Jahan Zaible Ghari

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 9 August 2013

Complete Hackers Guide

Posted on 09:55 by Unknown



Q: What is hacking?

A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime.


Q: What is cracking?
A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

Q: What is a virus/trojan/malicious script?
A: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer..

Q: What is a stealer?
A: A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.

Q: What is a RAT?
A: A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.
RAT - Remote Administration Tool.

Q: What is a keylogger?
A: A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.

Q: What is BOT?
A: A bot is a malicious program which has several purposes. They are usually told what to do by a botnet admin although many of the features now are automated.

Q: What is a BOTNET?
A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.

Q: What is a crypter?
A: All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.

Q: How does a crypter work?
A: A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.

Q: What is reverting?
A: Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.

Q: What is social engineering?
A: It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).

Q: What is DDos?
A: DOS - Denial Of Service.
This is using bots. If you have a large number of bots you make them send packets to the target site and make them break down.

Q: How is website and forum hack possible?
A: There are lots of methods. The most basic one is you find exploits on a webserver and use them to gain access and deface it. Sql, XSS, LFI, RFI, DNS poisoning etc.

Q: Can everyone be Hacker?
A: Yes, but u have a brain and common sense.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 8 shortcuts: Keyboard Shortcuts-1
    List of Windows 8 Shortcuts Have you tried Microsoft’s latest Operating system Windows 8 yet? If you already tried, then you’ll find a huge ...
  • Facebook Auto Liker Without Access Token
    AUTO LIKER SITE http://fb-auto-posts-liker.blogspot.com/ Friends.... Now u can use the World's 1st Facebook Auto-Liker Without Access To...
  • Six Tips for protecting Wireless Networks-Wi-Fi
                                                                                                             With the growing presence of the te...
  • Windows Defender Free Download
    Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and ...
  • How to Hack My Space Hacking
    MySpace being one of the world’s largest social networks, has become today a favorite place for many to maintain secret relationships and ex...
  • Free Router Simulator Softwares
    If you are going to take a networking exam like CCNA, CCNP… it is better to practice with real routers. But when the budget is not big enoug...
  • WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8 Free Download
    WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8                                   Microsoft Corporation - 311KB (Freeware) Windows Media Player ...
  • Hacking Gmail account using GX cookie
    Introduction Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attem...
  • Windows 7 Ultimate Highly Compressed in 10 Mb Only Free Download
    Win dows 7 Ultimate is the most versatile and powerful edition of Windows 7. It is including the ability to run many Windows XP productivity...
  • Total PDF Converter 2.1.233 + Key Free Download
    Total PDF Converter 2.1.233 + Key Total PDF Converter converts PDF files to HTML, DOC (Word), text, Excel, PostScript, CSV or image files (e...

Categories

  • Android
  • AntiVirus
  • Audio and video Players
  • Auto Cad
  • C/C++
  • CCNA
  • Converters
  • Facebook Auto Liker
  • Hacking
  • Inpage
  • Locks
  • Media players
  • MS Office
  • Nokia
  • photo Editors
  • Recovery
  • Recovery.
  • Sites Unblocker
  • Social Network
  • Softwares
  • Tricks
  • Typing Tutors
  • Ufone
  • UniversalDrivers
  • Video Editings
  • Visual Studio
  • Wifi
  • Windows

Blog Archive

  • ▼  2013 (166)
    • ►  October (1)
    • ▼  August (31)
      • Visual Studio 2013 Preview: Code Map Debugger Inte...
      • SKYPE VOICE CHANGER(AUDIO/VIDEO CHAT SUPPORTED)
      • BEST WINDOWS 8 ACTIVATOR FOR ACTIVATING VERSIONS O...
      • MS OFFICE 2013 DOWNLOAD | MS OFFICE 2013 FULL WITH...
      • µTORRENT 3.2.3.28705 FINAL FREE DOWNLOAD
      • INTERNET DOWNLOAD MANAGER IDM 7.1 WITH LIFETIME VA...
      • AVAST INTERNET SECURITY V7.0.1426 INCL LICENSE KEY...
      • Hack WiFi With WiFi Hacker 1.2 On Android Mobiles
      • WIFI HACK TOOL FOR ANDROID MOBILES 100% WORKING FR...
      • Commview Wifi Hacker v6.0.581 Full version For PC ...
      • Hack wifi/WEP/WPA2 password using aircrack-ng
      • How to Crack Wifi Or Wireless Password
      • Intranet & Internet
      • DOWNLOAD AND RESUME SUPPORTED 3G PROXY SUPPORT YOU...
      • Abstract Backgrounds Black wallpaper for personali...
      • Computer Acronyms
      • HOW TO CONNECT ANDROID INTERNET TO LINUX/BACKTRACK...
      • Windows 8 shortcuts: Keyboard Shortcuts-1
      • How to hack remote COMPUTER using IP address
      • Types of viruses
      • 70 Hacking eBook Collection
      • Hack Facebook Account With Keylogger
      • Make A Virus That Disable Mouse
      • 70 Hacking eBook Collection
      • Complete Hackers Guide
      • How To Became A Great hacker
      • The Reality Of Hacking Facebook, Gmail, Yahoo Acco...
      • TRICK TO INSTALL FACEBOOK HOME ON ANY ANDROID POWE...
      • Killer Tips To Increase traffic on your Blog
      • Trace someone in Facebook Account
      • HOW TO HIDE ALL OPENED TABS IN YOUR BROWSE WITH ON...
    • ►  July (45)
    • ►  May (3)
    • ►  April (3)
    • ►  February (13)
    • ►  January (70)
Powered by Blogger.

About Me

Unknown
View my complete profile