Tải bản đầy đủ (.pdf) (1,292 trang)

Hacking bootcamp how to hack computers basic security and penetration testing david maxwell

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (5.1 MB, 1,292 trang )


HackingBootcamp



LearntheBasicsofComputerHacking

Morediscountedbooksatkindlebookspot.com


TableOfContent

Introduction
Chapter1:Hacking–GeneralInformation

Chapter2:ProgrammingSkills

Chapter3:Passwords

Chapter5:PenetrationTesting

Conclusion




BonusBooks:
(ClickAnyOfTheLinksBelowToGoTheFREEBonusBooks!)
BonusBook:ScrumBootcamp
BonusBook:PythonBootcamp
BonusBook:JavaScriptBootcamp


BonusBook:C#Bootcamp
BonusBook:ExcelBootcamp
BonusBook:SEOBootcamp
BonusBook:SQLBootcamp
BonusBook:PythonAcademy
BonusBook:JavaScriptAcademy
BonusBook:Windows10Academy
BonusBook:PassiveIncomeAssignment
BonusBook:The14DayPaleoDietPlan
BonusBook:The14DayKetogenicDietPlan
BonusBook:The14DayMediterraneanDietPlan


BonusBook:The14DayWholeFoodsDietPlan
BonusBook:The14DayDashDietPlan
BonusBook:The14DayVeganDietPlan
BonusBook:The14DaySmoothieCleanse
BonusBook:The14DayTeaCleanse
BonusBook:The14DayDumpDinnersPlan
BonusBook:The14DayEssentialOilsPlan
BonusBook:KetogenicDietChallenge
BonusBook:VeganDietChallenge
BonusBook:WholeFoodsDietChallenge
BonusBook:10DayGreenSmoothieCleanse
BonusBook:TeaCleanseChallenge
BonusBook:EssentialsOilsChallenge
BonusBook:CrockpotRecipesChallenge

BonusBook:PaleoDietChallenge



Introduction

BeforeYouGetStartedReading


>>ClickHere<<


IHaveAVERYImportantMessageThatYouMUSTREAD

IPromiseIt’sNotSpamAndI’mNotTryingToSellYouAnything!



>>ClickHereNow!<<




I want to thank you and congratulate you for downloading the book, “ Learn the
BasicsofComputerHacking(Security,PenetrationTesting,HowtoHack).

Thisbookcontainsprovenstepsandstrategiesonhowtohackcomputernetworks.

Thise-bookwillteachyouthebasicideasandconceptsrelatedtohacking.Itwillexplain
thetools,methodsandtechniquesusedbyexperiencedhackers.Byreadingthismaterial,
youcanconductreconnaissanceandsoftwareattacksagainstyourtargetnetworks.

Thanksagainfordownloadingthisbook,Ihopeyouenjoyit!





Chapter1:Hacking–GeneralInformation

Thisbookcanhelpyoubecomeagreatcomputerhacker.Withthismaterial,youwillbe
ableto:

Think like a hacker – Since you’ll know the methods and techniques used in
hacking,youcanattacknetworksorprotectyourselffromotherpeople.

Learn about “ethical hacking” – You don’t have to use your skills to infiltrate
networksorstealdata.IntheworldofIT(i.e.informationtechnology),youmay
use your new skills to help businesses and organizations in preventing hacking
attacks;thus,youcanearnmoneybybeinga“good”hacker.

Impress your friends and family members – You may show off your hacking
abilities to other people. This way, you can establish your reputation as a skilled
programmerorcomputer-user.

Hackers –Whoarethey?
Hackersarepeoplewholovetoplaywithcomputernetworksorelectronicsystems.They
lovetodiscoverhowcomputerswork.Accordingtocomputerexperts,hackersaredivided
intotwomaintypes:
White Hat Hackers – These people are known as “good hackers.” A white hat
hacker uses his/her skills for legal purposes. Often, he/she becomes a security
expertwhoprotectscompaniesandorganizationsfromtheblackhathackers(see
below).


Black Hat Hackers – This category involves hackers who use their skills for
malicious/illegalpurposes.Thesehackersattacknetworks,vandalizewebsitesand
stealconfidentialinformation.



Important Note: These terms originated from Western movies where protagonists wore
whitehatsandvillainsworeblackhats.

TheHierarchyofComputerHackers
Inthispartofthebook,hackersarecategorizedaccordingtotheirskilllevel.Studythis
materialcarefullysinceitcanhelpyoumeasureyourprogress.
TheWould-BeHackers–Inthiscategory,you’llfindbeginnerswhodon’treally
know what they are doing. These hackers normally have poor computer skills.
Theyusetheprogramsandhackingtoolscreatedbyotherswithoutknowinghow
thingswork.

TheIntermediateHackers–Thesehackersarefamiliarwithcomputers,operating
systems and programming languages. Normally, an intermediate hacker knows
howcomputerscriptswork.However,justlikeawould-behacker,anintermediate
hackerdoesn’tcreatehisorherowntools.

TheEliteHackers–Thiscategoryiscomposedofexperiencedhackers.Ingeneral,
anelitehackercreatestoolsandprogramsthatareusefulinattackingordefending
computer networks. Also, an elite hacker can access a system without getting
caught.Allhackerswanttoattainthislevel.

TheRequirements
Youcan ’ tbecomeanelitehackerovernight.Togetthenecessaryskills,youhavetobe
patientandtenacious.Focusonthethingsyouhavetodo(e.g.writeyourownprograms,

practiceyourhackingskills,readmorebooks,etc.).Byspendingyourtimeandefforton
thingsthatcanturnyouintoagreathacker,youcanreachthe “ elite ”levelquickly.

Hacking experts claim that creativity is important, especially for beginners. With
creativity,youcaneasilyfindmultiplesolutionstoasingleproblem.Youwon ’ thaveto


worryaboutlimitedresourcesoroptions.Ifyouarecreativeenough,youwillsurelyfind
excellentanswersfordifficultproblems.

Youshouldalsohavethedesiretolearnmore.Hackinginvolvescomplexprocessesthat
evolveasyearsgoby.Youshouldbewillingtospendhours,days,orevenweeksstudying
networkstructuresandattackstrategies.Ifyoudon ’ thavethetimeorpatienceforthis
kindofdetailedwork,youhaveminimalchancesofbecominganexperthacker.



Chapter2:ProgrammingSkills


To become an effective hacker, you should have sufficient skills in programming. The
ability to create and manipulate computer programs can go a long way. This ability can
help you cover your tracks or confuse security experts. However, if you want to be an
ethicalhacker,youmayuseyourskillstocreatedefensivecomputerprograms.

Well,itistruethatyoucanpurchaseready-to-useprogramsandhackingtoolsonline.That
means you may execute hacking attacks or defend your network without programming
anything. However, relying on programs created by others won ’ t help you become a
great hacker. Anybody can purchase and use a hacking program – it takes skill and
knowledgetocreateone.


Wheneveryouattack,defendortestanetwork,youshouldunderstandeverythingthatis
related to the activity. Since hacking attacks and system tests involve programs,
programming skills can help you attain effectiveness and accuracy in completing your
tasks.

Ifyouknowhowtoprogram,thenyou ’ llenjoythefollowingbenefits:
Otherhackerswillconsideryouasanexpert.

Youcancreateprogramsspecificallyforyourneeds.Forinstance,ifyouneedto
stopacertainvirus,youcancreateyourownsecurityprogramtoaccomplishyour
goal.Youwon’thavetogoonlineandtryvariousantivirusprogramsthatareoften
expensive.

Youwillhavemoreconfidenceinyourskills.Justlikeanyotherendeavor,hacking


willbewaymucheasierandsimplerifthepersontrustshisorherskills.

Simply put, don ’ t rely on hacking programs available in the market. Study some
programming languages and acquire the necessary skills. By doing so, you will gain
accesstoanewworldofcomputingandhacking.

HowtoStartyourProgrammingJourney?
Itwouldbegreatifyou ’ llstudyHTMLfirst.HTML(i.e.hypertextmarkuplanguage)isa
programminglanguagethatformsallofthewebsitesyouseeonline.Ifyouareplanningto
attack or establish a website, you have to know how to use the HTML language. Most
people say that HTML is simple and easy to master. That means you can learn this
languageeasilyevenifyouhaveneverprogrammedanythingbefore.


AftermasteringHTML,youshouldlearntheCprogramminglanguage.Cisthe
mostpopularcomputerlanguagetoday.Itformsmostofthetoolsthathackersuse.Itcan
helpyoucreateyourownvirusesordefensiveprograms.

AStudyPlan
Here ’ sastudyplanthatcanhelpyoumasteranyprogramminglanguage:
1. Buya“beginner’sbook”aboutyourchosenlanguage.Beforemakingapurchase,
readthereviewsmadebybookowners.Thisway,youwon’thavetowasteyour
timeand/ormoneyonauselessmaterial.

2. Onceyouhavelearnedhowtousethelanguage,youmustpracticeitregularly.

3. Almostallprogrammingbookscontainexercisesandpracticeproblems.Workon
theseexercisesandproblemstohoneyourskillsfurther.

4. Ifyouencounteranythingdifficult,don’tskiporignoreit.Trytounderstandhow


that “thing” works and how it is related to programming and/or hacking. You
won’tlearnmanythingsifyou’llskipcomplexideas.

5. Look for an online forum for programmers. Most of the time, experienced
programmersarewillingtohelpbeginners.Thatmeansyoucanjustgoonlineand
askthe“pros”wheneveryouencounterproblemsinyourstudies.

6. Applywhatyoulearn.Itwouldbegreatifyou’llusethelanguagetocreateyour
owncomputerprograms.




Chapter3:Passwords


These days, passwords serve as the exclusive form of protection for networks and
websites. If you have this piece of information, you will gain complete access to the
owner ’ saccount.Thisisthereasonwhyhackersusedifferenttoolsandtechniquesjustto
getpasswords.

PasswordCracking –TraditionalApproaches
Thefollowinglistshowsyouthetraditionaltechniquesusedincrackingpasswords:
Guessing–Thisapproachisonlyeffectiveforweakpasswords.Forexample,ifthe
usercreatedhispasswordbasedonpersonalinformation(e.g.phonenumber,date
ofbirth,favoriteanimal,etc.),youcaneasilydeterminethepasswordbytryingout
differentpossibilities.Thistechniquebecomesmoreeffectiveifthehackerknowsa
fewthingsabouttheuser.

ShoulderSurfing–Here,youwilllookoverthetarget’sshoulderasheorshetypes
thepassword.Thisapproachcangiveyouexcellentresultsifthetargetisaslow
typist.

SocialEngineering–Inthistechnique,you’llexploitthetarget’strustinorderto
gettheneededinformation.Forinstance,youmaycallthetargetandpretendthat
youbelongtothecompany’sITdepartment.Youcantellthetargetthatyouneed
hispasswordsoyoucanaccesshisaccountandmakesomeimportantupdates.

PasswordCracking –ModernTechniques
Inthissection,you ’ lllearnaboutthelatesttechniquesusedincrackingpasswords.




ImportantNote:Thissectionusessomecomputerprogramsthatyouneedtoinstall.

TheDictionaryAttack
Inthisapproach,youhavetouseatextfilethatcontainscommonpasswords.Youwilltry
each password to see which one works. This approach offers ease and simplicity.
However,youcanonlyuseitforweakpasswords.Tohelpyouunderstandthistechnique,
let ’ sanalyzethefollowingexample:

A hacker uses Brutus (i.e. a popular password-cracking program) to access an FTP (i.e.
filetransferprotocol)server.

Beforediscussingtheexample,let ’ stalkaboutFTPserversfirst.AnFTPserverallows
youtosendorreceivefilesthroughtheinternet.Ifahackergainsaccesstoasite ’ sFTP
server,hemaymanipulateorremovethefileswithinthatserver.

Now,you ’ rereadyfortheexample.Herewego:
1. ThehackervisitstheFTPserver’sloginpage.



2. Then,helaunchesBrutustocracktheserver’spassword.



3. Heindicatestheserver’stype(i.e.FTP)andIPaddress.

4. Heentersavalidusername.

5. Hechoosesthetextfilethatcontainsthepasswordlist.


6. HeclicksontheStartbutton.TheBrutusprogramwillconnecttotheFTPserver
and try to log in using the passwords inside the text file. If the process is
successful,Brutuswillshowthecorrectpasswordinits“PositiveAuthentication
Results”section.Here’sascreenshot:


Important Note: Elite hackers use a proxy whenever they use this kind of computer
program. Basically, a proxy hides your IP address by transmitting connection requests
fromadifferentcomputer.Thisisimportantsincemultipleloginattemptscreatealotof
electronic “ footprints. ”

TheBrute-ForceApproach
ITexpertsclaimthatthisapproachcancrackanytypeofpassword.Here,thehackertries


all possible combinations of numbers, letters and special symbols until he gets into the
targetedaccount.Themaindrawbackofthisapproachisthatitistime-consuming.Thisis
understandable – you have to try thousands of possible passwords just to access the
target ’ saccount.

Thespeedofthisapproachdependsontwofactors:
Thepassword’scomplexity
Thecomputer’sprocessingpower

Brutus,thehackingtoolusedinthepreviousexample,canalsolaunchbrute-forceattacks
againstaserver.Here ’ showitworks:

1. Specifythetarget’sIPaddressandservertype.Inthe“PassMode”section,select
“BruteForce”andhit“Range.”Theimagebelowwillserveasyourguide:




2. The screen will show you a dialog box (see below). Use this dialog box to
configurethebrute-forceapproach.Obviously,yourjobwillbewaymuchsimpler
ifyouhavesomeideaaboutthetarget’spassword.Forinstance,ifyouknowthat
the website requires passwords with 5-10 characters, you’ll be able to narrow
downthepossibilitiesandshortenthewholeprocess.




3. HittheOKbutton.Brutuswilllogintothetargetedserverbytryingallpossible
passwords. You’ll see the results on the program’s GUI (i.e. graphical user
interface).


Phishing
In this technique, you ’ ll steal confidential information (e.g. passwords) by fooling the
victim.Forexample,ahackerpretendedtobeabankrepresentativeandsentanemailto
thetargetuser.Theemailrequiredtheusertochangeherpasswordbyclickingonalink.
Whentheuserclickedonthelink,shesawawebsitesimilartothatoftheactualbank.The
website,however,isjustareplica.Anyinformationenteredtherewillgotothehacker ’ s
databaseoremailaccount.

Important Note: Elite hackers use HTML to create phishing sites that look like official
ones.

Herearethethingsyouneedtodowhencreatingaphishingwebsite:
1. Chooseyourtarget–Mosthackersmimicthewebsitesofemailserviceproviders.
Therearetworeasonsforthis:


1. Userslogintotheiremailaccountregularly.Thatmeansthehackerhasa
lotofopportunitiestofoolhistarget.



2. Emailaccountsareextremelyuseful.Mostofthetime,anemailaccountis
linked to other accounts (e.g. bank accounts). Thus, you can get loads of
informationabouttheuserjustbyhackinghisemailaccount.

Forthisbook,let’sassumethatyouwanttocreateaphishingsiteforGmail.

2. Copy the official webpage – Launch Mozilla Firefox (hackers recommend this
browser because it is secure and customizable) and access the login page of the
actual website. Press CTRL+S on your keyboard to create a local copy of the
webpage.


3. Renamethefile–Aftersavingthewebpage,changeitsnameto“index.htm.”The
index page is the first webpage that shows up whenever someone reaches a
website; thus, you want the target user to believe that he reached the index
webpageoftherealsite.

4. Create a script – You should create a computer script that will record the user’s
login information. Most hackers use the PHP scripting language to accomplish
this task. The image below shows you a basic PHP script that records login
credentials.

LaunchNotepadandenterthescript.Savethefileas“phish.php”.




×