversal attacks – This most prominent attackmainly exploits the bugs present in web

    server in order to gain access to unauthorizedfiles and documents, not available in public domain. Incase any hacker is able to get access to the unauthorized area, he or she can hack all sensitive

    information like downloading sensitive information from the target system, executing server 

    commands or installing malware software.

    Denial of Service Attacks – This attack leads of crash of web server  program and may disable system to legitimate users.

    Hijacking Domain Name System – This technique involves changing

    DNS settings and making data or files available to the attacker’s web

    server. Traffic which was basically directed to your system will be routedto another or some wrong web server.

    Sniffing – Data which has not been coded or left Unencrypted and sentover the transmission network may be interrupted to get access to webserver by unfair means.

    Phishing –This attach enables hacker to pretend same or impersonate other website and hack details from the target system by asking personal details.Users unaware of this attack may get trapped and login details related tohis or her id, passwords, credit card etc.

    Pharming – This attack shortens DNS server in order to change the routeof malicious site.

    Defacement – As the name suggest, in this type attacker modifies thecompany websites by adding his or her details, images, in order to forgetarget system.

     

    What will happen in case, attacker gets successful

     

    Company or organization’s reputation is at risk :In case hacker edits the company’s details and try to include malware information, thenother people apart from the target customer will see those details and can bemisguided.

      Malicious software may force virus, Trojan or botnet software etc.to enter into user computer system.

      Hacker act may force user to Compromise data resulting in

    fraudulent activities: This act can push a great loss to the user plus to thecompany for whom he or she is working.

     Tools that attacker can use to hack Web server

     

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    33/38

      Metasploit – this open source tool is used for developing, testingand many-a-times exploiting code. Web servers vulnerabilities can also bediscovered using this tool and even exploiting things in order to compromisethe server.

      MPack  – This PHP written, web exploitation tool, is backed by

    database engine called MySQL. In case attacker is able to compromise webserver with the help of MPack, network traffic will be transferred to fake or malicious websites.

      Zeus – This powerful tool gives you boot or zombie by convertingyour compromised computer.Bot is basically a compromised computer designed to perform attacks based on internet whereas botnet is a collectiveterm for compromised computers. Attacker may use Botnet in denial of service attack or for sending spam E-mails.

      Neosplit – this tool performs simple operations like installing

     programs, deleting programs, replicating etc. 

    Hacking website

    More and more people are now becoming use to Internet .Manufacturers, businessman, shareholders, etc like high grade officials are creating their websites inorder to spread awareness about the company and their offering. This has forcedthem to seek web developers in order to make user-friendly applications that allow

    user and the company to interact and solve most of the queries online only. Hackersmainly attack these sources to get information about the active users of a company.Taking an example of shopping site, where you select the list of items you want to

     buy and then company website asks you to enter your basic details like name, user name, Id, password and then while payment, they ask you for credit card details .Incase web developer has used poorly written or weak codes for running thisapplication, then hacker may attach and get the desired information about you fromthe company’s website.

     

    Web Applications and threats associated with it.

    Website or any web application works on the very famous model of client-server,wherein server contains complete details of database access along with the logicwith which the company is running. This server mostly runs on a web server. Comingon client side, client application on the other hand runs on web server of client itself .

    Web applications are mostly written in Java, C# and VB.Net, PHP, ColdFusionMarkup Language etc. like languages and MySQL, MS SQL Server, PostgreSQL,SQLite etc. database engine

    It has been found that most of web applications are accessible to the public via internet because they are hosted on

     public servers. This increases their vulnerability to attacks because of wider spectrum.

    http://www.guru99.com/java-tutorial.html

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    34/38

     

    Hacking Linux System

    Linux is the operating system which is mainly used for web servers. This operatingsystem is the only one which is open source means it provide the code to the users.

    So as compare to other operating system Linux is less secure operating system because the attackers can read its code and can find out the weaknesses in the code,so by exploiting the code un-authorized access can be gained by the attackers.

    There are many distributions of Linux based operating system such as Redhat, Fedoraand Ubuntu etc. but among them Linux is less secured operating system because thevulnerabilities can be found from it by reading the code of this operating systemwhich can motivate the attackers to gain un-authorized access of the code. Thisoperating system can run on servers, desktop, tablets etc.

    Linux Hacking Tools :

    There are so many Linux Hacking tools available over the internet. Some of them aredescribed here:

    Nessus: To scan the configuration settings, patches, network relatedinformation this tool can be downloaded from the internet.

    NMap: To monitor the number of users and processes running on theserver, this tool can be utilized. This tool can also monitor the ports of the

    servers.SARA (Security Auditor’s Research Assistance): The audit the networ against threats such as SQL Injection, XSS etc, and this tool can beutilized.

     

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    35/38

    Understanding SQL Injection This threat mainly bypasses logging in algorithms, sabotage data etc.

      Denial of Service Attacks – This attack has been discussedmultiple times in our book and the goal of this threat could be to denylegitimate users access to the resource.

      Cross Site Scripting XSS – The objective of this threat is to executethe code on the client side browser.

      Cookie/Session Poisoning – The attackers want to get unauthorizedaccess and they perform this activity by modifying the cookie/session data.

      Form tempering – The objective of this threat is to temper the

     prices of the product on e-commerce website so that cheap price productscan be ordered by attackers.

      Code Injection –Injecting the programming code like PHP is themain motive of this threat so that this code can run on the server side so thatsensitive personal data can be revealed.

      Defacement – This threat’s objective is to repoint all the pages of a particular website on the single site which contains attacker’s message.

     

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    36/38

    Extract of the Book 

    One of the criminal defense attorneys of California defines Hacker as “A particular 

     person who delights in having an intimate knowledge of the internal workings of a

    system, computers and computer networks in particular” This definition describeshacker with two different perspectives. One calling hacking as an illogical act of 

    entering other computer system while the other one calls it an extra-ordinary talent of 

    a person who can think different and out of the box.

    Our ebook describes certain methods to hack DoS, Wireless systems, Websites, Web

    Pages, Linux OS etc, and it is advised to use them for betterment.

    Hacking is good practice, if done in right direction. Professional hackers are needed

    in almost every field like military to track useful details of the enemy headingtowards the war with country. Many Government officials find this, a blessing but

    can really be harmful, if used against the country. For running any business, if hacker 

    finds that his system is being hacked, then he or she can fix the issue in the middle

    itself and protect business image from ruining in public.

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    37/38

    Personal Thank You from Me!

    Hello, my name is Brian founder of SS publishing, and I personally want to thank you

    for reading my book. It really means a lot!

    We are a small and locally owned business. Our goal is for you to be completely

    satisfied with your purchase and your reading experience, if for any reason this is not

    the case we would appreciate it if you would give us a chance to address your 

    concerns BEFORE leaving feedback. Simply log in to our Facebook group, and

    address your concerns and we will do our best to address your issue.

    https://www.facebook.com/sspublish/

    ***Also, within the Facebook group you will find many weekly free book deals as

    well as new release events, so make sure you press LIKE in our page.

     

    *If you’ve had a pleasant reading experience (*and we think this is likely the case*),

    we would be grateful if you would leave us feedback on amazon.

    https://www.facebook.com/sspublish/

  • 8/16/2019 Hacking_ How to Hack - Ultimate Hacking - Harry Jones

    38/38

    Thanks again and I look forward to doing business with you again soon…

    Brian S.