Author Topic: Hacking - Start to finish (quick list)  (Read 22439 times)

0 Members and 1 Guest are viewing this topic.

Offline seci

  • Serf
  • *
  • Posts: 22
  • Cookies: 8
  • Seci :D
    • View Profile
    • www.evilzone.org
Hacking - Start to finish (quick list)
« on: March 29, 2011, 10:11:18 pm »
Hello, this little post will explain in rough details how you start hacking a specific target.

First. There are  many different ways going about this, but this is one way.

Information gathering
The first thing you want to do when targeting a specific target is get as much information as possible before a front attack(if any, being quiet is much better)
Now this step can take ages if you really want a detailed level of knowledge. And if you are serious about hacking your target, you should be detailed here.
What sort of information do I look for you might ask yourself? Well, anything really. Anything surrounding the target and even things that surround things that surround your target. Here is a short list of things that might be useful;
  • IP(s), some machines/domains/systems or whatever have multiple domains
  • ISP(s), if small ISP(s), get owner details here as below
  • Owner. Email, name, location, family, hobby's, Facebook account, phone number
  • *Open ports. On ALL of the ips/servers if there are multiple
  • Service signatures, find out as much as possible about all the open ports, are they in use? What software are they running at the other end? Do the services reveal any other information about the system? OS? Internal IPS?
  • Hosters(In most cases there will be a hosting company)
  • Hosters information - Owner and all of that(If the company is small)
  • Hosters member system, how does the members login? Is there a login? Is there a forgot password function? Can you exploit the hoster instead?(might be easier in some cases)
  • DNS records(if any), subdomains? Hidden domains/info? DNS hosters? Same as above.
  • The physical server(s) location / datacenter
And the list goes on and on and on. Literally EVERYTHING about the company/system/server/target are relevant. The more info you got, the easier it will be attacking him/her/them/it.

You should decide if you want to target the system or the people of your target. That is, code/system flaws or human flaws(keyloggers, Trojans, social engineering, info gathering + password guessing, etc). This decision should depend on the information you find about your target. Both can be tried ofcourse, just make sure the target does not know you are trying to hack it, often one of the attempts will set off alerts.

This whole information gathering part might seem unnecessary, but really. Its neat, lets you put things in perspective so you can find the best point of entry.


The attack
Before an attack is lunched, there are a few things you need to think about. Here is a list of things you should think about;
  • Will this company/target rage crazy if I hack them? If so, check 3rd point.
  • Will police or other agencies be contacted if I hack them? If so, check 3rd point.
  • *Is my privacy good enough? Are you behind a proxy(s)? Should you? Do the proxy log?(It shouldn't)
  • Are they running any services at all? If not, you don't really have any virtual way in..
  • Are they running web applications? These are typically easier to hack than services. And have a higher percentage rate of flaws.
  • Do the target got a open router/switch/modem system? This often happens with home computers/networks.
  • Are your target running platforms with logins? These could be targeted.
  • Do you have enough time? Its a good practice to have time enough to do the entire attack in one go. Else you might fire off warnings for the target, and he can go into a bombshelter :P We don't want that now, do we?

Now there are tree ways of attacking in this guide.
- Service/software exploitation
- Web application exploitation
- Human factor exploitation


Service/software exploitation
Here you will exploit one or more services/programs running on the target system. In most cases, this will be called bufferoverflow. This can do everything from bypassing a login to give you instant shell access. In scenarios where the target is running services which is not a web server(can be tho) this might be the way to go.

Web application exploitation
This is without a doubt the most vulnerable field. Web applications are flawfull, 70% or so of all pages got some sort of web application flaw, this ofc may vary from an stupid XSS to a serious RFI. In scenarios where the target system are running a web server, this is the first thing to check. Do always check web applications before going on to service exploitation if you just want to get the target hacked.

Human factor exploitation
Now if all other things fail, there is ALWAYS a human factor. This can be social engineering the target to give you limited access, and you work your way up from there. Or simply tricking the target to trust you and in some strange way share his password, perhaps not for the system you are targeting, but for his email or an online account or whatever, stupid people tend to use the same password or the same password syntax everywhere. Keep in mind that the human factor doesn't necessarily have to be your targets owner, could be the hoster, the DNS hoster, the ISP, family.


Finale note
If you think its necessary, clear your tracks. If you ask me, if you can see that you have been there you didn't do it right. Take care, be safe.



Just my 11 cents
6b619af0d7042db45f3e215b3dd7b977e8d1c82f

Offline Jaeger^

  • <3<3<3
  • Peasant
  • *
  • Posts: 72
  • Cookies: 0
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #1 on: March 31, 2011, 10:52:33 am »
Nice and informative tutorial! It would be cool if you explained some of the methods on how to do the different things, like, how you would look up someones ports etc. Maybe not everyone needs it, but it would be even better if you had time to write such a tut. (Yes, i know people can google, wikipedia, whatever.. But tuts written by people from this community would be better)


+1 for the post anyways!
« Last Edit: March 31, 2011, 10:53:04 am by Jaeger^ »
There are no stupid questions, just stupid people.

Offline r00t

  • Serf
  • *
  • Posts: 43
  • Cookies: -4
  • i'm not a hacker
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #2 on: April 06, 2011, 12:59:12 pm »
Nice and informative tutorial! It would be cool if you explained some of the methods on how to do the different things, like, how you would look up someones ports etc. Maybe not everyone needs it, but it would be even better if you had time to write such a tut. (Yes, i know people can google, wikipedia, whatever.. But tuts written by people from this community would be better)


+1 for the post anyways!

IDEM :D
' if you want To catch a thief you must think like a thief '

Offline samadhi

  • NULL
  • Posts: 1
  • Cookies: 0
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #3 on: May 01, 2011, 10:40:30 pm »
Nice and informative tutorial! It would be cool if you explained some of the methods on how to do the different things, like, how you would look up someones ports etc. Maybe not everyone needs it, but it would be even better if you had time to write such a tut. (Yes, i know people can google, wikipedia, whatever.. But tuts written by people from this community would be better)


+1 for the post anyways!

If you have not done so already, get an open source unix like Linux or BSD and learn to use it. I realize its probably not the 'fast track' method you are looking for but it is crucial to your success and understanding of what you are trying to accomplish. Once you have spent some time getting your bearings in the OS then you can begin to learn and utilize the tools that will get you what you want.

For instance the unix tool to identify open ports is called nmap but if you have never used a unix based OS, learning to use it or any of the necessary tools properly will be challenging at best and would be analogous to trying to use calculus without understanding basic algebra.

There are windows apps out there that will do the same thing but it will do all of the work for you and if you are serious about hacking you will need to understand every detail of what you are doing. Besides most web servers run a unix based OS and as a result having no understanding of the unix platform will limit your abilities to successfully exploit or hack one.

Learning everything you can about how these OS's work and learning to do everything manually will, in the end, make you into a true hacker and separate you from the hordes of script kiddies. 

check out distrowatch.com to find a good Linux or BSD to suit your needs and dual boot or run it off a usb or cd if you aren't comfortable abandoning windows just yet. Hope this helps.

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Hacking - Start to finish (quick list)
« Reply #4 on: May 19, 2011, 11:50:57 am »
When I first looked at it I thought would be a waste of time to look at, because of it's size, but it turned out to be a good small and theoretical paper.
Nicely done.
Thanks for reading,
I_Learning_I

Offline Fly_Pig

  • /dev/null
  • *
  • Posts: 5
  • Cookies: 0
  • just a beginer want to learn hacking
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #5 on: June 18, 2011, 08:02:01 pm »
it would be nice if you give more detail about how to use Web application exploitation to hack in.

 
just a beginer want to learn hacking

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #6 on: June 18, 2011, 08:08:24 pm »
it would be nice if you give more detail about how to use Web application exploitation to hack in.

Such a tutorial would be way to big. Read up on the tutorial I have written, RFI, LFI and SQL injection. Ill write some more when I got the time for it.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline DonMilano

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #7 on: August 06, 2011, 02:44:05 pm »
Thanks a lot seci. This tutorial is of immense help to me. --Don Milano

gringoire

  • Guest
Re: Hacking - Start to finish (quick list)
« Reply #8 on: August 29, 2011, 06:16:38 pm »
Very good tutorial, love it.
It's mainly theoretical, and this is good, since there are very few tutorials I know of which talk about this side of hacking.


Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #9 on: August 30, 2011, 04:57:06 pm »
Very good tutorial, love it.
It's mainly theoretical, and this is good, since there are very few tutorials I know of which talk about this side of hacking.
The most effective way of hacking is not only how the vulnerability's work, and how they can be discovered.
But mostly to think as an hacker "ethical". 

Google it for example,   ethical hacker :)
~Factionwars

Offline iak

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Hacking - Start to finish (quick list)
« Reply #10 on: September 16, 2012, 07:54:55 am »
Is there a simple way to hack photo sharing websites to steal their data?

I know I'm going to be attacked for this ques.

Offline s3my0n

  • Knight
  • **
  • Posts: 276
  • Cookies: 58
    • View Profile
    • ::1
Re: Hacking - Start to finish (quick list)
« Reply #11 on: September 16, 2012, 08:45:53 am »
Is there a simple way to hack photo sharing websites to steal their data?

I know I'm going to be attacked for this ques.

Look at web attacks. One method might be uploading a shell instead of an image. Another might be SQLi.
Easter egg in all *nix systems: E(){ E|E& };E