HACKING A TARGET PREFACE
this is my new unofficial guide to hacking
the definitions i will give you will not be standard but they will help you understand
PORTS
a port is a door into a computer. when you hack a computer, you do it through a port
there are 65535 ports [ways to enter a computer] but mostly only 2 or 3 ports are open
examples of ports include telnet(port23) http(port80) ssh(port22) and ftp(port21)
open ports can tell us what software is running on the system
for example if port1433(msSQL) is open then it means there is a database on the site
subdomains
companies use different sites to allow their staff to log into their network. if you can find one, then you can attack it with an sql or xpath injection
here is an example
if our target site is m.com, then login.m.com is where to login and registration.m.com is where to register
watch out for the next post.!
~halo Zorayo
this is my new unofficial guide to hacking
the definitions i will give you will not be standard but they will help you understand
PORTS
a port is a door into a computer. when you hack a computer, you do it through a port
there are 65535 ports [ways to enter a computer] but mostly only 2 or 3 ports are open
examples of ports include telnet(port23) http(port80) ssh(port22) and ftp(port21)
open ports can tell us what software is running on the system
for example if port1433(msSQL) is open then it means there is a database on the site
subdomains
companies use different sites to allow their staff to log into their network. if you can find one, then you can attack it with an sql or xpath injection
here is an example
if our target site is m.com, then login.m.com is where to login and registration.m.com is where to register
watch out for the next post.!
~halo Zorayo
Join our Group chat @GEEKernel Rules of the Group .
1. Posts should be original. Give proper credits if your posts are copied.
2. Strictly no promotion allowed. Do not try to promote your page or youtube channels, blogs or websites & no offers.
3. Use 'Report to admin' option if you find anything inappropriate. (Reply to that message with "@admin")
4. Respect each other. Any kind of misbehavior will lead to permanent ban.
5. Any kind of offensive comments on religions, states, Political Parties or ethic group is strictly not allowed.
6. Posting #NOC (Not Original Content) as #OC (Original Content) will lead to ban.
7. If anyone ever ask how to hack Facebook or anything else then he/she would be banned.
8. First try to find your question on google, if you don't find it there then leave a post here.
If you see any post not following rules, please free to report post to admin.
Breaking above rules = BAN
1. Posts should be original. Give proper credits if your posts are copied.
2. Strictly no promotion allowed. Do not try to promote your page or youtube channels, blogs or websites & no offers.
3. Use 'Report to admin' option if you find anything inappropriate. (Reply to that message with "@admin")
4. Respect each other. Any kind of misbehavior will lead to permanent ban.
5. Any kind of offensive comments on religions, states, Political Parties or ethic group is strictly not allowed.
6. Posting #NOC (Not Original Content) as #OC (Original Content) will lead to ban.
7. If anyone ever ask how to hack Facebook or anything else then he/she would be banned.
8. First try to find your question on google, if you don't find it there then leave a post here.
If you see any post not following rules, please free to report post to admin.
Breaking above rules = BAN
what is the difference between a password and a hash
hacking is just like cooking
when you have pepper and tomatoes you can make stew with it right?
but that doesnt mean that after making the stew, you can get the tomatoes and pepper back.
when you have a password, you can use it to make a hash but after that there is no way to get the password back just like there is no way to get tomatoes from stew
cracking a hash means that we have the stew and we want to see the ingredients that were used to make it
so...
we mix all the spices in the world in order to see if we can get the stew
if we fail, we try another combination until we get the same stew and then we will know how it was cooked
this can take a lot of time just as much as cracking hashes takes a lot of time
database administrators store their passwords hashed so that even when you hack them, you have to go through the process of cracking the hashes
just to make our work tougher
~halo zorayo
hacking is just like cooking
when you have pepper and tomatoes you can make stew with it right?
but that doesnt mean that after making the stew, you can get the tomatoes and pepper back.
when you have a password, you can use it to make a hash but after that there is no way to get the password back just like there is no way to get tomatoes from stew
cracking a hash means that we have the stew and we want to see the ingredients that were used to make it
so...
we mix all the spices in the world in order to see if we can get the stew
if we fail, we try another combination until we get the same stew and then we will know how it was cooked
this can take a lot of time just as much as cracking hashes takes a lot of time
database administrators store their passwords hashed so that even when you hack them, you have to go through the process of cracking the hashes
just to make our work tougher
~halo zorayo
Cool Password Bro - Took Approx 72 Hours to Crack this + Evading WIDS, Patience is Key and it works 100% - I already knew I would get this result - If you know your Targets' Vulnerability, you will Succeed.
Ping
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Giving it perspective, suppose you started a online multiplayer game, counterstrike. You aimed at the enemy and shot it, bulls eye, .. but wait a sec, the enemy just teleported somewhere else and shot you down.
What happened here? Your input took long time to reach the server and same for data transferring from server to you.
So, even if you have a fast internet of 100+ MBps, and slow ping rate, the webpages will load slow, messages will reach slow, and a real nightmare for gamers.
So, how to solve it?
Dns: The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.
In most of the cases, if your dns is good, the ping will be lower, and leading to faster internet.
To check ping speed, go to speedtest.net, and comment the results below.
To reduce the ping, join our group chat, and i'll provide you many ways of reducing it.
I've attached a cool looking speedtest result.
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Giving it perspective, suppose you started a online multiplayer game, counterstrike. You aimed at the enemy and shot it, bulls eye, .. but wait a sec, the enemy just teleported somewhere else and shot you down.
What happened here? Your input took long time to reach the server and same for data transferring from server to you.
So, even if you have a fast internet of 100+ MBps, and slow ping rate, the webpages will load slow, messages will reach slow, and a real nightmare for gamers.
So, how to solve it?
Dns: The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.
In most of the cases, if your dns is good, the ping will be lower, and leading to faster internet.
To check ping speed, go to speedtest.net, and comment the results below.
To reduce the ping, join our group chat, and i'll provide you many ways of reducing it.
I've attached a cool looking speedtest result.
How ISP provide the internet?
imagine you are in a room, the room just have one door. And you need to go out of the room, how you do it?? You step out from the door. So the room is your lan, outside the door is the another network you want to reach, it may be the Internet. The gateway is the door, you step outside the room passing through the door. Now imagine you are inside a house, the house have one kitchen, one bathroom, and a room. Your router knows its own network, so if you ask it, where is the kitchen, it will reply where it is, but if you want to go outside of your house, the router will say, the exit door. Gateways, are a connection to everywhere else that is not designated as your network, you are in the 192.168.1.0/24 network, you want to query 8.8.8.8, your router will check it's own dns entries, and it will reply, I have no idea where this is, but I have a connection to outside that someone might know. So the packet will move forward, from your gateway, to isp router. And it will ask same query, hey isp, you know where is 8.8.8.8? Isp will say, its none of my clients, so it's somewhere outside my network, you know what, I have an outside gateway, I will forward you to it... And it will keep on and on, until it reaches the destination, or until it cannot be routed or ttl runs out of time... Is a big story, but that's how it works basically.
imagine you are in a room, the room just have one door. And you need to go out of the room, how you do it?? You step out from the door. So the room is your lan, outside the door is the another network you want to reach, it may be the Internet. The gateway is the door, you step outside the room passing through the door. Now imagine you are inside a house, the house have one kitchen, one bathroom, and a room. Your router knows its own network, so if you ask it, where is the kitchen, it will reply where it is, but if you want to go outside of your house, the router will say, the exit door. Gateways, are a connection to everywhere else that is not designated as your network, you are in the 192.168.1.0/24 network, you want to query 8.8.8.8, your router will check it's own dns entries, and it will reply, I have no idea where this is, but I have a connection to outside that someone might know. So the packet will move forward, from your gateway, to isp router. And it will ask same query, hey isp, you know where is 8.8.8.8? Isp will say, its none of my clients, so it's somewhere outside my network, you know what, I have an outside gateway, I will forward you to it... And it will keep on and on, until it reaches the destination, or until it cannot be routed or ttl runs out of time... Is a big story, but that's how it works basically.
After 15 days of struggle Finally I gets In To Artist Nick Gubi's Twitter Account
The SS7 vulnerability
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
Finally!
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
WELCOME TO THE FAMILY
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
A lot of people out there undervalue the power of hacking
a lot of people are so fascinated with hacking, seeing teens break into high tech companies
that they rush into hacking and by the time they realise they have been in facebook hacking groups who only talk about "how to hack NASA with html" for four years and accept that they cant be hackers
A hacker is made, not born
the truth is that "learning" hacking is not easy but once you do, hacking itself becomes very easy for you
to be a hacker, you have to surround yourself with hackers and learn more from them
after you learn to hack, you will see that anything can be hacked, it just takes time
let me give an example
whatsapp uses encryption so its fairly impossible to hack someones whatsapp account
a noob will turn away but a true hacker would wait for his victim to connect to a wifi network and send an update to the app
when the app installs this update, it becomes a trojan and now the hacker has full access to your whatsapp account
THINK!
~halozorayoo
a lot of people are so fascinated with hacking, seeing teens break into high tech companies
that they rush into hacking and by the time they realise they have been in facebook hacking groups who only talk about "how to hack NASA with html" for four years and accept that they cant be hackers
A hacker is made, not born
the truth is that "learning" hacking is not easy but once you do, hacking itself becomes very easy for you
to be a hacker, you have to surround yourself with hackers and learn more from them
after you learn to hack, you will see that anything can be hacked, it just takes time
let me give an example
whatsapp uses encryption so its fairly impossible to hack someones whatsapp account
a noob will turn away but a true hacker would wait for his victim to connect to a wifi network and send an update to the app
when the app installs this update, it becomes a trojan and now the hacker has full access to your whatsapp account
THINK!
~halozorayoo
JOHN THE RIPPER VS HASHCAT
*
JOHN
john is a very good password cracker and we hackers just love it.
It first tries to crack a hash with a dictionary attack, if it doesn't work, it tries a combination attack, only after that will it try to use a brute force attack
One thing about john is that he has an automatic hash detector
So if you don't know which type of hash, john can find it quickly, that's one thing hashcat doesn't have(if you don't know the type of hash, you can't crack it with hashcat)
*
HASHCAT
hashcat is another light weight tool which claims to be the world's fastest password cracker
in an earlier post, I used hashcat to crack a WiFi password
Let's talk about brute force attacks
You try all the possible combinations of words, letters and symbols
Brute force can never fail. But it takes a lot of time. (About 8 years for 9 characters if you use your second hand pc ,100 years if you use your phone), luckily we can use online rainbow tables and botnets to crack these in seconds.
One example is crackstation.net
But we know that most of us don't use symbols in our passwords
Our passwords are nothing like
Vrdj,:;?345%
Yep, that used to be one of my passwords
I am guessing your password is like
Password123
*
You write a word and add numbers right?
Some people even use only numbers
*smh*
That's why your account can be hacked easily.
Weak password!
Don't ask me to recover your account for you after you are hacked!
CHANGE YOUR F**KING PASSWORD RIGHT NOW!
*
That's why hash cat is the world's fastest cracker
I bet I can brute force your fb account within a week
But I am not here to fight you
Hashcat uses this brilliant smart cracking, taking a word and adding numbers so it doesn't take as long as Johnny the ripper
;)
That's another way of hacking a Facebook account
But since you guys hate the word brute force, I just keep it to myself
*
*
OK enough insults
The world is full of vulnerabilities and lazy programmers
It's our job to exploit them
#hack_teh_world
#
#for_the_lolz
#occupy_the_web
~halozorayo
*
JOHN
john is a very good password cracker and we hackers just love it.
It first tries to crack a hash with a dictionary attack, if it doesn't work, it tries a combination attack, only after that will it try to use a brute force attack
One thing about john is that he has an automatic hash detector
So if you don't know which type of hash, john can find it quickly, that's one thing hashcat doesn't have(if you don't know the type of hash, you can't crack it with hashcat)
*
HASHCAT
hashcat is another light weight tool which claims to be the world's fastest password cracker
in an earlier post, I used hashcat to crack a WiFi password
Let's talk about brute force attacks
You try all the possible combinations of words, letters and symbols
Brute force can never fail. But it takes a lot of time. (About 8 years for 9 characters if you use your second hand pc ,100 years if you use your phone), luckily we can use online rainbow tables and botnets to crack these in seconds.
One example is crackstation.net
But we know that most of us don't use symbols in our passwords
Our passwords are nothing like
Vrdj,:;?345%
Yep, that used to be one of my passwords
I am guessing your password is like
Password123
*
You write a word and add numbers right?
Some people even use only numbers
*smh*
That's why your account can be hacked easily.
Weak password!
Don't ask me to recover your account for you after you are hacked!
CHANGE YOUR F**KING PASSWORD RIGHT NOW!
*
That's why hash cat is the world's fastest cracker
I bet I can brute force your fb account within a week
But I am not here to fight you
Hashcat uses this brilliant smart cracking, taking a word and adding numbers so it doesn't take as long as Johnny the ripper
;)
That's another way of hacking a Facebook account
But since you guys hate the word brute force, I just keep it to myself
*
*
OK enough insults
The world is full of vulnerabilities and lazy programmers
It's our job to exploit them
#hack_teh_world
#
#for_the_lolz
#occupy_the_web
~halozorayo
Just thought I would mention.. If you own a MediaTek Phone, You should never use Either KingRoot or KingoRoot, both Apps are bundled with an "Hello World".APK Payload, This is the Default when Generating a Payload, which bypasses AV, - All your Data is being sent through a Meterpreter Shell to Chinese Hackers (Y) jason
i'm not owner of this post
~credit to owner
In a communications network, a network node is a connection point that can receive, create, store or send data along distributed network routes. Each network node -- whether it's an endpoint for data transmissions or a redistribution point -- has either a programmed or engineered capability to recognize, process and forward transmissions to other network nodes.
The concept of network nodes came into being with the use of distributed networks and packet switching. Depending on its application, network nodes perform a variety of functions.
Data communications
In data communications, physical network nodes include data communications equipment or devices that sit between data terminal equipment (DTE) and data transmission circuits. These include switches, bridges, modems or hubs that perform signal conversion, coding and line clocking. Network nodes in data communications also include data terminal equipment like digital telephone handsets, printers or host computers like routers, servers or workstations.
Internet network nodes
In internet and intranet networks, most physical network nodes are host computers that are identified by an IP address. Some data link devices like wireless local area network (WLAN) access points do not have IP host addresses and are considered physical network or LAN nodes rather than internet nodes or hosts.
Local area network and wide area networks
In local area networks (LANs) and wide area networks (WANs), a network node is a device that performs a specific function. Each node needs to have a MAC address for each network interface card (NIC). Examples include modems with Ethernet interfaces, wireless LAN access points and computers. If a device is offline, its function as a node will be lost.
Telecommunications network nodes
In fixed telephone networks, nodes may be public or private telephone exchanges or a computer providing an intelligent network service. In cellular communications, nodes include base station controllers that control one or more base stations. Cellular network base stations are not considered nodes.
Cable television system nodes
In cable systems, nodes have taken on a broader context and are generally associated with fiber optic cable that connects to businesses or homes served by a common fiber optic receiver within a geographic area. In cable systems, a fiber optic node describes the number of homes or businesses passed that can be served by a specific fiber node.
~credit to owner
In a communications network, a network node is a connection point that can receive, create, store or send data along distributed network routes. Each network node -- whether it's an endpoint for data transmissions or a redistribution point -- has either a programmed or engineered capability to recognize, process and forward transmissions to other network nodes.
The concept of network nodes came into being with the use of distributed networks and packet switching. Depending on its application, network nodes perform a variety of functions.
Data communications
In data communications, physical network nodes include data communications equipment or devices that sit between data terminal equipment (DTE) and data transmission circuits. These include switches, bridges, modems or hubs that perform signal conversion, coding and line clocking. Network nodes in data communications also include data terminal equipment like digital telephone handsets, printers or host computers like routers, servers or workstations.
Internet network nodes
In internet and intranet networks, most physical network nodes are host computers that are identified by an IP address. Some data link devices like wireless local area network (WLAN) access points do not have IP host addresses and are considered physical network or LAN nodes rather than internet nodes or hosts.
Local area network and wide area networks
In local area networks (LANs) and wide area networks (WANs), a network node is a device that performs a specific function. Each node needs to have a MAC address for each network interface card (NIC). Examples include modems with Ethernet interfaces, wireless LAN access points and computers. If a device is offline, its function as a node will be lost.
Telecommunications network nodes
In fixed telephone networks, nodes may be public or private telephone exchanges or a computer providing an intelligent network service. In cellular communications, nodes include base station controllers that control one or more base stations. Cellular network base stations are not considered nodes.
Cable television system nodes
In cable systems, nodes have taken on a broader context and are generally associated with fiber optic cable that connects to businesses or homes served by a common fiber optic receiver within a geographic area. In cable systems, a fiber optic node describes the number of homes or businesses passed that can be served by a specific fiber node.
LINUX
yea, i'm gonna teach you
how to become a linux wizard.
boot up your kali, and type the
following,
nya, its not going this way.
everyone knows kali,
noobs use ubuntu....
but do you really want to become the all-knowing
do you have what it take to be best?
do you thrive to be the best hacker you can possibly be??
then...
what will we use? its Arch.
Arch is the system, that
teaches you what linux is.
Learn linux think linux, and enjoy
the text based shades of gray,
allowing you full control of your device
become the god of devices,
with full control,
and learn every last bit there is,
that linux has to offer.
Is it hard?
Yes, right from CLi installation,
to manual installation, troubleshooting,
and even custom roaming into digital
world of mesmerizing hackers.
Grab the pure Arch distro mirror
from its official site,
either boot up the virtual workstation, or wine,
or just make bootable usb,
and be ready for the drive,
that you'll never forget.
HERE starts the hacking life,
that you will never ever forget.
Tip: Yay, isn't only the declaration of joy
its the official app-installer for arch ..
( depositories and all, you'll learn soon... )
remember, its Arch !
comment any questions, below.
yea, i'm gonna teach you
how to become a linux wizard.
boot up your kali, and type the
following,
nya, its not going this way.
everyone knows kali,
noobs use ubuntu....
but do you really want to become the all-knowing
do you have what it take to be best?
do you thrive to be the best hacker you can possibly be??
then...
what will we use? its Arch.
Arch is the system, that
teaches you what linux is.
Learn linux think linux, and enjoy
the text based shades of gray,
allowing you full control of your device
become the god of devices,
with full control,
and learn every last bit there is,
that linux has to offer.
Is it hard?
Yes, right from CLi installation,
to manual installation, troubleshooting,
and even custom roaming into digital
world of mesmerizing hackers.
Grab the pure Arch distro mirror
from its official site,
either boot up the virtual workstation, or wine,
or just make bootable usb,
and be ready for the drive,
that you'll never forget.
HERE starts the hacking life,
that you will never ever forget.
Tip: Yay, isn't only the declaration of joy
its the official app-installer for arch ..
( depositories and all, you'll learn soon... )
remember, its Arch !
comment any questions, below.
UNA FAMILIA GRANDE [ONE BIG FAMILY]
first of all welcome to the group
hackers are bound together, there are no boundaries
whether you are black or white, short or tall, male or female.
we all hack for one reason: to make the world a better place
so if you are learning just to commit crimes then you should probably turn back now.
you may have already learnt about black and whitehats
but i want you to know that when hacking started, all they wanted was to expose the greed and corruption of people in the world
they destroyed the face of hacking by calling the people who exposed them blackhats
then they said, why don we learn from them so we can make our networks secure to protect the monies we steal
lets all ourselfs the whitehats so people hate them and run to us
you have to understand that there are no blackhats, we are just hackers
hacking to make the world a better place
#hack_teh_world
#occupy_the_web
~halozorayo
first of all welcome to the group
hackers are bound together, there are no boundaries
whether you are black or white, short or tall, male or female.
we all hack for one reason: to make the world a better place
so if you are learning just to commit crimes then you should probably turn back now.
you may have already learnt about black and whitehats
but i want you to know that when hacking started, all they wanted was to expose the greed and corruption of people in the world
they destroyed the face of hacking by calling the people who exposed them blackhats
then they said, why don we learn from them so we can make our networks secure to protect the monies we steal
lets all ourselfs the whitehats so people hate them and run to us
you have to understand that there are no blackhats, we are just hackers
hacking to make the world a better place
#hack_teh_world
#occupy_the_web
~halozorayo