First of all I wanna tell you that hacking is a
art. I am teaching you this art so that you can
make yourself more secure. I don't want you
to use my techniques to harm others because
hackers never harm others, crackers do. And
we are Hackers not cracker.
There are 5 easy steps to learn Hacking :-
1. Take all safety Measures to hide yourself
from target.
There are lots of techniques to hide yourself
from target computer. I recommend you to
use as much techniques as you can.
I am mentioning few important tricks below :-
Use Hide Ip Software :- This
software will help you to hide
your IP address .
Use Firewall :- Firewall secure
your computer as well as
restrict any personal
information from going outside.
Use Proxy servers :- Whenever
you want to surf the computer
of your target use proxy
servers.
Use others username and
password :- Try to avoid using
your own user name and
password for internet
connection. Learn the technique
to get other's user name and
password.
2. Find out the IP Address of Target
Computer.
what is Ip address :- It's full
form is Internet Protocol
Address. Protocol means the
way computer talks to each
other and Internet protocol
means , way in which two
computer talks to each on
internet. So the complete
meaning of Ip address is
address of a computer who
wants to talk to other
computers on internet.
There are two
important things
Use of IP address in Hacking :-
Ip address is one of the most
important part of hacking. To
learn its importance in hacking
first of all we need to know
what is hacking. All i can say
here is that if we don't know
the ip address of target
computer we can't able to
move single step forward in
getting access to target
computer.
Ways to find out IP address :-
Ping
tracert
dns query
3.Gather information about target computer
such as its operating system ,time,date etc
etc .
What 's the need ?
To be able to
know weaknesses
of target
computer.
To exploit those
weakness.
Learn more how
we can exploit it.
How to gather information?
Telnet
Dns Query
Port Scan
tracert
4.Use Search engine (according to
information obtained from above steps) to
get tools which will help us to hack target
computer.
Search engines like google are very close
friends of hackers. If we do all the things
mentioned above we know exactly where
vulnerability lies in target computer. To use
that vulnerability we search for available
tools on google.com. After downloading
specific tools we need IP Address of target
computer ( we already know) to get access
on other computer.
Learn to use that vulnerability
5. Leave one or two files on the target
computer so to get easy access in future.
To get access again and again hackers usually
leave files on target computer. For eg Net cat
which allow them to get access again and
again. Download netcat
0 comments:
Post a Comment