Basic hacking techniques





Please this is meant for self-defence only

Before, getting the basic hacking techniques, you need to know that to catch a thief, one needs to reason like a thief so as to know his tacticts.

Naturally most hackers admire the write up of a convicted hacker called the mentor. The write up is called the hackers manifesto.

It is more or less the same way hackers think or some would like to think or act.

Trying this out, I'll advice you to get BlackICE as a personal firewall

What is the first thing a burgler makes sure of before making a move.

1) Anonymity.

He'll use any of these techniques to be anonymous

- software that hides his Ip address like, Easy-Hide-Ip

- An intruder will never use his real identity. But would always get other peoples usernames and passwords and use it. Like this.

and maybe programming in C like this

- He'll use proxies or secured tunnels

- And may use telnet for hiding and task execution.



2) Gather information about the target.

Gathering of information helps to know a lot of things about the target pc like, date, time, operating system so as to know its weaknesses and study the easiest ways of exploiting these weaknesses


- Get its Ip address .

This is very important! Employs either the use of tracert or Ping or dns query and it continues from there.

- Resourcefulness

Telnet and tracert and dns query, nslookup or dig utility can be used here to get as much information as he wants.


Telnet can be activated on ur pc like this



3) Getting out


- He'll leave files on the victim’s pc.
This makes it possible for another access. and also the possibility of setting traps and nailing him. You can get information about some tools in the tool section. Or just go to protectivehacks.com shop


The best advise I’ll give here is that, anyone who wants to try these out would like to know a thing or two about programming and also check any of the tools in search engines like google.

The use of port scan has been debated a lot in courts. Its legality depends on what its used for.

Have some great techniques? please keep it legal!

This is a bit incomplete, share your views!

[ ? ]

Upload 1-4 Pictures or Graphics (optional)[ ? ]

 

Click here to upload more images (optional)

Author Information (optional)

To receive credit as the author, enter your information below.

(first or full name)

(e.g., City, State, Country)

Submit Your Contribution

  •  submission guidelines.


(You can preview and edit on the next page)




hacking techniques hacker tools computer security hackers manifesto















----------------------------

Custom Search

----------------------------
Wholesale Security products at affordable rates.

Lots of affordable computer products.

----------------------------

How website building pay my bills

Infopublishing
How do I pay my bills by only providing information without hacking.

Come to think of it, I pay webhosting fee, sit on the computer adding content to my site and a lot of other activities.

Look at it this way, facebook, myspace, twitter, yahoo are trying to get better by the minute.

why....?

They earn from the information and services they provide. How is that possible….?


click here for more

Infopublishing