Hacking

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 20

HACKING

Today the word hacking is a glory of a person. But don't think it is an easy job. Generally the word Hacking tends to have a negative effect on people. They believe that "HACKERS" are computer criminals or who cause harm to the system; But I don't blame them for holding such a negative opinion. As in this fascinating world, different types of people have different thoughts; so, you don't have to change their thoughts. Therefore, it is divided into three categories Black Hat Hacker, White Hat Hacker and Gray Hat Hacker (later we discuss about it). In reality, Hackers are good, pleasant and extremely intelligent people, they are expert in programming languages and networking wizard. They use their knowledge in a constructive manner helping organization, government forums etc. Traditionally, Hackers were computer geeks who knew everything about computers (software, hardware, networks). But over the years, reputation of hackers has been going down due to some bad guys. They are technically sound in software and networks developments. They have incredible ability to find out the way of doing the impossible. They find the Hole or Vulnerability to the system and report for any bugs to Administrator. They break free from restriction and discover new hidden features. You see, Hacking is about Knowledge. Hackers are those really intellectual people who have the Extra Bit of Information. THEY KNOW OF THE THINGS THAT NORMAL PEOPLE WOULD ONLY DREAM OF.
World is having lots of fascinating problems, Know your turn to solve it.

STEPS OF LEARNING HACKING

Ok, lets get down to it.


General rule: - Why do you want to learn hacking? First of all, clear your goal, then go in this profession, because it is not as easy as you think. This field is very interesting as well as very frustrating and lots of time consuming. So if you have lots of time and patience, then go ahead, keep it up.
Step 1.

Reading is a main step of hacking. You must have to read everything. If you don't like to readthen good luck, you should look into a different hobby.
Step 2.

Learn some languages good start to learn "Python", "C","Java" don't go to learn like visual basic otherwise you just bound with windows platform.
Step 3.

Spend lots of time in reading and learning, I know sometimes it is very frustrating but you have to be patient because fruits take time to ripe.
Step 4.

Make a note and write down what you don't understand. And after that go to some hacking forums and discuss your topics and try to understand these things. Go deep inside these topics which you are discussing on forums.
Step 5.

Now the main part of this profession is to perform lots of experiments, because it is self learning profession and you can't expect that someone'll teach you properly and you'll become a hackerLoL.
Step 6.

When you perform an experiment, sometimes it works and sometimes not, don't be panic just Chill, take a long breath and concentrate on your work, find out WHY IT IS NOT WORKING? Go to your favorite search engine and find the stuff regarding to your topic. Second scenario, if it works, then don't be happy, just find WHY IT WORKS and HOW IT WORKS? Because hackers have to know everything.
Step 7.

Learn World Wide Web. It doesn't mean that you have to just drive a browser. Learn HTML, XHTML make your own home page.
Step 8.

Get any Open Source likeLINUX and learn to use and run it. This is open source operating system which is distributed in binary form. This is very powerful operating system and contributed by the whole world. Most interesting thing is that you have legal rights to modify this operating system according to your need. Join open source forums (LINUX FORUM) and keep reading on open source.
Step 9.

Learn writing good programs because hackers are expert in developing a program. You have to show dedication and adopt habit to write good programs. Write Open Source Program and distribute also help other open source software to find bugs and fix it.
Step 10.

Hacking is a free style computing so you have no restrictions to perform any experiment with your system, languages and hardware. So just tight you seat belt and enjoy your own ride

CHAPTER 0-->INTRODUCTION 2 HACKING ERA. HACKING, FIRST OF ALL WAT IS HACKING ? HACKING IS NOTHING BT BREACHING IN TO A COMPUTER OR IN A SYSTEM OR IN A SOFTWARE RELATED THING,IN VCH ACCESS IS NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A CYBER PLACE WHERE U DONT HAVE RIGHTS 2 ENTER. IT IS D PERFECT ND MOST APPROPIATE DEFINETION OF HACKING...AGRY? SEEMINTERNET IS NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992. ACTUALY INTERNET HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A GENERAL HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN . NOW U MAY THINK INTERNET IS NT VERY MUCH OLD. NOW TYPES OF HACKERS---->MOST OF D PPL THINK THEY R OF 2 TYPES.ONE IS ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL HACKER..NO,DTS NT TRUE. IN REALITY.HACKERS R OF 3 TYPES.

FIRST--->WHITE HAT HACKERS--->THEY R ETHICAL HACKERS.THEY JUST WORK AS A SECURITY EXPERT IN ANY BANK/SOCIETY/ONLINE COMPANY. THEY JUST FIND VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R ETHICAL HACKERS ND NEVER HARM ANYTHING . SECOND TYPE---->BLACK HAT HACKERS--->THEY R UNETHICAL HACKERS.THEY JUST FUCK ANY ONLINE SYSTEM.THEY DO IT 4 FUN OR MONEY.IT MA SEEM VERY FUNNU BT APART OF FUN ND MONEY THERE IS NO3RD ISSUE 4 VCH HACKING IS DONE. THIRD TYPE----->RED/GREY HAT HACKER--->THEY R D PERSON WHO DO HACKING 4 MONEY .IF U VL PAY THEM MONEY THEY VL SECURE YEW COMPANY IF U VL PAY THEM MONEY THEY VL HARM ANY WEBSITE OR VATEVER U VL SAY 2 THEM 2 DO. AS I TOLD U PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN PUBLIC LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS CRACKER. WHO IS A HACKER---->NOW THESE LINES R GOING 2 SHAKE UR MIND ABOUT UR CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND FIND VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS GENERALY A PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A ONLINE SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2 SEARCH NEW HOLES.

PREREQUISTS 2 LEARN HERE HACKING------->if u r thinking vdout knowledge of launguages u cann't do hacking then this is nt true .i know c,c++,v.b.,nd some java bt i have never applied these.there4 all u need 2 learn hacking is ur dedication nd trust in me . trust me,if i vl be wrong anywhere then moderators nd piyush vl make dt thing right.oki.... D MOST ESSENTIAL THING,PLZ READ THIS TOPIC VERY VERY CAREFULLY-->

plz make urself very much sure that u r having winrar in ur computer.i vl give here many softwares .they vl be in rar files , having them is necessary. nd plz plz plz upload a second windows in ur computer.make urself sure u r having windows xp in ur system nd have 2 different windows xp in ur system. on first windows xp do ur neutral work nd on d second windows xp ,turn off firewall nd dont install antivirus. here i vl give u some tools ,2 whom ur antivirus vl nt allow 2 work der4 plz have a second windows in ur computer.such a topic in vch u vl be needing 2 have second xp ,vl come in a week.der4 in next 1 week definetaly upload second windows on ur system . let's start hacking now.introduction is over ..actually there r many things 2 explain bt i think it vl spoil d interest . let's jump 2 d next chapter.

EXPLOITING IP ADDRESS. IP ADDRESS STANDS for internet protocol address. your ip address is d unique address on vch data r sent 2 you. ur internet service provider make hiMself sure dt datas r going 2 u bcoz he is sending data on d address specialy assigned 2 you. getting ur own ip address----> click on start,go on run,open run type cmd hit enter a command prompt vl appear write der netstat -n nd hit enter a list vl appear..look at local address .d first local address is ur ip address. d second method 2 get ur ip address is open whatismyip.com on dis site u may easily know ur ip address. writing netstat is more good dis command tells about all ip address vch r connected 2 u dis moment. memorize dis small list ftp---->21 smtp--->25 dns---->53 http--->80 https---->81 pop3---->110 telnet--->23 these r port no.s.

TRACING IP ADDRESS-------> i know many of u know dis thing,tracing some1 but i vl tell u here many new nd exiting ways. let's start. first of all,vat is d need we have 2 trace any1?

see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp. thing is 2 get his ip address. untill d moment u vl nt be knowing his id address how can u do anything? here i vl teach u only tracing ip address. attacks vl come in future. let's start ,be prepared 4 knowing many new ways 2 trace any1. click on start>run>type cmd>hit enter write tracert websitename hit enter now some information vl come automatically u vl see written der[mind written in blue clr] tracing route 2 wensite name[ip address of d website] nd then many more things. yes nw u successfully got d ip address of d website.it is really very easy. d line vch i hv written in blue clr vl be d first line automatically came nd in dt first line u may see d ip address of d website.now in second line u vl see written. over a maximum hops of 30

explanation of hopes nd dis thing------------>see,wenever u open any website u just send some data 2 dt website 4 vch dt website replies u nd den u send some data gain nd dis process continues ,nw suppose dt after of writing tracert google.com ,ur data packets reached 2 google.com ,now google vl try 2 reply u,bcoz google is a very big website ,it take help of many servers ,replies 4m google vl come 4m dese servers . now look at ur command prompt.der u can see written tracing vd a maximum of 30 hopes.here u r getting ip address of d servers 4m vch datas r processing 2 u . here u vl see * dis sign in some places,here they have fixed firewall,so dt u cann't attack easily. written * means der is a firewall,bcoz tracing any1 is very easy,der4 de webmaster fix some firewalls so dt no1 ud be able 2 attack on dem properly. i think u ppl r geting me. A GENERAL MISCOnCEPTION------> I KNOW DIS THING IS NT RELATED 2 IP ADDRESS bt it is very much essential 2 tell here ,see most of u think on internet we cann't get highly sensitive information..dis is nt true.on internet many person has posted rapidshare accounts vch u need very much bt d problem is u donno where it is?d same thing is vch other things also.on internet many ppl has written many highly secret things about a website bt we donno dt . here all u have 2 make urself clear that on internet u can get highly informative topics also.oki? let's moov 2 our original place. see, nslookup command wen u applied , u may see written der .u r nt authentized 2 dis route. is der something wrtten like it? i know der is.now u can think d importaince of dis command. now 4 getting ip address nd 4 getting many sensitive information about a website u may also use these websites. open samspade.com nd open dnsstuff.com nd open

whois.net on these websites just enter d name of any website nd dis website vl give u each nd every inforamtion about dt website.u may also write down here any ip address nddese sites vl tell u each nd every thing about dt website. it is really very cool....plz open al d websites nd try 2 get d inforamtion of orkut.com nd google.com nd ur college's website.u may easily know ur college is taking who's help 2 give u internet . u may also know wen a website has been made nd each nd everything about dt website. try on orkut nd google nd ur clg website now.

gathering information is d first job of a hacker.untill d moment u vl nt be aware about each nd everyting about a website or about a ip address u cann't do anything...der is a name of gathering information thing and dt isreconnaisance i think on a website now u ppl easily can do reconnaisance. it all was about tracing a website nd 4 gathering inforamtion about a website . now jump 2 learn how 2 trace a person. mind it till now u did trace onlu a website. tracing a person is also easy.no.no..it is very easy. see, first of all we will learn 2 trace a person who has sent u a mail thenwards we vl learn 2 trace a person vd whom u r doing chatting.

TRACING A PERSON WHO HAS SENT U AN E-MAIL open ur mail box ,open any e mail.now click on reply .now click on show original. view whole d data written der.now u may find dt person's ip address...in show original column u may find dt person ip address but if some1 has sent u mail 4m gmail.com then u cann't get his ip address 4m dis mehod. actually gmail uses https[secured=s] there4 u cann't get his id addres. but there is an way 2 trace g mail also.wait i am writing. now dis trick is 4 tracing gmail,yahoomail,hotmail nd 4 all mail services. 4m dis technique[vch i am going 2 write down]u can trace all email's ip address. first of all open readnotify.com register der. now wenever u vl be needing to trace any1 then compose a mail 2 him nd in email to section write victim'semailid.rednotify.com nd send him d mail.wen he vl read ur mail ,a mail 2 ur readnotify wil go automatically nd by opening ur readnotify account der u can see dt person' ip adderess. actually readnotify sends an automatic generated image vd ur mail nd dis hidden image gives u victim's ip address. dis technique is very good.

HOT SHOT---------------->AFTER OF TRACING A PERSON 4 KNOWING WHERE HE IS,ND 4 KNOWING IN VCH COUNTRY IN VCH STATE ND IN VCH CITY HE IS? JUST OPEN ip2location.com

here on dis website put d ip address of dt person nd u vl get 2 know his physical appearance.dis thing is also possible 4m telnet bt leave dt .dt is very complicated.

---------------------->TRACING A PERSON VD WHOM U R CHATTING<----------------well, if u r chatting vd a person then simpally ask his ip address if he tels then its ok. bt vat if he does nt tell?hehehe LOLZ anyway see,here r some cases.some different cases nd u must hv 2 do different operation vd different massengers. wait i am writing. well, in dis section first of all i ud like 2 remind u d working method of netsta -n command vch i wrote previously. netstat command gives u d information of all the communication vch u r doing vd internet.i mean,suppose dt if u r connected 2 orkut nd g mail nd any porn site at a single instant then netstat tells u about all they 3 server's ip address. this moment there r many massengers vch ppl use ,,,4 example--->icq massaneger,msn,yahoo massenger,g talk massenger nd many more ,ppl also use some sites like meebo.com 2 use masenger. now der r some cases

-------------------->CASE [1]<-----------------------if u r chatting 2 some1 on icq massenger then here is d working method of icq massenger you------>ur freind ur freind---->you well,this thing makes very easy 2 trace some1 while chating on icq massenger,wen u r chatting vd him then b4 of starting chatting just open run type cmd hite enter nd write netstat -n mind it ,till now u hv nt done started chatting vd him,now many ip address will come,simpally note down them somewhere, now start chatting vd him, nd while chatting vd him again open run,type cmd hit enter nd type netsta -n now u vl see,a new id address. bingo,now u hv got d ip address of ur freind

------------------->CASE [2]<---------------------CHATTING ON YAHOO,MSN,G TALK MASSENGER these massengers works in dis way, you------->massenger's server------>ur freind if u vl do d previous operation then u vl find massenger's ip addres. here,u may use social eengineering, social eenginering is d next chapter bt here a small introduction. social eengineering mans making some1 fool nd hacking him, in dis masenger case[mind it most of d massenger follow dis way]simpally say ur freind

2 send a file or 2 recieve a file,if he agrred then just do previous operation. when he vl send u d file then it vl nt come thru massenger ,it vl directly come 2 u nd by writing netstat -n,u may find 1 more ip address dt is of ur freind. or der's a 1 more method,u may say him 2 mail you or write a mail 2 him nd use readnotify thing,vch i told previously nd now wen he vl send u mail or wen he vl reply 4 ur mail,u can get his ip address. confused

--------------------->CASE [3]<------------------------TRACING SOME1 WHILE CHATTING ON MEEBO.COM TYPE ONLINE MASSENGERS. , here's no method 2 trace him apart of saying him 2 send a mail 2 you or u may send him a mail nd wen he vl reply u vl get or u may say him 2send u a file. dt's it. well, tracing some1 is nt a big job nd u can do it very easy.

der r some more commands 2 find ur id address nd der r many more things about ip address,der r 4 different types of ip addresses, der is subnet id nd hostid named things exits,u can open a website by writing dt ip address only in d url nd der r some hexatransFer,qustra transfer named things also exits but trust me de things r of no use. u may get each nd every information abour ur ip address by doing dis open run ->type cmd write ipconfig/all dis will tell u ur smtp,dhcp information nd many things,writing only ipconfig in command prompt vl also give u many information nd writing inconfig/series will also give bt netstat is fine. only ipconfig/all is a good syntax 2 give u ur onw all informations tracing ip address is completed now. i m nt writing divisiond nd more useless stuffs about ip address,all d things i told previously r enough 4 ip address bt still if u ppl want 2 know more about ip address then write in mine help desk,i vl tell u .i m waiting 4 u ppl reply der. we,, we will moov back 2 d learn doing proxy[changing ur ip address] again but after of next 3 chapters,i m not writing proxy nowbcoz 2 clear u d purpuse of doing proxy is very imp. in next chapters u ppl vl learn cracking,social eenginering nd hacking in 2 other person's comuter .after of these 3 chapters we will study 2 do proxy. be ready freinds,we r moving 2 hack now.

------------------>CHAPTER 2 - SOCIAL ENGINEERING<-----------------social enginering is a very small chapter,it is nt only related 2 internet arena bt it is also related 2 ur social nd general life.u do flirt vd a girl dt is social engineering.saying lies 2 some1 4 making ur own work succeed is also social engineering.social engineering is nothing else but 2 do some crooking vd some1 4 making ur own work completed.suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout

trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing. let me tell u d first story of hacking. it held thru social engineering. in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee. ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world. just look at d whole incident,he just thought nd used a small whistle. it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work. suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password. ------>STANDARD DEFINITION OF SOCIAL ENGINEERING<--------------------------[1]social engineering is d human side of breaking in to a corporate network companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone. sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim" on dese places everyday thousands of ppl give der credit cards information easily, der r 2 types of social engineering [first]HUMAN BASED SOCIAL ENGINEERING IT IS CATEGORIZED IN 2 DESE PARTS -->impersonation --->posing as imp. user --->3rd person approcah --->technical support --->COMPUTER BASED SOCIAL ENGINEERING<------------these r classified in dese -->mail/im attachments -->pop up windows --->sweepstakes --->spam mail d second chapter is over now. wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering. mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering. we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.keep waiting,

------->CHAPTER 3- SEARCH ENGINE OPTIMIZATION<------nowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER. THESE R D NEXTCHAPTERS. LET'S START learning seo. Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives u more than 100000 pages nd it is very much difficult 2 find ur exact needed thing in a single shot.SEO gives u d exact thing vch u need exactly.let's start SEO go here, http://newyears.noo.com/noo/m/browse...wevent/id/518/ plz mind d words,written in red colours.nw here u can see written dis line "New Years Eve at Pink Elephant" this is dCOLOR="RED"] "title"[/color] of dis web page d link vch i posted above is d "url" nd all d data vch has written der is "text" now,suppose dt u vant 2 search anything on google nd u want 2 search 4 forum then simpally type inurl:forum i mean wenever u hv 2 search anything in url ,write inurl:desired thing wenever u hv 2 search in text write intext:desired thing wenever u hv 2 search anything in text write intext:desired thing well, i know most of u r knowing these things already bt d ppl who r nt knowing these,plz try 2 understand dis thing,vdout SEO,u ppl vl feel a lot of problem while hacking a website 4 sql injection,searching cracks on internet nd 4 deirectry transeversal ,it is very much essential thing well,

now do some practice vd d thing vch i wrote here suppose dt u want 2 search d new year celebration then simpally write in google intitle:new year celebration if u vant 2 search any websit's login page then type intext:login inurl:website address nd search 4 . now suppose dt u want 2 find anything in a specific website then use dis syntax site:website fulll address d thing vch u want2 search in dt website dis syntax is really very good. NOW SUPPOSE DT U WANT 2 SEARCH ANY PDF TYPEFILE OR doc type file then simpally use dis syntax filetype:pdf d next thing in SEO IS RELATED NAMED STUFF,u know dt yahoo is a search

D SUMMARY OF D CHAPTER [1]4 searching something in url use"inurl:" [2]4 srching in title use"intitle:" [3]4 srhcing in text use "intext:" [4]2 get a file of specific type use "filetype:: [5]2 restrct ur search in a website use "site:websiteaddress urdesired seacrhing item" [6]2 get information about a website use"info:website full addres" [7]2 get related type sites type"related:website ful address" [8]2 nt appear a syntax in ur srch results use a minus[dash] sign. to d person who r reading this type thing first time,i m requsting them 2 do very much practice vd all of dese syntaxes. a good person always searches by dese techniques.u can find many books related on google ,i hv read all of dem nd thenwards i hv written all d results driven 4m dem.

CHAPTER 4-SOFTWARES AND CRACKING <------------------

well,this chapter may seem some funny in starting bt bcoz d course has been started vd 100% basics there4 itis very much essential 2 describe it. anyway, softwares r nothing else but complicated programmes written in many laungugaes nd in assembly laungugage,softwares just tells 2 ur hardware nd 2 oder softwares 2 follow a specific work,today in dis modern arena there r milion of softwares available, some of dem r freeware nd some of dem r shareware. a freeware software is a free of cost software,u may get any freeware software on download.con,filehippo.com bt most of d softwares need money 2 work on ur computer,in dis era 4 a specific work der r many softwares der4 all d companies who makes softwares givesu a demo version of a software,demo version comes 4 free,suppose dt ider is a software vch cost is 99$ then u can get this software 4 free also bt in dt case u vl get only demo version,demo version does nt contain itself all d function of dt software nd demo version comes 4 15 days/30 days,after of dt u cann't use dt software again. u cann't imagine a comuter vdout software. till here we talked only about leegalthings. let's moov 2 cracks,crac/patching exe/working serial r provided 2 u by hackers .if a software needs money then in dt case byapplying its crack u may use dt software 4 free,bt this is really nt leegal bt in dis modern era many ppl r doing this there4 de webmaster ignore this crack thing.

now,der r some softwares vch crack u can not search. actualy,after installing dese softwares de software need 2 connect vd internet nd then at d server of dt software maker comapny they wathc,that u hv bought this software or it is crack,but this thing is only vd very few softwares. in dis modern era a person upload d software's crack on a website nd then other ppl download it.some person also upload cracks on torrents,torrents can be downloaded by using torrent downloader ,a good torrent downloader is "bit torrent"u can get bittorrent on download.com

as i previously told u dt a cracker is a person who only searchs tricks on internet ,nw if u can search softwares crack on internet easily then u can say ursekf a cracker,u vl be awarded vd d name of a cracker if u can search softwares crack on internet, see,in dis modernm era nearly all d softwares r uploaded on rapidshare .com or on torrents. whoever upload,generally he gives its link on his forum or blogspot der4 nowwards wenever u vl be needing any software's crack,all u need is to search 4 d below string nd u vl get ur desired software. inurl:forum intext:rapidshare intext:software's name hit enter nd u vl get ur software very easily. 4 searching on torrents use dis inurl:torrent intext:software' name

U CAN ALSO SEARCH SOFTWARES ON DESE SITES IF U VANT 2 rapidshare links then go on rapidsharesearchengine.com,filez.com nd 4 searching on torrents go on these sites www.torrentz.com, www.torrentreactor.com, torrents.to enjoi freinds .now u can say urself a successfull cracker. cheers. see,seo vl give u d exact result ,this is nt necessary,SEO just increases d chances of getting something easily. somtimes SEO does nt give a proper result.nvr mind dt. 4 searching software's on rapidshare u may use dese sites [1]www.filez.com/ [2]rapidlibrary.com/ [3]rapidshare-search-engine.com/ [4]www.filecrop.com/ [5]rapid.tvphp.net/ [6]www.rapidsharelink.com/ [7]www.rapidsearch.in/ [8]www.rapidshare1.com/

--->CHAPTER 5-PROXY (CHANGING UR IP ADRESS) + BYPASSING THE FIREWALL<---

chapter 5---proxy changing ur ip address and bypassing firewalls proxy is changing ur ip adress.dis chapter is totally related 2 changing ur ip address,changing ip address is very much imp. bcoz by doing it, we get many benefits. [1st]we can download multiple files 4m rapidshare [2]by dis we can bypass a firewall [3] der r many sites vch allows only one account on 1 ip address,on dose sites we can make multiple ids by dis. [4]4 being safe while doing cyber hackes,it is very much essential 2 do proxy. [5]after of doing proxy,we can fool other person very easily. learning proxy is very imp. bcoz while doing cyber hacks it makes u some safe . let's start /

see,suppose dt u vant 2 propose a girl nd u r very much scared about her reaction then u simpally say ur any freind 2 tell her dt u like her,this is proxy,actually this is nt proxy bt it giveS a solid idea of proxy. wenever u send some data 2 any web server then dt server watch ur ip adress,in proxy ,first we connect 2 any proxy server,nd now we do surfing,now supose dt u r sending some data 2 any server ,nw bcoz u hv done proxy ,ur data vl be sent via dt proxy server nd dt server where u r sending d data,dt server ud nt be able nw 2 trace u bcoz now dt server can watch dt proxy server ip. lemme tel u something about working of proxy. U------>SENDING DATA 2 GMAIL------->GMAIL REPLYING 2 U AFTER OF DOING PROXY THIS THING LOOKS SOMETHING LIKE DIS U---->PROXY SERVER--->GMAIL SERVER------>PROXY SRVER-->U

NW i think u hv got d idea of proxy,if still nt got then write in help desk,i vl clear u more. after of doing proxy we found 1 thing dt our internet speed has gone very slow.itgoes 2 70% nw a small real hacking story. b4 of some months a 16 year old boy in u.s.a. did dos attack on nasa website.on dt moment nasa had sent his robote 2 mangal planet[sorry,i donno english of mangal planet anyway],d moment on vch he did dos attack on dt moment d robot of nasa ws steping on mangal planet,after dos attack dt robot just stopped nd just went 2 hang.robot stopped working. nw all de nasa scientists started looking at each other face like a stupid,de were nt getting vat is dis going on? nw de sTarted 2 search who has done it?nd after of 14 day they got d location of d boy nd went 2 his home nd caught. nw d question rises up,y i hv written dis story here.? actualy d boy has chnaged his ip address 4 times. i mean first he chaNged his ip address,then he did another proxy over of d first proxy then d 3rd then 4th the 5th,he did nt chANge his mac address. all i want 2 tell u ,if u hv done proxy then the webmaster cann't trace u vdout going 2 d proxy server 2 vch u hv connected nd if u hv done proxy flooding 4 10times then be 100% assured no1is coming 2 catch u b4 of 1 month.if u hv done proxy 4 10 times then 4 tracing d fbi vl first go 2 d 10th proxy server 2 vch u hv connected thenwards 4m der he vl get 2 knw ur 9th server then wards they vl go 2 d 9th server then 2 8th nd thus continue.nd finaly in coming 2 u they vl take 1 month.itis nt possible 4 dem 2 trace u4m comuter.they must go personally 2 d proxy server nd all dis takes time. i think u ppl got d importaince Of doing proxy. anyway .let' mooov 2 learn hw 2 do proxy. let's start.

first of al write in google"list of proxy address" or u may search 4 "free proxy server" nw many links will come.go on any1 of them. now on that website u vl find many ip address nd port no.s. these r d adress of proxy servers.now copy any1 of de address.mind it,u hv 2 copy both d things,i mean port no. as well as ip address. now open ur internet explorer nd go in tools>internet option>connection>lan setting go in lan setting,der u vl see 2 blue lines.one is AUTOMATIC CONFIGURATION ND d second one is PROXY SERVER in proxy server named tab u vl see 4 blocks.2 for ticking nd 2 for giving address.tick both of dem boxes nd in address put d ip adress u copied nd in port no. put d port no. u copied.never forget 2 tick both d boxes .now click o.k. nw open whatismyip.com nd u vl see dt ur ip address has been chANged. in mozilla firefox go here tools>options>advanced>network&gt;settings nd in settings put d ip address nd port no. dis is d same operation vch is carried out in all type of browser. der r many softwares 4 dis purpose.all of dem r shit nd nothing else. der is anonyomous proxy list verifier named software nd many more ,all of dem do d same work.i don think any1 should use dem. u can do d above said work in a more simple way also.

simpally open http://www.proxy4free.com/named site. der in most left side u vl see written "proxy list" in proxy list der vl be many lists named list 1list 2 list 3 nd many more .simpally go on list 1 nd copy ip nd port no.l 4m der. confused

come 2 d point vch u did nt get in my previous proxy named thread. see,doing proxy makes u more safe while doing illlegal stuffs but d problem is how 2 do proxy flooding. proxy flooding means connectiong 2 a proxy server then again connection 2 any other proxy server then again 2 ay other server. if u vl do proxy flooding then u vl be very much safe / i m telling u some software's name here 4m vchg u can do proxy flooding very easily but mind it i m nt going 2 give u all de software.some of dem i vl give u nd some of dem u hv 2 search on ur own bt d one vch i vl giv u ,vl be enough 2 do proxy flooding ..anyway. name of tools 4 doing proxy floding--> SocksChain,happy browser tool,multiproxy,tor these are d tools 4 doing proxy flooding,wen u r doing something highly illegal then first of all use any1 of dese softwares nd nw do vatever u vanna do .now u r very much safe/ tool "multiproxy"is a very very very good tool.itensures u police vl nt come 2 u b4 of 1 month nd tor is also very very good./ get tor 4m here. tor.eff.com now some extra outstanding good stuffs lolz. use a software named "brozar".it does nt leave any log wen u do illegal stuffs .a very god software 2 make u safe ,searching it is ur duty. use a software named "torpark browser"it also do d same work of brozar.if u r using it then it makes u sure dt der is no log u r leaving on d internet.this is a perfect tool 2 make u very very much safe.download it 4m here. torrify.com/index.php i know i hv told here name of many tools but all u need 2 download onlu tor nd torpark browser. 4get all d other tools name.i hv given here links also ..simpally download nd be safe ... freinds

doing proxy helps u in many ways. on rapidshare u can't download more than 1 file on 1 time bt vd doing proxy u can download multiple files. all d sites vch does nt offer u 2 make more than 1 account on ur computer vl allow u 2 make many1 after doing proxy,in colleges where orkut or other sites r blocked ,u can open all d restricted sites vd doing proxy . well, if u r trying 2 bypass d firewalll of ur coolege nd u r using proxy then it makes ur internet speed very much slow.indt case use a software named "ultra surf" u can get ultrasurf very easily on internet .simpally write in gogle"download ultra surf"nd u vl get it.after of downloading it ,alll u hv 2 do is 2 a double click on it,a lock sign vl apear nd now no firewall can stop u by doing browsing.inmany colleges they motherfucker bind d word proxy even nd der by doing proxy u cann't surf d way bt

ultra surf is 100% unstopable4m al d firewalls nd it also gives u a very goodbrosing speed there4 bettter in college use ultra surf.

http://www.hidemyass.comhttp://www.anonymizer.comhttp://www.wujie.nethttp://www .ultrareach.nethttp://surfshield.net those are some of proxy sites tht will provide u with access to blocked websites

summary of d chapter. [1]proxy is done 4 being safe while doing illegal stuffs nd 4 bypassing firewalls.itis a very good option 2 download multiple files 4m rapidshare at any single moment. [2]get proxy server lists nd apply these address in ur browser 2 surf d web anonymously. [3]use software "tor" 2 do proxy flooding

Proxy server are of four types:: 1. Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) 2. Anonymous Proxy - This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. 3. Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. 4. High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original

INSTRUCTIONS FOR CHANGING UR IP ADDRESS IN DIFFERENT EXPLORER :

Instructions for Internet Explorer 6.0 1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings. 2. Under Proxy server, click to select the Use a proxy server for your LAN check box. 3. In the Address box, type the IP address of the proxy server.

4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080). 5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance). 6. Click OK to close the LAN Settings dialog box. 7. Click OK again to close the Internet Options dialog box.

Instructions for FireFox 1. 2. 3. 4. 5. 6. 7. 8. Select the Tools Menu Select Options Select Connection Settings Select Manual Proxy Configuration Check Use the same proxy for all protocols Enter the IP address for the HTTP proxy server Enter the port of the HTTP proxy server Click Okay

instructions for Netscape 7.1 1. Select the Edit Menu 2. Select Preferences 3. Maximize Advanced 4. Select Proxies 5. Choose Manual proxy configuration 6. Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the corresponding Port field. 7. OK your way out Opera 8.5 1. Select the Tools Menu 2. Select Preferences 3. Select Advanced Tab 4. Select Proxy Servers 5. Check the box next to HTTP 6. Enter the proxy server's IP address in the first box and the proxy's port in the box after "Port" 7. OK your way out Safari 2.0.3 1. Select Preferences 2. Select Advanced 3. Select Proxies: Change Settings 4. Check the box next to Web Proxy (HTTP) 5. Enter the proxy server's IP address in the first box and the proxy's port in the box after the ":" 6. Select Apply Now

Now the hottest part of our work woooooooooooooooooo....

------>Chapter 6 - Scanning and Hacking into others computers<------

First of all i need ull to download 2 softwares ANGRY IP SCANNER NMAP

as a hacker we need to know these things about our victim specifc ip address operating system service running on d system. in scanning we look 4 d open ports nd we look 4 d vulnerabilities existing in our target. before of writing about scanning i would like 2 clear u d concept of ping. ping-packet internet gropper open run ,type cmd ,hit enter nd nw type ping nd hit enter. nw u vl see der many things just read dhem,well nw moov 2 ping again. suppose dt we r pinging 2 any website then it means we r sending some data 2 dt website. suppose dt u want 2 check ,ur freind is online or nt? then simpally ping his ip address.i mean suppose dt if his ip address is 192.255.29.32 then open command prompt[command prompat=run->cmd>enter] nd type ping 192.255.29.32

if nw u vl see dt 4 data packets has been sent 2 ur freind ,nw u vl see der written loss. actually if ur freind is online then he gets ur ping nd if he is nt then u vl see der 100% loss. in short ping is sending data 2 a specific address nd it can be done 2 check wether dt person/website is conneted 2 internet or not. hoping u ppl hv got d idea of ping .nw proceed 2 scanning. freinds

the objectives of scanning to detect wether d system is connected 2 internet or nt? to discover vch ports r active/running? to discover d operating system running on d target system[known as fingerprinting]

to discover d ip address nd services running on d system. let's start scanning now. bcoz nw every1 of u know pinging some1 there4 1 step of scanning u can do urself nd dt is checking a system/person is connected 2 internet or nt?suppose dt u want2 ping google or orkut or ur freind then use dis blue syantax in d command prompt ping ip adress or ping somewebsitename.com

nw ,in modern era der r thousands of tools available 4 scanning,der r thousands of softwares bt we will be using only 2 tools,one is angry ip scanner nd d second 1 is n map. these 2 tools r enough 4 ur purpose,wen we will learn sniffing we will use some wifi scanners nd lan scanners bt here in dis topic we will learn using they 2. ANGRY IP SCANNER--->an ip scanner 4 windows,it can scan alive ips in a range ,a very beautiful nd good tool 4 scanning.actually dis software do nothing but pings all d ip addresses nd gives u information. USING ANGRY IP SCANNER--->[ThEORY PART] all u hv 2 do is 2 specify a ip range vch u vant 2 scan for. suppose dt up ip address is 192.167.23.23 then it is sure dt d connections vchr nearer 2 ur home ,they r having d ip address assigned vd 192.167.23.01 to 192.127.23.99[plz look d last digits of ip address] nw 4 knowing vch 1 of these ip address r live nd working,all u hv 2 do is 2 just scan d range, dis software can scan any range.

USING ANGRY IP SCANNER--->[PRACTICAL PART] using ip scanner is very easy. simpally give d range u want 2 search 4 nd search d addresses where u can see d green light.right click der nd watch details.after of right click u can see many more things ...have a look at all of dem.

You might also like