Infolinks In Text Ads

Sunday, 18 November 2012

How to Become a Hacker

LEARNING THE BASICS OF HACKING


 First of all I will like to tell you that hacking is an art. I am teaching you this art so that you can make yourself more secure. I don't want you to use this techniques to harm others because hackers never harm others, but crackers do. And we are Hackers not cracker. There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn't make you a hacker any more.

- Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them: 
  • The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
  • No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  • Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren't doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
  • Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian. However, authoritarians thrive on censorship and secrecy, and they distrust voluntary cooperation and information-sharing.
  • Attitude is no substitute for competence. Hackers won't let posers waste their time, but they recognize competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.
- Earn respect as a hacker. Like most cultures without a monetary economy, hackerdom runs on reputation. You're trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren't really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a "gift culture." You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.
  • Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
  • Help test and debug open-source software. Any open-source author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.
  • Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
  • Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
  • Serve the hacker culture itself. This is not something you'll be positioned to do until you've been around for a while and become well-known for one of the four previous items. The hacker culture doesn't have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you've been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status. ( http://www.wikihow.com/Become-a-Hacker ).

                              LET GET TO WORK





1. Take all safety Measures to hide your IP-Address from your target host or your victim.

There are lots of techniques to hide your target host or your victim computer. I recommend you to use as much techniques as you can.

I am mentioning few important tricks below :-

  • Use Hide Ip Software :- This software will help you to hide your IP address.
  • Use Firewall :- Firewall secure your computer as well as restrict any personal information from going outside.
  • Use Proxy servers :- Whenever you want to surf the computer of your target use proxy servers.
  • Use others username and password :- Try to avoid using your own user name and password for internet connection. Learn the technique to get other's user name and password.
2. Find out the IP Address of Target Computer.

  • what is Ip address :- It's full form is Internet Protocol Address. Protocol means the way computer talks to each other and Internet protocol means , way in which two computer talks to each on internet. So the complete meaning of Ip address is address of a computer who wants to talk to other computers on internet.
    • There are two important things about ip address :-
      • it is unique for every computer.
      • it is needed every time we connect to internet.
  • Use of IP address in Hacking :- Ip address is one of the most important part of hacking. To learn its importance in hacking first of all we need to know what is hacking. All i can say here is that if we don't know the ip address of target computer we can't able to move single step forward in getting access to target computer.
  • Ways to find out IP address :-
    • Ping
    • tracert
    • dns query
3.Gather information about target computer such as its operating system ,time,date etc etc .

  • What 's the need ?
    • To be able to know weaknesses of target computer.
    • To exploit those weakness.
    • Learn more how we can exploit it.
  • How to gather information?
    • Telnet
    • Dns Query
    • Port Scan
    • tracert
 4.Use Search engine (according to information obtained from above steps) to get tools which will help us to hack target computer.

Search engines like google are very close friends of hackers. If we do all the things mentioned above we know exactly where vulnerability lies in target computer. To use that vulnerability we search for available tools on google.com. After downloading specific tools we need IP Address of target computer ( we already know) to get access on other computer.


5. Leave one or two files on the target computer so to get easy access in future.
To get access again and again hackers usually leave files on target computer. For eg Net cat which allow them to get access again and again. Download netcat. ( http://5steps2hack.blogspot.com ) 


No comments:

Post a Comment

NO LINK!!!!!!!!