FAQ: How do I hack?
Learn How to Become a Hacker
These days i am getting more and more emails where my readers are asking me to teach them how to hack. Here is a message i received few days ago that made me laugh: "Alexander, please teach me how to hack email account and i will give you my girlfriend for one night".
So here i will answer some of the most frequently asked questions that every beginner asked before start hacking.
The best way to start hacking is to teach yourself !!!
How do I hack?
There is no easy way how to hack. Google is your best friend.. REMEMBER THAT! Read any information you can find on hacking. Read hacking forums and check out hacking websites. Learn a programming language like C++. Get a book like Hacking for Dummies which will teach you a lot.
What do I need to be able to hack?
Firstly you need to understand how your computers operating system works, networks and protocols works, security settings and general PC knowledge. After you understand how it works you need hacking tools which helps you to hack.
What is command prompt (cmd- the little dos Windows)?
Go START, RUN and type in: "cmd"
What can I do in cmd?
You can can do various things with it like run exploits or do a ping request.
Why does some of the hacking tools I download just close itself when I open them?
Lots of hacking tools are DOS based and has to be run through CMD. If you double click on the program it will open a DOS box and automatically close the box. From CMD you can navigate to the directory which your hacking tool is stored in and run it from there. Other hacking tools are GUI ( graphical user interface ) based and it will open like a normal Windows based program.
What is a IP address?
Every computer connected to the Internet or some network has a IP address. Goto START, RUN and type in "cmd" then type in "ipconfig" it will show you your IP address or addresses. It will look something like this : 81.35.99.84. IP = internet protocol.
How do I find someone's IP address?
There are many ways to find someones IP address. Here are two tutorials that will teach you how to hack an IP Address: How to Hack Someones IP Address and How to Find The IP Address of An Email Sender
What can I do with a IP?
Well you need someone's IP before you can hack, portscan or DOS them.
What is 127.0.0.1 IP?
It is your PC's local loopback IP address.
Why do I have two IP addresses when I do a ipconfig?
Well if your on a local LAN (Local area network) you will have a IP like 192.168.0.1. If your also directly connected to the internet you will have another IP address like 80.87.34.56. 192.168.0.1 is your local IP which you use to communicate with your local internet network (lan) and 80.87.34.56 is your internet IP.
What is a static and dynamic IP address?
Static means permanent set IP address - like a website will have a static IP address, it never changes. Dynamic means temporary IP address - dailing up to the Internet with a modem or most ADSL connections has dynamic IP's. Every time you logon to the Internet your ISP ( Internet Service Provider ) will issue you a new IP address.
I have sent someone a trojan but I cannot connect to their PC?
Either they are running a firewall which blocks you from connecting to their PC, or they are connected to the internet through a router.
What do I do when someone is behind a router and I want to control their PC with a trojan?
You will need to use a trojan which uses reverse connections - meaning you don't connect to the host, the host connects to you. Bifrost is a trojan which has the mentioned function. Remember when someone is behind a router and your using IPstealer to get hold of their IP address, you are actually getting their routers IP, not their actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will have a different IP - their LAN IP.
How do I check if my own PC is infected with a trojan?
Do a port scan on your PC and check which ports are open. If you find any open ports in this trojan port list you might be infected with a trojan. Download the trojan you think you might be infected with and connect to that specified port.
What is a router?
A device which is used to route data on a network. a Router decides where certain traffic should be sent to.
What is a firewall?
Its a software or hardware device which can block or permit certain ports or IP's or certain kinds of data.
What is a port and what can I do with it?
Every program running on your PC which has some network function uses a specific port to send an receive data though. If you do a port scan you will see which ports are open on the host you scanned. Port 80 is normally a web server. Port 21 a FTP server ect ect.. Trojans also uses ports. Check this list of trojan ports, if you find an open port in this list, the host might be infected with a trojan, download the trojan and try connecting to the port.
How do I do a port scan?
You need a program like SuperScan to do a portscan. Then all you do is add the ip you want to scan.
Why do you want to scan ports?
If you scan a PC with a port scanner, it will show you which programs or services are running on the PC.
Common ports:
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110
What is a exploit?
It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there.
How do I use a exploit?
You first need to compile the exploit with a program like Bloodshed C++ compiler. Then you can start the exploit through command prompt and see if the system your trying to exploit is vulnerable to that specific exploit. Scroll down for more information about exploits.
What is a exploit POC?
POC stands for proof of concept and it the proof that a exploit works.
What is a DOS attack? - It is when too much data is being sent to a host and it cannot handle all the data and disconnects from the Internet.
How do I see what connections is currently made to my PC?
In cmd type in "netstat" - it will show you IP addresses of connections to your PC and what port it is using.
What is a MAC address?
Its a hard coded number, almost like a name which is embedded into a network card. It identifies the manufacturer of the card and a unique number for the card. No two network cards in the world has the same MAC address.
How do I find out my own or someone else's MAC address?
Your own MAC = Goto cmd and type in "ipconfig /all"
MAC address looks something like this : 00-13-20-A3-0B-4C
Someone else's MAC address you need their IP address and then goto cmd and type in "nbtstat -a 192.168.0.5" or whatever IP they use. This will show you their MAC address as well as their currently logged on user.
What is a Windows Registry and how do I access it?
Its where Windows stores most of the configurations of your operating system and most programs installed. You might used it to make a trojan server file you uploaded to the PC run automaticly when Windows starts up. To access the registry go START, RUN and type in "regedit"
Careful what you change in the registry, it might screw up you PC.. First make a backup of the registry.
How do I hack a webpage/ web server?
Search on google for IIS hacking tutorial, but remember not all webservers run IIS!
What is IIS?
It is Microsoft's web server. IIS - Internet information server. Most webservers run on port 80.
How do I hack into a Gmail, Yahoo or Hotmail email account?
Every now and then someone discovers a way to get into those email servers, but the service provider fixes the security hole so fast, there is no straight answer for that. Best way is to install a keylogger on the victims PC and get their login details. Otherwise download THIS program which you can use to brute force a hotmail account.
How do I hack into a POP3 email account?
Hydra 5.3 is a program which you can use to crack POP3 accounts. You will need a wordlist which Hydra will use to crack the POP3 password.
What is a keylogger?
It is a program you install on someone's PC which captures every key that is pressed on their keyboard which is emailed to you or stored into a file.
How do I get the administrator account password while logged in to the PC?
Locally run a program like Adminhack for local administrator account cracking. If you need to do it remotely run a program like Venom or Starbrute.
What is a SAM file?
SAM file is the file which stores all the user accounts and their password hashes like the Administrator account. SAM file is stored in "C:\WINDOWS\system32\config" but it is locked and inaccessable while you are busy using Windows - meaning you can't copy it while your in Windows. You need to boot up with another operating system like NTFSDOS or Linux with NTFS support. When you copied the SAM file you can crack the passwords stored in the SAM file with a program like LC5. With Pwdump6 it is possible to get access to the SAM file while logged into windows. It can also connect to a remote PC and grab the password hashes from the SAM file. Administrator account is needed.
How do I reset a administrator or some other account password on Win2K/WinXP/WinNT/Win2003?
Download Offline NT Password & Registry Editor which you can use to create a bootup disk or CD and then boot up the PC and then you can reset the password. Just remember that this program will not show you the password, you can only change the password.
How do I crack a administrator password?
If you need to crack a administrator password you will need to copy the SAM file to another machine and crack it. Download this NTXP-Cracker program which has included everything you need to boot up the PC, copy the SAM file and crack the SAM file on another machine.
How do I find out what operating system does my target run?
Download Detect and use it against your targets IP address.
Result:
C:\>detect.exe 127.0.0.1[*]------------------------------[*][*] XP/2K OS Detector[*][*] by: illwill & phr0stic[*][*]------------------------------[*]
[+] Finding Host 127.0.0.1
[+] Connected to 127.0.0.1
[+] Bytes Sent: 222
[?] The box seems to be Windows XP
Basically these are the frequently asked questions every beginner asked. Hope you'll find this post useful.
FAQ: Phishing to Hack Email Account Passwords
What is Phishing and how to use it for hacking?
I have written much about Phishing on this blog. I received large response for my indepth tutorial on Phishing to hack email account password. Thanks a lot for your kind co-operation. Many readers were able to get the trick or hack of Phishing and how to use Phishing to hack email account. But, some readers were just not able to get out their problems. I have written this article for such readers to help them sort out their Phishing related problems.
I was just going through comments made by you guys and noticed some readers left unanswered or they were not convinced by me. So, here are answers to some of commonly asked questions for Phishing.
1. First of all lets clear What is Phishing:
Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc.
2. Does Phishing help in hacking email passwords?
This was the most basic question I read. No doubt, the reader is newbie and hence I have included this question over here. Helping newbies is my prime purpose. The answer is "Yes. Phishing is meant for hacking email passwords".
3. Which email passwords can be hacked using Phishing?
Phishing can be used to hack any email password or any online account password. It can be email account like hotmail, gmail, yahoo; social networking site account like myspace, orkut, faceboook; banking account; file sharing account or any account you want.
4. How do I perform Phishing?
Phishing is one of the easiest hacking methods. The only thing is you have to get the actual idea of what you have to do to hack email password. You can learn Phishing and how to make your own Phisher by referring my articles "How to Make a Phisher to Hack Any E-Mail Account Password" and "Software to Create Your Own Phisher".
5. What are webhosts?
Webhosts, to explain in short, are offering free webspace where we can upload our created phisher. Phisher is fake login page that we create and we have to upload it on internet. So, we need some space on internet for phisher which is provided by such free webhosts.
I would recommend you following webhosts:
6. Why I can't upload write.php?
Well to upload write.php file, your webhost must support php files. Try using webhosts I have illustrated in Q.5. They all support php.
7. Why I can't run Phisher Creator software on my computer?
For being able to run Phisher Creator software, your computer must have necessary library files installed. Install Library files package and even .NET Framework.
8. How do I send Phisher link to victim?
Get the Anonymous Emailer software and create a fake email and post the phisher link in this email. Ask victim to login to his account using this link. Also try using your logic to make him login to your sent phisher.
9. Why I don't get passes.txt file?
Passes.txt file is created only after victim logins with our sent phisher. If you are trying it, login using phisher and then go to file manager of FTP account. You will see passes.txt file created. If file is not present, try refreshing the page and you'll get it. If you're still not able to get passes.txt file, do one of following:
10. How do I get my Phisher link?
Go to File Manager. Upload your phisher created by Phisher creator. Now, click on uploaded "index.htm" file. You will see fake page. Now, in address bar, you will get your Phisher link. This is your Phisher link. Send this phisher link to your victim.
11. Why Phishing is not working for me?
I'm received many questions like this. I helped many readers and finally reached conclusion that most of them were not reading my article completely and carefully. So, read article completely and carefully. This is most common error made by readers.
Thats it. I hope now, you will have most of your doubts about Phishing cleared. This article is meant only for you.
Enjoy Phishing to hack email password...
I have written much about Phishing on this blog. I received large response for my indepth tutorial on Phishing to hack email account password. Thanks a lot for your kind co-operation. Many readers were able to get the trick or hack of Phishing and how to use Phishing to hack email account. But, some readers were just not able to get out their problems. I have written this article for such readers to help them sort out their Phishing related problems.
I was just going through comments made by you guys and noticed some readers left unanswered or they were not convinced by me. So, here are answers to some of commonly asked questions for Phishing.
1. First of all lets clear What is Phishing:
Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc.
2. Does Phishing help in hacking email passwords?
This was the most basic question I read. No doubt, the reader is newbie and hence I have included this question over here. Helping newbies is my prime purpose. The answer is "Yes. Phishing is meant for hacking email passwords".
3. Which email passwords can be hacked using Phishing?
Phishing can be used to hack any email password or any online account password. It can be email account like hotmail, gmail, yahoo; social networking site account like myspace, orkut, faceboook; banking account; file sharing account or any account you want.
4. How do I perform Phishing?
Phishing is one of the easiest hacking methods. The only thing is you have to get the actual idea of what you have to do to hack email password. You can learn Phishing and how to make your own Phisher by referring my articles "How to Make a Phisher to Hack Any E-Mail Account Password" and "Software to Create Your Own Phisher".
5. What are webhosts?
Webhosts, to explain in short, are offering free webspace where we can upload our created phisher. Phisher is fake login page that we create and we have to upload it on internet. So, we need some space on internet for phisher which is provided by such free webhosts.
I would recommend you following webhosts:
6. Why I can't upload write.php?
Well to upload write.php file, your webhost must support php files. Try using webhosts I have illustrated in Q.5. They all support php.
7. Why I can't run Phisher Creator software on my computer?
For being able to run Phisher Creator software, your computer must have necessary library files installed. Install Library files package and even .NET Framework.
8. How do I send Phisher link to victim?
Get the Anonymous Emailer software and create a fake email and post the phisher link in this email. Ask victim to login to his account using this link. Also try using your logic to make him login to your sent phisher.
9. Why I don't get passes.txt file?
Passes.txt file is created only after victim logins with our sent phisher. If you are trying it, login using phisher and then go to file manager of FTP account. You will see passes.txt file created. If file is not present, try refreshing the page and you'll get it. If you're still not able to get passes.txt file, do one of following:
- Re-login using phisher.
- Change your webhost.
- Re-start from beginning.
10. How do I get my Phisher link?
Go to File Manager. Upload your phisher created by Phisher creator. Now, click on uploaded "index.htm" file. You will see fake page. Now, in address bar, you will get your Phisher link. This is your Phisher link. Send this phisher link to your victim.
11. Why Phishing is not working for me?
I'm received many questions like this. I helped many readers and finally reached conclusion that most of them were not reading my article completely and carefully. So, read article completely and carefully. This is most common error made by readers.
Thats it. I hope now, you will have most of your doubts about Phishing cleared. This article is meant only for you.
Enjoy Phishing to hack email password...
No comments:
Post a Comment
Thank you for your concern please follow to get connected with us.