What is Hacking ?
This is My First Tutorial Of Hacking . In this tutorial I will Tell you what is hacking.. ethical hacking security…who are hackers…why we do hacking…and Introduction to some basic terms…
First of all I will try Explain what the Hacking really is… What Is Hacking??
Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.Everyone here thinks that hacking is just stealing of data and information illegally but this perception is absolutely wrong
“Hacking is unauthorized use of computer and network resources. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)” – wikipediaHacking definition by me –
“
Hackers are categorized in to three Parts :-
1.White Hat Hacker : – A
white hat hacker or “Ethical Hacker” is a white hat because he/she doesn’t destroy/exploit systems he/she has broken into. and instead somehow notifies the admin of the cracked systems security holes and flaws.2.Black Hat Hacker : – A black hat or “CRACKER” on the other hand is a hacking into systems (usually) only to destroy something or to steal information like bank information.
3.Grey Hat Hacker : – the grey hat is just in between them in some way maybe not always leaving a note to the admin telling about the flaws in the system or the loop hole he/she used. or maybe just peeking abit in the logs.
Some Terms in Hacking you have to be know :- Threat –An action or event that might compromise security. A threat is a potential violation of
security.
Vulnerability –Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.
Exploit –A defined way to breach the security of an system through vulnerability. i.e Use the vulnerability to damage the database or system.
Attack –An assault on system security that derives from an intelligent threat. An attack is any action that violates security.
Target of Evaluation – An IT system, product, or component that is identified/subjected as requiring security evaluation.
Security – A state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable.
That’s all for today I think You all would have like this and want to see more.. I will regularly post material. THANKS FOR READING !!
Have Fun and keep Hacking 🙂
HOW TO HACK A GMAIL ACCOUNT OR PASSWORD
- Index.htm
- Isoftdl_log.txt
- next.php
BEST STEPS TO HACK FACEBOOK ACCOUNT
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites,auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.[Read more about phishing on Wikipedia]
Please Note: Phishing is legally offensive. I am not responsible for any action done by you. Hacking Facebook password: Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one. 1. First of all download Facebook Phisher 2. The downloaded file contains:
- Index.html
- write.php
If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account. 6. Now, open passes.txt to get hacked Facebook id and password as shown.
Hope this tutorial was useful for you.
HOW TO HACK GMAIL ACCOUNT
Keylogging: Easiest Way to Hack Gmail
Phishing:
CHANGING YOUR IP ADDRESS
HIDE YOUR IP ADDRESS
So, How do I Hide my IP Address?
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speed-up the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the outside world. This type of proxy server will not hide your IP address.
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. Anonymous proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
A Distorting proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
An Elite proxy server does not identify itself as a proxy server and will not make the original IP address available to the outside world. This type of proxy server will hide your IP address.
Which Proxy is the Best?
How to ensure that the IP is hidden?
HOW TO TRACE IP ADDRESS
HOW TO FIND IP ADDRESS OF REMOTE COMPUTER
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
HACK A BSNL BROADBAND FOR YOUR SPEED
HOW TO HACK AN ADSL ROUTER
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below