This information is
solely for guidance. Hacking is illegal.
LET'S
START
CHAPTER 0 =>
INTRODUCTION 2 HACKING ERA.
HACKING,
FIRST OF ALL WAT IS HACKING ? HACKING IS NOTHING BT BREACHING IN TO A COMPUTER OR IN A SYSTEM OR IN A SOFTWARE RELATED THING,IN VCH ACCESS IS NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A CYBER PLACE WHERE U DONT HAVE RIGHTS 2 ENTER.
IT IS D PERFECT ND MOST APPROPIATE DEFINETION OF HACKING...AGRY?
SEEMINTERNET IS NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992.
ACTUALY INTERNET HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A GENERAL HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN .
NOW U MAY THINK INTERNET IS NT VERY MUCH OLD.
NOW TYPES OF HACKERS---->MOST OF D PPL THINK THEY R OF 2 TYPES.ONE IS ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL HACKER..NO,DTS NT TRUE.
IN REALITY.HACKERS R OF 3 TYPES.
FIRST OF ALL WAT IS HACKING ? HACKING IS NOTHING BT BREACHING IN TO A COMPUTER OR IN A SYSTEM OR IN A SOFTWARE RELATED THING,IN VCH ACCESS IS NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A CYBER PLACE WHERE U DONT HAVE RIGHTS 2 ENTER.
IT IS D PERFECT ND MOST APPROPIATE DEFINETION OF HACKING...AGRY?
SEEMINTERNET IS NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992.
ACTUALY INTERNET HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A GENERAL HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN .
NOW U MAY THINK INTERNET IS NT VERY MUCH OLD.
NOW TYPES OF HACKERS---->MOST OF D PPL THINK THEY R OF 2 TYPES.ONE IS ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL HACKER..NO,DTS NT TRUE.
IN REALITY.HACKERS R OF 3 TYPES.
FIRST--->
WHITE HAT HACKERS--->THEY R ETHICAL HACKERS.THEY JUST
WORK AS A SECURITY EXPERT IN ANY BANK/SOCIETY/ONLINE COMPANY.
THEY JUST FIND VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R ETHICAL HACKERS ND NEVER HARM ANYTHING .
THEY JUST FIND VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R ETHICAL HACKERS ND NEVER HARM ANYTHING .
SECOND TYPE ---->
BLACK HAT HACKERS--->THEY R UNETHICAL HACKERS.THEY JUST
FUCK ANY ONLINE SYSTEM.THEY DO IT 4 FUN OR MONEY.IT MA SEEM VERY FUNNU BT APART
OF FUN ND MONEY THERE IS NO3RD ISSUE 4 VCH HACKING IS DONE
.
THIRD TYPE----->
THIRD TYPE----->
RED/GREY HAT HACKER--->THEY R D PERSON WHO DO HACKING 4
MONEY .IF U VL PAY THEM MONEY THEY VL SECURE YEW COMPANY IF U VL PAY THEM MONEY
THEY VL HARM ANY WEBSITE OR VATEVER U VL SAY 2 THEM 2 DO.
AS I TOLD U PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN PUBLIC LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS CRACKER.
WHO IS A HACKER---->NOW THESE LINES R GOING 2 SHAKE UR MIND ABOUT UR CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND FIND VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS GENERALY A PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A ONLINE SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2 SEARCH NEW HOLES.
AS I TOLD U PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN PUBLIC LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS CRACKER.
WHO IS A HACKER---->NOW THESE LINES R GOING 2 SHAKE UR MIND ABOUT UR CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND FIND VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS GENERALY A PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A ONLINE SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2 SEARCH NEW HOLES.
PREREQUISTS 2 LEARN HERE HACKING------->
if u r thinking vdout knowledge of launguages u cann't do
hacking then this is nt true .i know c,c++,v.b.,nd some java bt i have never
applied these.there4 all u need 2 learn hacking is ur dedication nd trust in me
.
trust me,if i vl be wrong anywhere then moderators nd piyush vl make dt thing right.oki....
D MOST ESSENTIAL THING,PLZ READ THIS TOPIC VERY VERY CAREFULLY-->
plz make urself very much sure that u r having winrar in ur computer.i vl give here many softwares .they vl be in rar files , having them is necessary.
nd plz plz plz upload a second windows in ur computer.make urself sure u r having windows xp in ur system nd have 2 different windows xp in ur system.
on first windows xp do ur neutral work nd on d second windows xp ,turn off firewall nd dont install antivirus.
here i vl give u some tools ,2 whom ur antivirus vl nt allow 2 work der4 plz have a second windows in ur computer.such a topic in vch u vl be needing 2 have second xp ,vl come in a week.der4 in next 1 week definetaly upload second windows on ur system .
let's start hacking now.introduction is over ..actually there r many things 2 explain bt i think it vl spoil d interest .
let's jump 2 d next chapter.
trust me,if i vl be wrong anywhere then moderators nd piyush vl make dt thing right.oki....
D MOST ESSENTIAL THING,PLZ READ THIS TOPIC VERY VERY CAREFULLY-->
plz make urself very much sure that u r having winrar in ur computer.i vl give here many softwares .they vl be in rar files , having them is necessary.
nd plz plz plz upload a second windows in ur computer.make urself sure u r having windows xp in ur system nd have 2 different windows xp in ur system.
on first windows xp do ur neutral work nd on d second windows xp ,turn off firewall nd dont install antivirus.
here i vl give u some tools ,2 whom ur antivirus vl nt allow 2 work der4 plz have a second windows in ur computer.such a topic in vch u vl be needing 2 have second xp ,vl come in a week.der4 in next 1 week definetaly upload second windows on ur system .
let's start hacking now.introduction is over ..actually there r many things 2 explain bt i think it vl spoil d interest .
let's jump 2 d next chapter.
EXPLOITING IP ADDRESS.
IP ADDRESS STANDS
for internet protocol address.
your ip address is d unique address on vch data r sent 2 you. ur internet service provider make hiMself sure dt datas r going 2 u bcoz he is sending data on d address specialy assigned 2 you.
getting ur own ip address---->
click on start,go on run,open run type cmd hit enter
a command prompt vl appear
write der
netstat -n
nd hit enter
a list vl appear..look at local address .d first local address is ur ip address. d second method 2 get ur ip address is open
whatismyip.com
on dis site u may easily know ur ip address.
writing netstat is more good dis command tells about all ip address vch r connected 2 u dis moment.
memorize dis small list
ftp---->21
smtp--->25
dns---->53
http--->80
https---->81
pop3---->110
telnet--->23
these r port no.s.
IP ADDRESS STANDS
for internet protocol address.
your ip address is d unique address on vch data r sent 2 you. ur internet service provider make hiMself sure dt datas r going 2 u bcoz he is sending data on d address specialy assigned 2 you.
getting ur own ip address---->
click on start,go on run,open run type cmd hit enter
a command prompt vl appear
write der
netstat -n
nd hit enter
a list vl appear..look at local address .d first local address is ur ip address. d second method 2 get ur ip address is open
whatismyip.com
on dis site u may easily know ur ip address.
writing netstat is more good dis command tells about all ip address vch r connected 2 u dis moment.
memorize dis small list
ftp---->21
smtp--->25
dns---->53
http--->80
https---->81
pop3---->110
telnet--->23
these r port no.s.
TRACING IP ADDRESS------->
i know many of u know dis thing,tracing some1 but i vl tell
u here many new nd exiting ways.
let's start.
first of all,vat is d need we have 2 trace any1?
see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp. thing is 2 get his ip address.
untill d moment u vl nt be knowing his id address how can u do anything?
here i vl teach u only tracing ip address. attacks vl come in future.
let's start ,be prepared 4 knowing many new ways 2 trace any1.
click on start>run>type cmd>hit enter
write
tracert websitename
let's start.
first of all,vat is d need we have 2 trace any1?
see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp. thing is 2 get his ip address.
untill d moment u vl nt be knowing his id address how can u do anything?
here i vl teach u only tracing ip address. attacks vl come in future.
let's start ,be prepared 4 knowing many new ways 2 trace any1.
click on start>run>type cmd>hit enter
write
tracert websitename
ex:-
tracert google.com
hit enter
now some information vl come automatically
u vl see written der[mind written in blue clr]
tracing route 2 wensite name[ip address of d website]
nd then many more things.
yes nw u successfully got d ip address of d website.it is really very easy.
d line vch i hv written in blue clr vl be d first line automatically came nd in dt first line u may see d ip address of d website.now in second line u vl see written.
over a maximum hops of 30
tracert google.com
hit enter
now some information vl come automatically
u vl see written der[mind written in blue clr]
tracing route 2 wensite name[ip address of d website]
nd then many more things.
yes nw u successfully got d ip address of d website.it is really very easy.
d line vch i hv written in blue clr vl be d first line automatically came nd in dt first line u may see d ip address of d website.now in second line u vl see written.
over a maximum hops of 30
explanation of hopes nd dis thing------------>
see,wenever u open any website u just send some data 2 dt
website 4 vch dt website replies u nd den u send some data gain nd dis process
continues ,nw suppose dt after of writing tracert google.com ,ur data packets
reached 2 google.com ,now google vl try 2 reply u,bcoz google is a very big
website ,it take help of many servers ,replies 4m google vl come 4m dese
servers .
now look at ur command prompt.der u can see written tracing vd a maximum of 30 hopes.here u r getting ip address of d servers 4m vch datas r processing 2 u .
here u vl see * dis sign in some places,here they have fixed firewall,so dt u cann't attack easily.
written * means der is a firewall,bcoz tracing any1 is very easy,der4 de webmaster fix some firewalls so dt no1 ud be able 2 attack on dem properly.
i think u ppl r geting me.
now look at ur command prompt.der u can see written tracing vd a maximum of 30 hopes.here u r getting ip address of d servers 4m vch datas r processing 2 u .
here u vl see * dis sign in some places,here they have fixed firewall,so dt u cann't attack easily.
written * means der is a firewall,bcoz tracing any1 is very easy,der4 de webmaster fix some firewalls so dt no1 ud be able 2 attack on dem properly.
i think u ppl r geting me.
A GENERAL MISCOnCEPTION------>
I KNOW DIS THING IS NT RELATED 2 IP ADDRESS bt it is very
much essential 2 tell here ,see most of u think on internet we cann't get
highly sensitive information..dis is nt true.on internet many person has posted
rapidshare accounts vch u need very much bt d problem is u donno where it is?d
same thing is vch other things also.on internet many ppl has written many
highly secret things about a website bt we donno dt .
here all u have 2 make urself clear that on internet u can get highly informative topics also.oki?
let's moov 2 our original place.
see,
nslookup command wen u applied ,
u may see written der .u r nt authentized 2 dis route.
is der something wrtten like it?
i know der is.now u can think d importaince of dis command.
now 4 getting ip address nd 4 getting many sensitive information about a website u may also use these websites.
open
samspade.com
nd open
dnsstuff.com
nd open
whois.net
on these websites just enter d name of any website nd dis website vl give u each nd every inforamtion about dt website.u may also write down here any ip address nddese sites vl tell u each nd every thing about dt website.
it is really very cool....plz open al d websites nd try 2 get d inforamtion of orkut.com nd google.com nd ur college's website.u may easily know ur college is taking who's help 2 give u internet .
u may also know wen a website has been made nd each nd everything about dt website.
try on orkut nd google nd ur clg website now.
here all u have 2 make urself clear that on internet u can get highly informative topics also.oki?
let's moov 2 our original place.
see,
nslookup command wen u applied ,
u may see written der .u r nt authentized 2 dis route.
is der something wrtten like it?
i know der is.now u can think d importaince of dis command.
now 4 getting ip address nd 4 getting many sensitive information about a website u may also use these websites.
open
samspade.com
nd open
dnsstuff.com
nd open
whois.net
on these websites just enter d name of any website nd dis website vl give u each nd every inforamtion about dt website.u may also write down here any ip address nddese sites vl tell u each nd every thing about dt website.
it is really very cool....plz open al d websites nd try 2 get d inforamtion of orkut.com nd google.com nd ur college's website.u may easily know ur college is taking who's help 2 give u internet .
u may also know wen a website has been made nd each nd everything about dt website.
try on orkut nd google nd ur clg website now.
gathering information is d first job of a hacker.untill d
moment u vl nt be aware about each nd everyting about a website or about a ip
address u cann't do anything...der is a name of gathering information thing and
dt isreconnaisance
i think on a website now u ppl easily can do reconnaisance.
it all was about tracing a website nd 4 gathering inforamtion about a website .
now jump 2 learn how 2 trace a person.
mind it till now u did trace onlu a website.
tracing a person is also easy.no.no..it is very easy.
see, first of all we will learn 2 trace a person who has sent u a mail thenwards we vl learn 2 trace a person vd whom u r doing chatting.
i think on a website now u ppl easily can do reconnaisance.
it all was about tracing a website nd 4 gathering inforamtion about a website .
now jump 2 learn how 2 trace a person.
mind it till now u did trace onlu a website.
tracing a person is also easy.no.no..it is very easy.
see, first of all we will learn 2 trace a person who has sent u a mail thenwards we vl learn 2 trace a person vd whom u r doing chatting.
TRACING A PERSON WHO HAS SENT U AN E-MAIL
open ur mail box ,open any e mail.now click on reply .now click on show original.
view whole d data written der.now u may find dt person's ip address...in show original column u may find dt person ip address but if some1 has sent u mail 4m gmail.com then u cann't get his ip address 4m dis mehod.
actually gmail uses https[secured=s]
there4 u cann't get his id addres.
but there is an way 2 trace g mail also.wait i am writing.
now dis trick is 4 tracing gmail,yahoomail,hotmail nd 4 all mail services.
4m dis technique[vch i am going 2 write down]u can trace all email's ip address.
first of all open
readnotify.com
register der.
now wenever u vl be needing to trace any1 then compose a mail 2 him nd in email to section write
victim'semailid.rednotify.com
nd send him d mail.wen he vl read ur mail ,a mail 2 ur readnotify wil go automatically nd by opening ur readnotify account der u can see dt person' ip adderess.
actually readnotify sends an automatic generated image vd ur mail nd dis hidden image gives u victim's ip address.
dis technique is very good.
HOT SHOT---------------->
AFTER
OF TRACING A PERSON 4 KNOWING WHERE HE IS,ND 4 KNOWING IN VCH COUNTRY IN VCH
STATE ND IN VCH CITY HE IS?
JUST OPEN
ip2location.com
here on dis website put d ip address of dt person nd u vl get 2 know his physical appearance.dis thing is also possible 4m telnet bt leave dt .dt is very complicated.
JUST OPEN
ip2location.com
here on dis website put d ip address of dt person nd u vl get 2 know his physical appearance.dis thing is also possible 4m telnet bt leave dt .dt is very complicated.
---------------------->TRACING
A PERSON VD WHOM U R CHATTING<-----------------
well,
if u r chatting vd a person then simpally ask his ip address if he tels then its ok. bt vat if he does nt tell?hehehe LOLZ
anyway
see,here r some cases.some different cases nd u must hv 2 do different operation vd different massengers.
wait i am writing.
well,
in dis section first of all i ud like 2 remind u d working method of netsta -n command vch i wrote previously.
netstat command gives u d information of all the communication vch u r doing vd internet.i mean,suppose dt if u r connected 2 orkut nd g mail nd any porn site at a single instant then netstat tells u about all they 3 server's ip address.
this moment there r many massengers vch ppl use ,,,4 example--->icq massaneger,msn,yahoo massenger,g talk massenger nd many more ,ppl also use some sites like meebo.com 2 use masenger.
now der r some cases
well,
if u r chatting vd a person then simpally ask his ip address if he tels then its ok. bt vat if he does nt tell?hehehe LOLZ
anyway
see,here r some cases.some different cases nd u must hv 2 do different operation vd different massengers.
wait i am writing.
well,
in dis section first of all i ud like 2 remind u d working method of netsta -n command vch i wrote previously.
netstat command gives u d information of all the communication vch u r doing vd internet.i mean,suppose dt if u r connected 2 orkut nd g mail nd any porn site at a single instant then netstat tells u about all they 3 server's ip address.
this moment there r many massengers vch ppl use ,,,4 example--->icq massaneger,msn,yahoo massenger,g talk massenger nd many more ,ppl also use some sites like meebo.com 2 use masenger.
now der r some cases
-------------------->CASE [1]<------------------------
if u r chatting 2 some1 on icq massenger then here is d working method of icq massenger
you------>ur freind
ur freind---->you
well,this thing makes very easy 2 trace some1 while chating on icq massenger,wen u r chatting vd him then b4 of starting chatting just open run type cmd hite enter nd write
netstat -n
mind it ,till now u hv nt done started chatting vd him,now many ip address will come,simpally note down them somewhere,
now start chatting vd him,
nd while chatting vd him
again open run,type cmd hit enter nd type
netsta -n
now u vl see,a new id address.
bingo,now u hv got d ip address of ur freind
if u r chatting 2 some1 on icq massenger then here is d working method of icq massenger
you------>ur freind
ur freind---->you
well,this thing makes very easy 2 trace some1 while chating on icq massenger,wen u r chatting vd him then b4 of starting chatting just open run type cmd hite enter nd write
netstat -n
mind it ,till now u hv nt done started chatting vd him,now many ip address will come,simpally note down them somewhere,
now start chatting vd him,
nd while chatting vd him
again open run,type cmd hit enter nd type
netsta -n
now u vl see,a new id address.
bingo,now u hv got d ip address of ur freind
------------------->CASE [2]<----------------------
CHATTING ON YAHOO,MSN,G TALK MASSENGER
these massengers works in dis way,
you------->massenger's server------>ur freind
if u vl do d previous operation then u vl find massenger's ip addres.
here,u may use social eengineering,
social eenginering is d next chapter bt here a small introduction.
social eengineering mans making some1 fool nd hacking him,
in dis masenger case[mind it most of d massenger follow dis way]simpally say ur freind 2 send a file or 2 recieve a file,if he agrred then just do previous operation.
when he vl send u d file then it vl nt come thru massenger ,it vl directly come 2 u nd by writing netstat -n,u may find 1 more ip address dt is of ur freind.
or der's a 1 more method,u may say him 2 mail you or write a mail 2 him nd use readnotify thing,vch i told previously nd now wen he vl send u mail or wen he vl reply 4 ur mail,u can get his ip address.
confused
CHATTING ON YAHOO,MSN,G TALK MASSENGER
these massengers works in dis way,
you------->massenger's server------>ur freind
if u vl do d previous operation then u vl find massenger's ip addres.
here,u may use social eengineering,
social eenginering is d next chapter bt here a small introduction.
social eengineering mans making some1 fool nd hacking him,
in dis masenger case[mind it most of d massenger follow dis way]simpally say ur freind 2 send a file or 2 recieve a file,if he agrred then just do previous operation.
when he vl send u d file then it vl nt come thru massenger ,it vl directly come 2 u nd by writing netstat -n,u may find 1 more ip address dt is of ur freind.
or der's a 1 more method,u may say him 2 mail you or write a mail 2 him nd use readnotify thing,vch i told previously nd now wen he vl send u mail or wen he vl reply 4 ur mail,u can get his ip address.
confused
---------------------> CASE [3]<-------------------------
TRACING SOME1 WHILE CHATTING ON MEEBO.COM TYPE ONLINE MASSENGERS.
,
here's no method 2 trace him apart of saying him 2 send a mail 2 you or u may send him a mail nd wen he vl reply u vl get or u may say him 2send u a file.
dt's it.
well, tracing some1 is nt a big job nd u can do it very easy.
TRACING SOME1 WHILE CHATTING ON MEEBO.COM TYPE ONLINE MASSENGERS.
,
here's no method 2 trace him apart of saying him 2 send a mail 2 you or u may send him a mail nd wen he vl reply u vl get or u may say him 2send u a file.
dt's it.
well, tracing some1 is nt a big job nd u can do it very easy.
der r some more commands 2 find ur id address nd der r many
more things about ip address,der r 4 different types of ip addresses,
der is subnet id nd hostid named things exits,u can open a website by writing dt ip address only in d url nd der r some hexatransFer,qustra transfer named things also exits but trust me de things r of no use.
u may get each nd every information abour ur ip address by doing dis
open run ->type cmd
write ipconfig/all
dis will tell u ur smtp,dhcp information nd many things,writing only ipconfig in command prompt vl also give u many information nd writing inconfig/series will also give bt netstat is fine.
only ipconfig/all is a good syntax 2 give u ur onw all informations
tracing ip address is completed now.
i m nt writing divisiond nd more useless stuffs about ip address,all d things i told previously r enough 4 ip address bt still if u ppl want 2 know more about ip address then write in mine help desk,i vl tell u .i m waiting 4 u ppl reply der.
we,, we will moov back 2 d learn doing proxy[changing ur ip address] again but after of next 3 chapters,i m not writing proxy nowbcoz 2 clear u d purpuse of doing proxy is very imp.
in next chapters u ppl vl learn cracking,social eenginering nd hacking in 2 other person's comuter .after of these 3 chapters we will study 2 do proxy.
be ready freinds,we r moving 2 hack now.
der is subnet id nd hostid named things exits,u can open a website by writing dt ip address only in d url nd der r some hexatransFer,qustra transfer named things also exits but trust me de things r of no use.
u may get each nd every information abour ur ip address by doing dis
open run ->type cmd
write ipconfig/all
dis will tell u ur smtp,dhcp information nd many things,writing only ipconfig in command prompt vl also give u many information nd writing inconfig/series will also give bt netstat is fine.
only ipconfig/all is a good syntax 2 give u ur onw all informations
tracing ip address is completed now.
i m nt writing divisiond nd more useless stuffs about ip address,all d things i told previously r enough 4 ip address bt still if u ppl want 2 know more about ip address then write in mine help desk,i vl tell u .i m waiting 4 u ppl reply der.
we,, we will moov back 2 d learn doing proxy[changing ur ip address] again but after of next 3 chapters,i m not writing proxy nowbcoz 2 clear u d purpuse of doing proxy is very imp.
in next chapters u ppl vl learn cracking,social eenginering nd hacking in 2 other person's comuter .after of these 3 chapters we will study 2 do proxy.
be ready freinds,we r moving 2 hack now.
CHAPTER
2
- SOCIAL ENGINEERING<------------------
social enginering is a very small chapter,it is nt only
related 2 internet arena bt it is also related 2 ur social nd general life.u do
flirt vd a girl dt is social engineering.saying lies 2 some1 4 making ur own
work succeed is also social engineering.social engineering is nothing else but
2 do some crooking vd some1 4 making ur own work completed.suppose dt der is
some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his
password simpally click on forgot password,a general person generally put very
comman question here vch is very easy 2 guess if u r his freind,social
engineering is a very imp. thing.
let me tell u d first story of hacking.
it held thru social engineering.
in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee.
ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world.
let me tell u d first story of hacking.
it held thru social engineering.
in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee.
ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world.
just look at d whole incident,he just thought nd used a
small whistle.
it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work.
suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password.
it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work.
suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password.
------>STANDARD
DEFINITION OF SOCIAL ENGINEERING<------------------------- --
[1]social engineering is d human side of breaking in to a corporate network
companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone.
sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim"
on dese places everyday thousands of ppl give der credit cards information easily,
der r 2 types of social engineering
[first]HUMAN BASED SOCIAL ENGINEERING
IT IS CATEGORIZED IN 2 DESE PARTS
-->impersonation
--->posing as imp. user
--->3rd person approcah
--->technical support
--->COMPUTER BASED SOCIAL ENGINEERING<-------------
these r classified in dese
-->mail/im attachments
-->pop up windows
--->sweepstakes
--->spam mail
d second chapter is over now.
wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering.
mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering.
we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.keep waiting,
[1]social engineering is d human side of breaking in to a corporate network
companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone.
sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim"
on dese places everyday thousands of ppl give der credit cards information easily,
der r 2 types of social engineering
[first]HUMAN BASED SOCIAL ENGINEERING
IT IS CATEGORIZED IN 2 DESE PARTS
-->impersonation
--->posing as imp. user
--->3rd person approcah
--->technical support
--->COMPUTER BASED SOCIAL ENGINEERING<-------------
these r classified in dese
-->mail/im attachments
-->pop up windows
--->sweepstakes
--->spam mail
d second chapter is over now.
wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering.
mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering.
we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.keep waiting,
CHAPTER 3
- SEARCH
ENGINE OPTIMIZATION<-------
nowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER.
THESE R D NEXTCHAPTERS.
LET'S START learning seo.
Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives u more than 100000 pages nd it is very much difficult 2 find ur exact needed thing in a single shot.SEO gives u d exact thing vch u need exactly.let's start SEO
go here,http://newyears.noo.com/noo/m/brows e...wevent/id/518/
nowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER.
THESE R D NEXTCHAPTERS.
LET'S START learning seo.
Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives u more than 100000 pages nd it is very much difficult 2 find ur exact needed thing in a single shot.SEO gives u d exact thing vch u need exactly.let's start SEO
go here,http://newyears.noo.com/noo/m/brows
plz mind d words,written in red colours.nw
here u can see written dis line
"New Years Eve at Pink Elephant"
this is dCOLOR="RED"] "title"[/color] of dis web page
d link vch i posted above is d "url"
nd all d data vch has written der is "text"
now,suppose dt u vant 2 search anything on google nd u want 2 search 4 forum then simpally type
inurl:forum
i mean wenever u hv 2 search anything in url ,write
inurl:desired thing
wenever u hv 2 search in text write
intext:desired thing
wenever u hv 2 search anything in text write
intext:desired thing
well, i know most of u r knowing these things already bt d ppl who r nt knowing these,plz try 2 understand dis thing,vdout SEO,u ppl vl feel a lot of problem while hacking a website 4 sql injection,searching cracks on internet nd 4 deirectry transeversal ,it is very much essential thing
well,
here u can see written dis line
"New Years Eve at Pink Elephant"
this is dCOLOR="RED"] "title"[/color] of dis web page
d link vch i posted above is d "url"
nd all d data vch has written der is "text"
now,suppose dt u vant 2 search anything on google nd u want 2 search 4 forum then simpally type
inurl:forum
i mean wenever u hv 2 search anything in url ,write
inurl:desired thing
wenever u hv 2 search in text write
intext:desired thing
wenever u hv 2 search anything in text write
intext:desired thing
well, i know most of u r knowing these things already bt d ppl who r nt knowing these,plz try 2 understand dis thing,vdout SEO,u ppl vl feel a lot of problem while hacking a website 4 sql injection,searching cracks on internet nd 4 deirectry transeversal ,it is very much essential thing
well,
now do some practice vd d thing vch i wrote here
suppose dt u want 2 search d new year celebration then simpally write in google
intitle:new year celebration
if u vant 2 search any websit's login page then type
intext:login inurl:website address
nd search 4 .
now suppose dt u want 2 find anything in a specific website then use dis syntax
site:website fulll address d thing vch u want2 search in dt website
dis syntax is really very good.
NOW SUPPOSE DT U WANT 2 SEARCH ANY PDF TYPEFILE OR doc type file then simpally use dis syntax
filetype:pdf
d next thing in SEO IS
RELATED NAMED STUFF,u know dt yahoo is a search
suppose dt u want 2 search d new year celebration then simpally write in google
intitle:new year celebration
if u vant 2 search any websit's login page then type
intext:login inurl:website address
nd search 4 .
now suppose dt u want 2 find anything in a specific website then use dis syntax
site:website fulll address d thing vch u want2 search in dt website
dis syntax is really very good.
NOW SUPPOSE DT U WANT 2 SEARCH ANY PDF TYPEFILE OR doc type file then simpally use dis syntax
filetype:pdf
d next thing in SEO IS
RELATED NAMED STUFF,u know dt yahoo is a search
D SUMMARY OF D CHAPTER
[1]4 searching something in url use"inurl:"
[2]4 srching in title use"intitle:"
[3]4 srhcing in text use "intext:"
[4]2 get a file of specific type use "filetype::
[5]2 restrct ur search in a website use "site:websiteaddress urdesired seacrhing item"
[6]2 get information about a website use"info:website full addres"
[7]2 get related type sites type"related:website ful address"
[8]2 nt appear a syntax in ur srch results use a minus[dash] sign.
to d person who r reading this type thing first time,i m requsting them 2 do very much practice vd all of dese syntaxes.
a good person always searches by dese techniques.u can find many books related on google ,i hv read all of dem nd thenwards i hv written all d results driven 4m dem.
do a hell of practice plz
[1]4 searching something in url use"inurl:"
[2]4 srching in title use"intitle:"
[3]4 srhcing in text use "intext:"
[4]2 get a file of specific type use "filetype::
[5]2 restrct ur search in a website use "site:websiteaddress urdesired seacrhing item"
[6]2 get information about a website use"info:website full addres"
[7]2 get related type sites type"related:website ful address"
[8]2 nt appear a syntax in ur srch results use a minus[dash] sign.
to d person who r reading this type thing first time,i m requsting them 2 do very much practice vd all of dese syntaxes.
a good person always searches by dese techniques.u can find many books related on google ,i hv read all of dem nd thenwards i hv written all d results driven 4m dem.
do a hell of practice plz
Very good article sir see also my blogs : -
ReplyDeleteAmazon Customer Service
Amazon Customer Service Numbers
taco bell menu
kfc menu
chicken recipes
chicken breast recipes
chicken thigh recipes
whatsapp status hindi
special tips
Here are the best attitude status for girls…..visit, like and share
ReplyDeleteGirls attitude status in hindi
Sir can u please teach me hacking
ReplyDeleteSir plz can u teach me hacking
ReplyDelete