HackingBootcamp
LearntheBasicsofComputerHacking
Morediscountedbooksatkindlebookspot.com
TableOfContent
Introduction
Chapter1:Hacking–GeneralInformation
Chapter2:ProgrammingSkills
Chapter3:Passwords
Chapter5:PenetrationTesting
Conclusion
BonusBooks:
(ClickAnyOfTheLinksBelowToGoTheFREEBonusBooks!)
BonusBook:ScrumBootcamp
BonusBook:PythonBootcamp
BonusBook:JavaScriptBootcamp
BonusBook:C#Bootcamp
BonusBook:ExcelBootcamp
BonusBook:SEOBootcamp
BonusBook:SQLBootcamp
BonusBook:PythonAcademy
BonusBook:JavaScriptAcademy
BonusBook:Windows10Academy
BonusBook:PassiveIncomeAssignment
BonusBook:The14DayPaleoDietPlan
BonusBook:The14DayKetogenicDietPlan
BonusBook:The14DayMediterraneanDietPlan
BonusBook:The14DayWholeFoodsDietPlan
BonusBook:The14DayDashDietPlan
BonusBook:The14DayVeganDietPlan
BonusBook:The14DaySmoothieCleanse
BonusBook:The14DayTeaCleanse
BonusBook:The14DayDumpDinnersPlan
BonusBook:The14DayEssentialOilsPlan
BonusBook:KetogenicDietChallenge
BonusBook:VeganDietChallenge
BonusBook:WholeFoodsDietChallenge
BonusBook:10DayGreenSmoothieCleanse
BonusBook:TeaCleanseChallenge
BonusBook:EssentialsOilsChallenge
BonusBook:CrockpotRecipesChallenge
BonusBook:PaleoDietChallenge
Introduction
BeforeYouGetStartedReading
>>ClickHere<<
IHaveAVERYImportantMessageThatYouMUSTREAD
IPromiseIt’sNotSpamAndI’mNotTryingToSellYouAnything!
>>ClickHereNow!<<
I want to thank you and congratulate you for downloading the book, “ Learn the
BasicsofComputerHacking(Security,PenetrationTesting,HowtoHack).
Thisbookcontainsprovenstepsandstrategiesonhowtohackcomputernetworks.
Thise-bookwillteachyouthebasicideasandconceptsrelatedtohacking.Itwillexplain
thetools,methodsandtechniquesusedbyexperiencedhackers.Byreadingthismaterial,
youcanconductreconnaissanceandsoftwareattacksagainstyourtargetnetworks.
Thanksagainfordownloadingthisbook,Ihopeyouenjoyit!
Chapter1:Hacking–GeneralInformation
Thisbookcanhelpyoubecomeagreatcomputerhacker.Withthismaterial,youwillbe
ableto:
Think like a hacker – Since you’ll know the methods and techniques used in
hacking,youcanattacknetworksorprotectyourselffromotherpeople.
Learn about “ethical hacking” – You don’t have to use your skills to infiltrate
networksorstealdata.IntheworldofIT(i.e.informationtechnology),youmay
use your new skills to help businesses and organizations in preventing hacking
attacks;thus,youcanearnmoneybybeinga“good”hacker.
Impress your friends and family members – You may show off your hacking
abilities to other people. This way, you can establish your reputation as a skilled
programmerorcomputer-user.
Hackers –Whoarethey?
Hackersarepeoplewholovetoplaywithcomputernetworksorelectronicsystems.They
lovetodiscoverhowcomputerswork.Accordingtocomputerexperts,hackersaredivided
intotwomaintypes:
White Hat Hackers – These people are known as “good hackers.” A white hat
hacker uses his/her skills for legal purposes. Often, he/she becomes a security
expertwhoprotectscompaniesandorganizationsfromtheblackhathackers(see
below).
Black Hat Hackers – This category involves hackers who use their skills for
malicious/illegalpurposes.Thesehackersattacknetworks,vandalizewebsitesand
stealconfidentialinformation.
Important Note: These terms originated from Western movies where protagonists wore
whitehatsandvillainsworeblackhats.
TheHierarchyofComputerHackers
Inthispartofthebook,hackersarecategorizedaccordingtotheirskilllevel.Studythis
materialcarefullysinceitcanhelpyoumeasureyourprogress.
TheWould-BeHackers–Inthiscategory,you’llfindbeginnerswhodon’treally
know what they are doing. These hackers normally have poor computer skills.
Theyusetheprogramsandhackingtoolscreatedbyotherswithoutknowinghow
thingswork.
TheIntermediateHackers–Thesehackersarefamiliarwithcomputers,operating
systems and programming languages. Normally, an intermediate hacker knows
howcomputerscriptswork.However,justlikeawould-behacker,anintermediate
hackerdoesn’tcreatehisorherowntools.
TheEliteHackers–Thiscategoryiscomposedofexperiencedhackers.Ingeneral,
anelitehackercreatestoolsandprogramsthatareusefulinattackingordefending
computer networks. Also, an elite hacker can access a system without getting
caught.Allhackerswanttoattainthislevel.
TheRequirements
Youcan ’ tbecomeanelitehackerovernight.Togetthenecessaryskills,youhavetobe
patientandtenacious.Focusonthethingsyouhavetodo(e.g.writeyourownprograms,
practiceyourhackingskills,readmorebooks,etc.).Byspendingyourtimeandefforton
thingsthatcanturnyouintoagreathacker,youcanreachthe “ elite ”levelquickly.
Hacking experts claim that creativity is important, especially for beginners. With
creativity,youcaneasilyfindmultiplesolutionstoasingleproblem.Youwon ’ thaveto
worryaboutlimitedresourcesoroptions.Ifyouarecreativeenough,youwillsurelyfind
excellentanswersfordifficultproblems.
Youshouldalsohavethedesiretolearnmore.Hackinginvolvescomplexprocessesthat
evolveasyearsgoby.Youshouldbewillingtospendhours,days,orevenweeksstudying
networkstructuresandattackstrategies.Ifyoudon ’ thavethetimeorpatienceforthis
kindofdetailedwork,youhaveminimalchancesofbecominganexperthacker.
Chapter2:ProgrammingSkills
To become an effective hacker, you should have sufficient skills in programming. The
ability to create and manipulate computer programs can go a long way. This ability can
help you cover your tracks or confuse security experts. However, if you want to be an
ethicalhacker,youmayuseyourskillstocreatedefensivecomputerprograms.
Well,itistruethatyoucanpurchaseready-to-useprogramsandhackingtoolsonline.That
means you may execute hacking attacks or defend your network without programming
anything. However, relying on programs created by others won ’ t help you become a
great hacker. Anybody can purchase and use a hacking program – it takes skill and
knowledgetocreateone.
Wheneveryouattack,defendortestanetwork,youshouldunderstandeverythingthatis
related to the activity. Since hacking attacks and system tests involve programs,
programming skills can help you attain effectiveness and accuracy in completing your
tasks.
Ifyouknowhowtoprogram,thenyou ’ llenjoythefollowingbenefits:
Otherhackerswillconsideryouasanexpert.
Youcancreateprogramsspecificallyforyourneeds.Forinstance,ifyouneedto
stopacertainvirus,youcancreateyourownsecurityprogramtoaccomplishyour
goal.Youwon’thavetogoonlineandtryvariousantivirusprogramsthatareoften
expensive.
Youwillhavemoreconfidenceinyourskills.Justlikeanyotherendeavor,hacking
willbewaymucheasierandsimplerifthepersontrustshisorherskills.
Simply put, don ’ t rely on hacking programs available in the market. Study some
programming languages and acquire the necessary skills. By doing so, you will gain
accesstoanewworldofcomputingandhacking.
HowtoStartyourProgrammingJourney?
Itwouldbegreatifyou ’ llstudyHTMLfirst.HTML(i.e.hypertextmarkuplanguage)isa
programminglanguagethatformsallofthewebsitesyouseeonline.Ifyouareplanningto
attack or establish a website, you have to know how to use the HTML language. Most
people say that HTML is simple and easy to master. That means you can learn this
languageeasilyevenifyouhaveneverprogrammedanythingbefore.
AftermasteringHTML,youshouldlearntheCprogramminglanguage.Cisthe
mostpopularcomputerlanguagetoday.Itformsmostofthetoolsthathackersuse.Itcan
helpyoucreateyourownvirusesordefensiveprograms.
AStudyPlan
Here ’ sastudyplanthatcanhelpyoumasteranyprogramminglanguage:
1. Buya“beginner’sbook”aboutyourchosenlanguage.Beforemakingapurchase,
readthereviewsmadebybookowners.Thisway,youwon’thavetowasteyour
timeand/ormoneyonauselessmaterial.
2. Onceyouhavelearnedhowtousethelanguage,youmustpracticeitregularly.
3. Almostallprogrammingbookscontainexercisesandpracticeproblems.Workon
theseexercisesandproblemstohoneyourskillsfurther.
4. Ifyouencounteranythingdifficult,don’tskiporignoreit.Trytounderstandhow
that “thing” works and how it is related to programming and/or hacking. You
won’tlearnmanythingsifyou’llskipcomplexideas.
5. Look for an online forum for programmers. Most of the time, experienced
programmersarewillingtohelpbeginners.Thatmeansyoucanjustgoonlineand
askthe“pros”wheneveryouencounterproblemsinyourstudies.
6. Applywhatyoulearn.Itwouldbegreatifyou’llusethelanguagetocreateyour
owncomputerprograms.
Chapter3:Passwords
These days, passwords serve as the exclusive form of protection for networks and
websites. If you have this piece of information, you will gain complete access to the
owner ’ saccount.Thisisthereasonwhyhackersusedifferenttoolsandtechniquesjustto
getpasswords.
PasswordCracking –TraditionalApproaches
Thefollowinglistshowsyouthetraditionaltechniquesusedincrackingpasswords:
Guessing–Thisapproachisonlyeffectiveforweakpasswords.Forexample,ifthe
usercreatedhispasswordbasedonpersonalinformation(e.g.phonenumber,date
ofbirth,favoriteanimal,etc.),youcaneasilydeterminethepasswordbytryingout
differentpossibilities.Thistechniquebecomesmoreeffectiveifthehackerknowsa
fewthingsabouttheuser.
ShoulderSurfing–Here,youwilllookoverthetarget’sshoulderasheorshetypes
thepassword.Thisapproachcangiveyouexcellentresultsifthetargetisaslow
typist.
SocialEngineering–Inthistechnique,you’llexploitthetarget’strustinorderto
gettheneededinformation.Forinstance,youmaycallthetargetandpretendthat
youbelongtothecompany’sITdepartment.Youcantellthetargetthatyouneed
hispasswordsoyoucanaccesshisaccountandmakesomeimportantupdates.
PasswordCracking –ModernTechniques
Inthissection,you ’ lllearnaboutthelatesttechniquesusedincrackingpasswords.
ImportantNote:Thissectionusessomecomputerprogramsthatyouneedtoinstall.
TheDictionaryAttack
Inthisapproach,youhavetouseatextfilethatcontainscommonpasswords.Youwilltry
each password to see which one works. This approach offers ease and simplicity.
However,youcanonlyuseitforweakpasswords.Tohelpyouunderstandthistechnique,
let ’ sanalyzethefollowingexample:
A hacker uses Brutus (i.e. a popular password-cracking program) to access an FTP (i.e.
filetransferprotocol)server.
Beforediscussingtheexample,let ’ stalkaboutFTPserversfirst.AnFTPserverallows
youtosendorreceivefilesthroughtheinternet.Ifahackergainsaccesstoasite ’ sFTP
server,hemaymanipulateorremovethefileswithinthatserver.
Now,you ’ rereadyfortheexample.Herewego:
1. ThehackervisitstheFTPserver’sloginpage.
2. Then,helaunchesBrutustocracktheserver’spassword.
3. Heindicatestheserver’stype(i.e.FTP)andIPaddress.
4. Heentersavalidusername.
5. Hechoosesthetextfilethatcontainsthepasswordlist.
6. HeclicksontheStartbutton.TheBrutusprogramwillconnecttotheFTPserver
and try to log in using the passwords inside the text file. If the process is
successful,Brutuswillshowthecorrectpasswordinits“PositiveAuthentication
Results”section.Here’sascreenshot:
Important Note: Elite hackers use a proxy whenever they use this kind of computer
program. Basically, a proxy hides your IP address by transmitting connection requests
fromadifferentcomputer.Thisisimportantsincemultipleloginattemptscreatealotof
electronic “ footprints. ”
TheBrute-ForceApproach
ITexpertsclaimthatthisapproachcancrackanytypeofpassword.Here,thehackertries
all possible combinations of numbers, letters and special symbols until he gets into the
targetedaccount.Themaindrawbackofthisapproachisthatitistime-consuming.Thisis
understandable – you have to try thousands of possible passwords just to access the
target ’ saccount.
Thespeedofthisapproachdependsontwofactors:
Thepassword’scomplexity
Thecomputer’sprocessingpower
Brutus,thehackingtoolusedinthepreviousexample,canalsolaunchbrute-forceattacks
againstaserver.Here ’ showitworks:
1. Specifythetarget’sIPaddressandservertype.Inthe“PassMode”section,select
“BruteForce”andhit“Range.”Theimagebelowwillserveasyourguide:
2. The screen will show you a dialog box (see below). Use this dialog box to
configurethebrute-forceapproach.Obviously,yourjobwillbewaymuchsimpler
ifyouhavesomeideaaboutthetarget’spassword.Forinstance,ifyouknowthat
the website requires passwords with 5-10 characters, you’ll be able to narrow
downthepossibilitiesandshortenthewholeprocess.
3. HittheOKbutton.Brutuswilllogintothetargetedserverbytryingallpossible
passwords. You’ll see the results on the program’s GUI (i.e. graphical user
interface).
Phishing
In this technique, you ’ ll steal confidential information (e.g. passwords) by fooling the
victim.Forexample,ahackerpretendedtobeabankrepresentativeandsentanemailto
thetargetuser.Theemailrequiredtheusertochangeherpasswordbyclickingonalink.
Whentheuserclickedonthelink,shesawawebsitesimilartothatoftheactualbank.The
website,however,isjustareplica.Anyinformationenteredtherewillgotothehacker ’ s
databaseoremailaccount.
Important Note: Elite hackers use HTML to create phishing sites that look like official
ones.
Herearethethingsyouneedtodowhencreatingaphishingwebsite:
1. Chooseyourtarget–Mosthackersmimicthewebsitesofemailserviceproviders.
Therearetworeasonsforthis:
1. Userslogintotheiremailaccountregularly.Thatmeansthehackerhasa
lotofopportunitiestofoolhistarget.
2. Emailaccountsareextremelyuseful.Mostofthetime,anemailaccountis
linked to other accounts (e.g. bank accounts). Thus, you can get loads of
informationabouttheuserjustbyhackinghisemailaccount.
Forthisbook,let’sassumethatyouwanttocreateaphishingsiteforGmail.
2. Copy the official webpage – Launch Mozilla Firefox (hackers recommend this
browser because it is secure and customizable) and access the login page of the
actual website. Press CTRL+S on your keyboard to create a local copy of the
webpage.
3. Renamethefile–Aftersavingthewebpage,changeitsnameto“index.htm.”The
index page is the first webpage that shows up whenever someone reaches a
website; thus, you want the target user to believe that he reached the index
webpageoftherealsite.
4. Create a script – You should create a computer script that will record the user’s
login information. Most hackers use the PHP scripting language to accomplish
this task. The image below shows you a basic PHP script that records login
credentials.
LaunchNotepadandenterthescript.Savethefileas“phish.php”.