Hacking: Tapping into the Matrix: Step by Step Guide on How to Hack, including Tips, Secrets, Steps, and Hidden Traps! (2014)
Chapter 10. Final Hacking Tips
Lastly, here are some hacking tips that you should always keep in mind in order to work on more systems and programs!
Understand Networking Concepts
When you hack something, there are times when you wouldn’t have to work on one computer alone. You have to understand LAN and WAN, and other derivatives. Here’s a crash course on them:
1. LAN. LAN stands for Local Area Network—or how computers are connected to one another. For example, in an internet café, all computers are connected to each other and to the server so it would be easy for the owner to know what’s going on in each of those computers.
2. WAN. WAN, meanwhile, means Wide Area Network, and is mostly used for telecommunications networks. Regardless of connection, it makes it easy for computers to help people communicate. Leased lines are common in this.
3. VPN. The Virtual Private Network is a private network hidden in the internet, which makes it easy for public networks to send and receive data from one another.
4. Firewall. Firewall is like a security barrier that keeps computers safe from viruses or unwanted files. Without it, it would be easy to hack into systems!
Encryption and Decryption are two of the main things that helps you become a successful hacker, especially when you want to get through information systems (such as SSH).
As you can see, codes are often written in a language that’s not simple for humans to understand. You can then decode—or decrypt—those codes in order to figure out how a system works. Here’s a simple way for you to learn Cryptography.
1. Download Ophcrack, and then run it on Windows 7 or Windows XP. To do so:
1. Click Ophcrack on XP Live CD, or;
2. Click Ophcrack on Vista 7 Live CD.
2. There is an image that you’ll see on the CD—go ahead and burn it, insert the disc on the computer, and press restart.
3. You’ll then see the Ophcrack Live Program onscreen, and when you see that, go ahead and check the lines of codes that you’ll see onscreen. Empty will be displayed if the account you’re trying to hack already allows you to login.
4. Under the NTLM Hash Field, you’ll see Hash Value. Copy that, and type it on the space you see once you visit http://crackstation.net.
5. Enter Capchta code, and then click Crack Hashes and you’ll be able to decrypt the code.
The problem with some hackers is that they do know how to hack—but they have no idea how to reverse what they did—especially if it’s being done to them. This is why it is important for you to write loop holes. You can start with Password Cracking Methods.
1. Social Engineering. This is basically like manipulating somebody to help you gain access to his accounts and passwords. It’s like phishing for contact information, or basically just pretending to be someone else. The best thing to do here is that you have to learn how to double-check someone. If someone calls you and asks for personal information, actually try to contact the real person himself—and always be careful about giving important information—especially online or over the phone!
2. Brute Force Attack. Brute Force is making use of various combinations of numbers, special characters, and letters to create password matches. The complexity of the password determines the length of decryption. As for you, make sure that you use long and complex passwords—just keep a copy of them with you at all times. Don’t use passwords that are just a little too obvious.
A RAT is a Remote Access Trojan that you can send your potential victims online. It infects the computer system that even antivirus programs can’t seem to shake it off. Here are some of the things that you can do with the help of RATS:
1. Installing Keyloggers
2. Infecting Files
3. View Screenshots
4. Using computer to attack websites
5. Remotely start sounds, movies, webcam, etc.
6. Control computer
Basically, it’s like you’re out there controlling a person’s computer—even if you’re not holding that computer itself. Here are the most commonly used RATS that you can try:
1. ProRAT. This is a backdoor Trojan horse which opens a port on the client’s computer that then makes it hard for him to connect to other networks, but only to Local Area Networks (LANS), and are almost impossible to trace—even with the use of antivirus programs. It steals passwords, formats drives, hides the taskbar, and gives you better control of the client’s files!
2. DarkCOMET. This RAT reverses the effect of programs you have in your system. It could save pictures stored on a computer—even on the cloud—spoofs IP, and ruins Server SOCKS. Wi-Fi Access Points are also compromised, making it hard for the client to make use of his wireless internet connection.
3. Cybergate. Cybergate is said to be fully controllable administration tool that gives you full control of a client’s computer—and everything in it.
Code in C Language
Take note that C is the base of all programming languages. If you want to hack into a system, it’s just right that you learn C Programming, as well. It is the most powerful programming—and hacking language out there.
C basically starts with:
//C hello world example
To test, you can try:
#define TRUE 1
And, make sure that you know more than one programming language
C Programming is not the be all and end all of all programming languages. Take note that various computer systems use different languages—and that’s why you have to learn other programming languages, too!
Some of those programming languages that you have to know about include:
1. Java. Java is object-oriented programming language that is also one of the most in-demand programming languages. It’s mostly used to create mobile apps, games, and makes other Operating Systems run on what you already have. (i.e., Windows runs on MAC, Mac runs on Linux, etc.)
To learn more, you can try: Lynda.com, Udemy.com, Oracle.com
2. Objective C. This is a general purpose language that is commonly used in the Apple Operating System. This is mostly used to create iPhone Apps.
To learn more, try: Mac Developer Library, Udemy, Mobile Tuts+, Cocoa Dev Central
3. C#. C# is known as a multi-paradigm language that combines principles of C, C+, and C++, and can also be used for different purposes.
To learn more, visit: Microsoft Virtual Academy, Lynda.com, Udemy
4. C++. This has great object oriented programming features and is an intermediate level language that powers major programs such as Firefox, Winamp, and Adobe, amongst others. It could also create video games and other high end applications.
Learn more by visiting: CPlusPlus.com, Udemy, CProgramming.com
5. Python. This is a server-side programming language that is used for high level mobile apps and websites. It’s one of the easiest language to learn as it uses simple syntax, and is quite readable even for beginners. This is used for certain programs such as Rdio, Pinterest, and Instagram, and is also associated with NASA, Yahoo, and Google.
Learn more by visiting: Codeacademy, Udemy, Python.org
6. PHP. Meanwhile, PHP is a programming language used to develop websites and enhance them into something better. Around 200 million websites worldwide are powered by PHP.
To learn more, check out: Codeacademy, Udemy, Zend Developer Zone, Treehouse
Learn more by visiting: Code School, Lynda.com
8. Ruby. Ruby is mostly used for website development, and for creating mobile apps. Like Python, it’s easy to write and understand, and is used on sites such as Groupon and Scribd. As a beginner, this is one of the first things you should learn about.
Try to learn more by visiting: TryRuby.org, Codeacademy, RubyMonk
9. SQL. Finally, there’s SQL, also known as Structured Query Language, which is used for informational websites such as SurveyMonkey.
Learn more by visiting: SQLCourse.com, Lynda.com
Remember: if you want to hack, you have to be patient—and you have to make sure that you keep on learning however way you can!