Please refrain from sharing any copyrighted, restricted or hacking stuff over here, only ethical hacking is allowed, the admin and moderators of this forum shall in no case be responsible for any misrepresentations or damages caused to any individual or any company.
Posts : 131 Points : 9162 Reputation : 10 Join date : 2012-03-22 Age : 36 Location : kashmir
Subject: An insight into hac*king Fri Mar 23, 2012 3:05 am
Many people have got wrong opinion about h*a*c*k*i*n*g, h*a*c*k*i*n*g has been misunderstood to a great extent, so today I will try to make things lil clear to you all. I am gonna tell u what h*a*c*k*i*n*g is all about. i will be explaining h*a*c*k*i*n*g keeping nimbuzz perspective in mind as I know U all are interested in intruding into nimbuzz ids h*a*c*k*i*n*g means to intrude into computers and networks or steal credentials., the purpose can be anything like making illicit profits, scaring the victim, protesting, conveying a message etc etc.. Infact h*a*c*k*i*n*g has been mostly misunderstood., h*a*c*k*i*n*g is supposed to be a positive process, better called as ethical h*a*c*k*i*n*g or white hat h*a*c*k*i*n*g.. The type of h*a*c*k*i*n*g that U guys are mostly interested in (stealing other peoples' credentials), that h*a*c*k*i*n*g is for sure a negative process and this type of h*a*c*k*i*n*g is better called ċrаċkιήĝ or black hat h*a*c*k*i*n*g. Ethical hackers or white hat hackers use h*a*c*k*i*n*g techniques for positive purposes like testing the security of networks or systems e.g penetration tests or vulnerability assessments inwhich they make sure that the system they are testing is secure from intruders and take necessary steps to enhance security if the tests fail, while black hat hackers use the techniques to intrude into others' systems unlawfully or steal credentials of users (like when u c*r*a*c*k* nimbuzz ids on purpose of animosity). There are other types of hackers aswell like grey hat hackers who intrude into others' systems only to scare/notify the admin without causing any damage. Let me not go deep into explaining h*a*c*k*i*n*g as it is a very vast subject., lemme rather concentrate on ċrаċkιήĝ part which u people are interested in. h*a*c*k*i*n*g is of different types but i will stick to ċrаċkιήĝ ids (stealing username/password) SO LET ME TELL U ABOUT THE TECHNIQUES OF ċrаċkιήĝ NIMBUZZ IDS: 1st of all let me tell u that h*a*c*k*i*n*g is mere tricking (Cheating). If u find any websites on internet which claim of selling tools to h*a*c*k* gmail, nimbuzz, facebook etc, thatz all spam, an easy method of robbing u, they demand money, so plz dont fall prey.. U can h*a*c*k* people only by tricking them, u will get to understand things better, keep reading.. 1. The easiest way of h*a*c*k*i*n*g nimbuzz ids is using crackers and pass lists. U can get an application inwhich u feed the id of victim and u select a password list (a text file containing passwords) and if the password of the victim is in list, u will get the password but if the password is not in list, u will fail to c*r*a*c*k* the id. U can use the below c*r*a*c*k*e*r* and passlist to try ur luck.
But ċrаċkιήĝ an id using c*r*a*c*k*e*r* application and passlist is a matter of luck, if ur victim has set a strong password it becomes difficult to c*r*a*c*k* his/her id., So, stronger a password lesser are the chances of it getting cracked adopting this method. e,g if my id is asgar and my password is -a$gaR- u will only be able to c*r*a*c*k* my id if ur passlist contains one entry as -a$gaR- or else u will fail.. so a matter of luck it is as I mentioned earlier.
2. The 2nd way of ċrаċkιήĝ is Phishing/Fake login inwhich u make a fake login page which resembles the original page and u trick ur victim & make him login into that page and his/her id will be transferred to u. Phishing is an excellent way of ċrаċkιήĝ. I have explained phishing in detail, along with a video tutorial, in the below mentioned thread.
**************Explained tute coming soon**************
3. Other way of ċrаċkιήĝ is using keyloggers. Keyloggers are programs which record keystrokes on pc. If u manage to install ur configured keylogger onto ur victim's pc u will get a log file containing keystrokes of his/her pc and whenever he logs into any account like nimbuzz, facebook, gmail etc the username and password he enters will also be logged into the log file and that way u will get the victim's credentials. U can bind keyloggers into applications and trick ur victims. 4. The other way of ċrаċkιήĝ is remote administration inwhich u can connect to a remote IP address. Remote administration was developed to monitor and manage systems remotely but later black hat crackers started misusing this technique for intruding into systems unlawfully. Now what remote administration tools or trojans do is that they give u full access to ur victim's computer by establishing a tcp/ip connection on its ip address. U can find many RAT tools which u can use to make ur own RAT servers and as soon as anyone executes ur server file his/her pc will send a bot to u which will give u complete access to his/her pc. U can bind ur RAT server with any non-suspicious file like an application file, a video file or a graphic file. U can do anything wth victim's pc like copy, delete, add files, install keylogger, format drives, send messages, change registries and other settings, remote administration is very fatal for the user and by far the worst thing a victim can go through. Here PC h*a*c*k*i*n*g by Dark COmet has ben explained: [You must be registered and logged in to see this link.] No matter how strong ur victim's password is, u'll get his password by 2nd, 3rd and 4th methods,, only u need to use ur brains and trick ur victim.. if ur victim is too smart and careful u wont be able to do much harm. U also have to make sure u are safe from such things, so for that U have to be extra careful and smart. Update ur antivirus regularly, use key scramblers, mask ur ips and dont fall prey to fake pages n spams. I hope this tute helps u understand h*a*c*k*i*n*g/ċrаċkιήĝ better. If u know about any other techniques of ċrаċkιήĝ ids, plz feel free to add in comments. and if u have got any doubts regarding above tute plz ask in comments. thankyou
Last edited by Asgar on Fri Apr 13, 2012 4:55 pm; edited 3 times in total
Guest Guest
Subject: Re: An insight into hac*king Wed Mar 28, 2012 1:34 pm
tnx bro
Asgar Admin
Posts : 131 Points : 9162 Reputation : 10 Join date : 2012-03-22 Age : 36 Location : kashmir
Subject: Re: An insight into hac*king Fri Apr 13, 2012 4:56 pm
UPDATED: Phishing Tute Video added, will add detailed tute later.
karthikeyanthunder Mods
Posts : 139 Points : 9146 Reputation : 2 Join date : 2012-03-22 Age : 33
Subject: Re: An insight into hac*king Sat Apr 14, 2012 1:48 pm