Breaking

Thursday 27 July 2017

Thing you can you can find in " The Hacker’s Underground Handbook"

Hello guys! It's been a long since i wrote an article on this blog but it cool, well, In today's article i'm going to post some relevant article here for all my wonderful readers, and its all about some important tips i found in a book called  " The Hacker’s Underground Handbook" , i know most of you might have this wonderful hand book while some others will not be able to purchase this book...all the same it's good to have this awesome book as an Ethical Hacker...but the main reason am i will post some important tips about this is that some  may not be  able to purchase this or may not have access to this  book due to one or two reason..But worry not, because i will be posting some tips here....
Liability Disclaimer

The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively.

You implement the information given at your own risk.

Thing you can you can find in " The Hacker’s Underground Handbook"

Before we will start with the main topic for the day.Let take a look at some content or Topics in this wonderful book

Table of Contents/Topics
In the content table of this book he made mention of 
A. Introduction                                    
B. Programming
C. Linux
D. Passwords
E. Network Hacking
F. Wireless Hacking
G. Windows Hacking
H. Malware
I.Web Hacking   
J. Conclusion   

Under the Topic of the above mention he also wrote things under them like below
A. Introduction  :      
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer                                            

B. Programming
1. Do I really need it?
2. Where should I start?
3. Best way to learn

C. Linux  

1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux

D. Passwords   
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs

E. Network Hacking
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures

F. Wireless Hacking
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures

G. Windows Hacking
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures

H. Malware
1. Definitions
2. ProRat
3. Countermeasures

I.Web Hacking 
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion  

J. Conclusion  
1. Congratulations
2. Keep Learning
3. www.MrCracker.com


Introduction



How can I use this eBook?


By reading this article, you have taken your first step in the exciting process of becoming a Master Hacker. The knowledge you acquire from this eBook can be put to use in many ways:

• With the ability to think like a hacker, you’ll be able to protect yourself from hackers attacking you.

• You may wish to seek a career in Ethical Hacking – Usually hired by an organization, an ethical hacker uses the same tools and techniques as a hacker to find and secure vulnerabilities in computer systems.


• Show off your newfound skills to your friends, and just hack because you want to. It’s FUN!!

What is a hacker?

                     A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:

White Hat – These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.
These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.

Now if you’re thinking, “Oh boy! Being a black hat sounds awesome!”, Then I have a question for you. Does it sound cool to live in a cell the size of your bathroom and be someone’s butt buddy for many years? That’s what I thought.


Hacker Hierarchy

Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.

Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks

Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level

What does it take to become a hacker?

Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a lot. There is more than one way a problem can be solved, and as a hacker you encounter many problems. The more creative you are the bigger chance you have of hacking a system without being detected. Another huge

quality you must have is the will to learn because without it, you will get nowhere. Remember, Knowledge is power. Patience is also a must because many topics can be difficult to grasp and only over time will you master them


Now we are done with the Introduction part of The Hacker’s Underground Handbook.Let's Continue with the Programming Topic that's the chapter two of The Hacker’s Underground Handbook..

 

Programming

Do I Really Need It?

    You might be asking yourself, do I even need to learn a programming language? The answer to that is both yes and no. It all depends on what your goals are. Nowadays, with all the point and click programs out there, you can be a fairly good ethical hacker without knowing any programming. You can do some effective hacking if you understand all of the security tools very well. Even if you understand what’s going on in the background of these programs, most people will still classify you as a script kiddie. Personally I think you should learn some programming. Even if it’s the very basics, it’ll give you a much better understanding of what’s going on. Also, once you learn how to program well, you’ll be able to develop your own exploits, which is great in many ways:

1. You’ll be considered an elite hacker.

2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The black hat would be able to take down thousands of machines before anyone discovers and patches the vulnerability.

3. You will feel so much more satisfied having created your own program or exploit. I promise you this.


So my advice is, don’t settle for being a point and click hacker. Take some time to understand even just the basics of programming and an entire new world of hacking will open up to you.

Where should I start?

         Many people finally decide that they are going to begin learning a programming language,but don’t know where to start. I believe that before you begin to learn a programming language, you should first master HTML (HyperText Markup Language). HTML is part of what makes up all of the website pages you see on the internet. HTML is very easy to learn and it’ll get you used to looking at source code.

            From there I would suggest starting your programming life with C. C is one of the most popular languages, and it is what makes up the majority of the exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out there today.

 

Best way to learn

So how should I go about learning the programming language of my choice?
1. Purchase a beginners book on your programming language. Before you choose the book, make sure you read the reviews to make sure it’s a good choice.

2. It is important that once you begin learning the programming language through your book, you don’t take big breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest of the book.

3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying what you learn.

4. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find someone that can help you.

5. Join a programming forum. Search for a website on your programming language that has a large user base. There will be many professionals on there that will be able to help you when you get stuck.

6. Practice. Practice Practice. Think of ideas for fun programs that you could make and program them!



Now we are done with the Programming part of The Hacker’s Underground Handbook.Let's Continue with the Linux Topic that's the chapter three of The Hacker’s Underground Handbook..




Kindly Donate by clicking the Donate link below

 

2 comments:

  1. i would like to know how to hack in instagram

    ReplyDelete
    Replies
    1. How To Hack Instagram

      👇👇👇👇👇👇


      Android And IOS

      Steps

      1 :Go to www.instaleak.net

      2 :Click on 'Start Hacking.'

      3 :Enter the Instagram account username.

      4 :Click "I agree and continue."
      And Wait for a while, then simply click on 'Download'!

      With this you'll be able to successfully hack someone's Instagram account

      Delete