What's new

Closed Megah(a)cking - everything you need to know to become a h(a)cker.

Status
Not open for further replies.

Strawberrry

Forum Veteran
Joined
Aug 2, 2016
Posts
1,598
Solutions
4
Reaction
633
Points
524
LEAVE A POST SAYING THANK YOU IF IT HELPS (kayo napo bahala sa mga censored umintindi words)
In response to a user's question asking "what do I need to know to become a h(a)cker ?".

In this post I am regrouping what ethical, black hat and grey hat h(a)ckers think are the essential skills and knowledge any pen tester should know:
At the top you will find all the essential tools and knowledge one must learn to become efficient and skilled at penetration testing, and at the bottom, the second part explaining what each of these things are.

PART I: THE ESSENTIALS
Some of these tutorial are simple or PoC but I strongly suggest you find books on each of these subjects before you say you understand how this works.

Start by learning how TCP/UDP works (networking): You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now.
You must know the fundamentals of HTTP and how Structured Query Language databases work.
You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now.

Learn HTML, install a Linux OS preferably KALI Linux on a virtualization program like VirtualBox (free) or VMWARE (ρáíd).
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.
You do not have permission to view the full content of this post. Log in or register now.

Learn basic Debian commands to feel comfortable using KALI and download the KALI hand-book:
You do not have permission to view the full content of this post. Log in or register now.

Learn how to be anonymous using Tor, proxychains, Whonix and VPN's that don't keep logs (mullvad), MAC spoofing, DNS spoofing.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Learn to use BurpSuite, nmap, and once you really understand SQL try sqlmap.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Learn your way around Metasploit(=)Armitage but before that understand the different OS vulnerabilities by searching their CVE.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Understand WEP/WPA/WPS, watch out for KRACK which will be released soon and we might learn how to ***** WPA2.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Once you have understood these find out about the air-ng suite, air*****-ng, aireplay-ng and others.
You do not have permission to view the full content of this post. Log in or register now.

Learn how to use tamper data, sniff networks and to accomplish MITM attacks.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Learn about wireless adapters and their different modes.
You do not have permission to view the full content of this post. Log in or register now.

Learn how to "automate" vulnerability scanning with Nessus.
You do not have permission to view the full content of this post. Log in or register now.

Learn about XSS, RFI, LFI. Don't learn how to DDoS (joking).
You do not have permission to view the full content of this post. Log in or register now.

Understand the ins and out of the OSI model.
You do not have permission to view the full content of this post. Log in or register now.

Learn how to create a backdoor, what shells are and the definition of a 0-day.
You do not have permission to view the full content of this post. Log in or register now.

Brute-forcing and Dictionary attacks.
You do not have permission to view the full content of this post. Log in or register now.

Hash cr(a)cking:
You do not have permission to view the full content of this post. Log in or register now.

Learn how to use google dorks (google häçking).
You do not have permission to view the full content of this post. Log in or register now.

Learn what are DNS, how to do whois lookups.
You do not have permission to view the full content of this post. Log in or register now.

Learn the most important port numbers.
You do not have permission to view the full content of this post. Log in or register now.

How to spoof a phone number.
You do not have permission to view the full content of this post. Log in or register now.

Research different scripting languages, check Rubber Ducky and these kind of hardware tools everybody talks about.
You do not have permission to view the full content of this post. Log in or register now.

Learn how to create java-drive-by's and browser based infection methods.
You do not have permission to view the full content of this post. Log in or register now.

Understand how AV's work and how to create malwares and how to crypt them.
You do not have permission to view the full content of this post. Log in or register now. || You do not have permission to view the full content of this post. Log in or register now.

Social Engineering or how to lie. I won't discuss this here but here is a book on persuasion:
You do not have permission to view the full content of this post. Log in or register now.

Once you have learned all that maybe you can start learning the advanced stuff. Of course, I hope you will become a white-hat and help people with their security instead of breaching it.

PART II: GLOSSARY

TCP/IP (Networking):

Computers themselves speak to each other across a network through the use of packets. In essence the base unit of communications in the world of computer networks is the packet. Packets themselves are most commonly built using the TCP/IP stack, which is part of the computer's operating system. Each operating system has some unique values coded into its implementation of the TCP/IP stack. This is how OS fingerprinting works, by studying these unique values such as MSS and MTU among others. It has been said before that to recognize the abnormal you must first understand what is normal. This is why we need to understand what a normal TCP/IP packet looks like and how TCP/IP itself sets up communications between computers.

Why is HTML important in pen-testing ?:

First because everything page you see on the web are displayed to some extent using HTML. It is the minimum to know the most basic language which carries the most content on internet. Also HTML injection is an attack that is similar to Cross-site Scripting (XSS). While in the XSS vulnerability the attacker can inject and execute Javascript code, the HTML injection attack only allows the injection of certain HTML tags. When an application does not properly handle user supplied data, an attacker can supply valid HTML code, typically via a parameter value, and inject their own content into the page. This attack is typically used in conjunction with some form of social engineering, as the attack is exploiting a code-based vulnerability and a user's trust.

Why Kali Linux and why in a Virtual Machine(VM) ?:

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.[/size]
  • More than 600 penetration testing tools included.
  • Free and always will be.
  • Open source
  • Developed in a secure environment
  • Multi-language support
[size=large]
You don't have to use a VM but it allows you to run KALI and your default OS simultaneously, its facilitates some anonymity features and doesn't force use to boot from a USB or install in on the Hard drive of your computer.

Why learn Debian commands ? Don't need spoilers for that one, in my opinion it is important to know your way around the system you use and learn the basic terminal commands that are packed within.

Why use Tor, Proxychains, Whonix or a VPN ?:

During the penetration testing or vulnerability assessment or häçking, staying anonymous is one of the important factor.
If you are a black hat, you also don't want to get caught. Without it, the internet connection will reveal your identity. ProxyChains is proxifier for linux system. It allows TCP and DNS tunneling through proxies. It supports HTTP, SOCKS4 and SOCKS5 proxy servers. It uses multiple proxies at a time, so it is called Proxy Chaining. In the tutorial you will be taught to use proxychains through the Tor network.
Whonix is also a very good way to stay anonymous and makes use of the Tor network with its own gateway.
MAC Spoofing allows you to change your MAC adress which is your computer's ID. Your MAC address points to your PC's brand and can lead to you when deep searching.

Why use nmap, Burpsuite and SQLMAP ?:

BurpSuite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals to identify vulnerabilities and verify attack vectors for web-based applications.

In its simplest form, Burpsuite can be classified as an Interception Proxy. A penetration tester configures their Internet browser to route traffic through the proxy which then acts as a sort of Man In The Middle by capturing and analyzing each request and response to and from the target web application. Individual HTTP requests can be paused, manipulated and replayed back to the web server for targeted analysis of parameter specific injection points. Injection points can be specified for manual as well as automated fuzzing attacks to discover potentially unintended application behaviors, crashes and error messages.

Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Why learn to use the Metasploit Framework ?:
Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit framework has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems. It is the most renown framework used to exploit systems.

Why understand WEP/WPA ?:

If you want to become a professional pen-tester you will have to learn about WEP/WPA encryption because the whole wireless ecosystem resolves around these encryption, understand these will give you greater power when *****ing wireless networks.

Why master the air-ng suite (use for wireless häçking) ?:
Most if not every Wi-FI *****ing methods involve using air*****-ng. Learning how to use these tools will allow you to ***** most wireless network.

Why learn how to perform MITM (man in the middle) attacks, sniff networks and tamper data?:
In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data is then forwarded to the intended destination unaltered.

Sniffing and snooping. They refer to listening to a conversation. For example, if you login to a website that uses no encryption, your username and password can be sniffed off the network by someone who can capture the network traffic between you and the web site.

Spoofing refers to actively introducing network traffic pretending to be someone else. For example, spoofing is sending a command to computer A pretending to be computer B. It is typically used in a scenario where you generate network packets that say they originated by computer B while they really originated by computer C. Spoofing in an email context means sending an email pretending to be someone else.

Tamper Data is an add-on for Firefox that lets you view and modify HTTP requests before they are sent. It shows what information the web browser is sending on your behalf, such as cøøkíés and hidden form fields. Use of this plugin can reveal web applications that trust the client not to misbehave.

What is Bruteforcing ?:

A brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

Why learn XSS, LFI, RFI ?:
Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

Remote File inclusion (RFI) refers to an inclusion attack wherein an attacker can cause the web application to include a remote file by exploiting a web application that dynamically includes external files or scripts. The consequences of a successful RFI attack include Information Disclosure and Cross-site Scripting (XSS) to Remote Code Execution.

Remote File Inclusion (RFI) usually occurs, when an application receives the path to the file that has to be included as an input without properly sanitizing it. This would allow an external URL to be supplied to the include statement.

Local File inclusion (LFI), or simply File Inclusion, refers to an inclusion attack through which an attacker can trick the web application in including files on the web server by exploiting functionality that dynamically includes local files or scripts. The consequence of a successful LFI attack includes Directory Traversal and Information Disclosure as well as Remote Code Execution.

Typically, Local File Inclusion (LFI) occurs, when an application gets the path to the file that has to be included as an input without treating it as untrusted input. This would allow a local file to be supplied to the include statement.

What is a backdoor in Pen-testing ?:
Attackers can install their own backdoor on a targeted system. Doing so allows them to come and go as they please and gives them remote access to the system. Malware installed on systems for this purpose is often called a remote access Trojan, or a RAT, and can be used to install other malware on the system or exfiltrate data.






 
Instead of dedicating time and energy learning these "tools", why don't we focus learning the basics first such as OSI Model of TCP/IP, network routing and switching, filesystem layout and traversal in *nix systems, finding files and folders, basic of shell and text editor. IMHO, time and energy is better invested by learning the fundamentals first.
 
Great Tutorial TS! Nagsawa rin ako in the past sa hax na yan. ang masasabi ko lang learning all this will make anyone safe in digital world everytime nagbro browse sa internet. Awareness helps. maski hindi tayo blackhat atleast may naitutulong parin yung awareness. Iba na kasi talaga ngayon. isa pa, kapag computer related course ang kinuha, a "must" talaga ang may understanding sa ganito lalo na kapag Computer Networks ang work or kung Software Quality Assurance related works i guess.
 
what if may isang tao ako gusto ko laruhin fb acount niya at computer nila sa ofice at internet nila dun?
panu po? any step by step method?
 
pls i wana know how? laki ng atrasu ng taong un saken...need ko siya pag tripan. mali pag sa harap harapan kasi autoridad.
 
This tutorial is for Script Kiddies.
Script Kiddies - Using someone's application and claiming that you häçk someone without telling them that you were using someone's application.

Except for :
Reverse Engineering
Actual Programming etc.

Although this give's knowledge for everyone who is currently wanting to be an ethical häçker (a person who häçks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.)

There are 2 sides of häçking :
White Hat
- The term "white hat" in You do not have permission to view the full content of this post. Log in or register now. refers to an ethical computer häçker, or a You do not have permission to view the full content of this post. Log in or register now. expert, who specializes in You do not have permission to view the full content of this post. Log in or register now. and in other testing methodologies that ensures the security of an organization's You do not have permission to view the full content of this post. Log in or register now..

Black Hat
- A black hat häçker (or black-hat häçker) is a häçker who violates computer security for personal gain or maliciousness.

You can either be one of these 2 sides.

Being a Black hat and doing îllégâl things such as breaking the law. "YOU" can be prison prier to that.
 
Status
Not open for further replies.

Similar threads

Back
Top