Hacking can be difficult and there are many different ways to hack and many different exploits to use. Hacking is neither defined nor limited by exploitation or exploration. Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack or you are sure it's worth it AND you won't get caught.
Hacking was primarily used for learning new things about systems and computing in general, 'in the good old days'. In recent years it has taken dark connotations and in general has been looked down upon. Likewise, many corporations now employ "hackers" to test the strengths and weaknesses of their own systems. These hackers know when to stop, and it is the positive trust they have built that earn them large salaries.
There is a major difference between a hacker and a cracker. A cracker is motivated by malicious (namely: money) reasons; a hacker is attempting to gain knowledge through exploration, at any cost and in any way - not always legal. Along with the permission, you NEED TO HAVE a written consent showing proof that you got permission from that person or company.
Steps
Tips
- Read books discussing TCP/IP networking.
- Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and requires a lot of professional knowledge to do anything serious in real environments.
- Although it's great there are many legal, safe training grounds available for anyone, there is a sad truth that you won't become any near "medicore" if you won't start doing illegal actions. You can't become anyone if you won't find real problems on real systems, with the real risk of getting caught. Keep that in mind.
- Remember, hacking is not about breaking into computers, getting well paid job, selling exploits on black market nor (especially) helping anyone to secure machines. You're *not* here to help admin do his job. You're here to become *best*. Keep in mind, if your target is not "being best", you won't ever become good. Of course, don't get cocky, don't think about yourself as the best of the best. Just make this your final target, you must become better and better. Every day you didn't learn something new, is a wasted day. You and only you counts - become best, at any cost. There are no half-ways, you must give full yourself.
- Using these tactics on a popular corporate or government computer is asking for trouble unless you're a professional hacker. Keep in mind there are people a bit more knowledgeable than you who are protecting these systems for a living. Once found, they sometimes monitor intruders to let them incriminate themselves first before legal action is taken. This means you might think you have free access after hacking into a system, when in fact, you're being watched, and may be stopped at any moment.
- Find information online related to hacking, or to even attend an "underground" hacking event, visit these sites:
- enigmagroup.org A legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials.
- insecure.org Hacking tools and other software.
- [1] Learn to hack, keep yourself safe, and many other useful computer skills.
- securityforest.com Tools, papers, exploits, and other reference material.
Warnings
- Misuse of this information may be a local and/or federal criminal
act (crime). This article is intended to be informational and should
only be used for ethical purposes and never for illegal purposes.
- Don't think for one second that just because you followed the steps means you will be a hacker. It takes years of study to be good.
- Do not delete entire logfiles, instead, just remove the incriminating entries from the file. What do you think would look more suspicious; logs with a few entries missing, or the entire log file destroyed? But other question is, if there is a backup logfile? What if they just look for differences and find the exact things you erased? Always think about your actions. Best thing is to delete random lines of log, including your.
- Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. A security professional that protects that system may be trying to track you or may be setting up a honeypot.
- If you aren't confident with your skills, stay away from breaking into government and military networks. Even if they have weak security, they have strong money to trace and bust you. If you do find a hole in such network, it's best to hand it to more experienced hacker who you trust, who can put these systems into good use.
- Although you may heard the opposite, don't help anyone to patch their programs or systems. This is considered extremely lame and leads to being banned from most real hacking communities. And if you would release private exploit someone found, he can become your enemy - and he's probably better than you are.
- Never do anything "for fun". Remember it's not a toy to hack into network, but it's a power to change the world. Don't waste that on childish actions. Again, don't change anything in the system to mark it as "owned" or anything that silly.
Things You'll Need
- A (fast operating) computer with a connection to the Internet.
- A proxy (Optional; The Onion Router is best choice here)
- An IP scanner
- Petraflops help
- Brute-force program. For MD5 hashes the best one is BarsWF
SOURCE : http://www.wikihow.com/
0 comments:
Post a Comment