Contents
Copyright 2021.WILFRED DAWSON
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.
Th Fundamentals f Hkng
Thr r thr rt f hkr:
1. Wht ht
2. Blk cap
3. Dim .
A wht (ddtnll knwn mrl) hkr tr t brh network frmwrk n rdr t hl rgnztn nd rgnztn n mrvng thr dgtl dfn. A drk hkr, mnwhl, dgtl records nd/r gadgets for vndtv ur. A gr ht hkr a blnd f th frt tw t: h mght b a wht ht th time nd bm a dark ht in the nxt.
Sgnfnt Nt: Thr r lw tht dllw dark hkng. Yu n gt dtnd f u'll tr t dgtl nfrmtn wthut th wnr' rmn. Bu of tht, th bk wll hl u bm a mrl hkr. It wll rvd u wth t, trk, nd thnu that you n u in hkng tm thll.
Bnft f Ethl Hkng
T rtt urlf frm thv, u nd t thnk lk n. This tndrd rv th center f wht ht hkng.
Th ttl numbr f programmer's dvlng h d. Wht' mr, these l r n a rtnt ut t mrv thr kll nd xnd thr knwldg. On the ff chance that u wll ndr th vulnrblt tht xt in machines and dgtl ntwrk, u wll undrtnd th drdful tt f urt tht individuals hv against hkr. Yu nd t ur ur frmwrk frm th awful gu. T hv th objective, u huld know hw to hk.
The bjtv of a wht ht hkr r:
Attk a tm wthut dtrng t
Idntf tm vulnrblt
Prove tht vulnrblt xt
Hl n mrvng th urt f h trgt
Diverse T f Hkng Attk
Hkr dvd thr ttk nt dvr t. Th types r:
Nnthnl
Th thnu fu n th nd-ur (..,, the ndvdul wh use th trgt gdgt). Bu humn hv a nturl tndn to trut thr, rgrmmr n brk through a tm' dfn wthut ung n ltrn device. Th hkr m u "l ngnrng" strategies t btn a ur' trut nd ur t a ntwrk r fl. Yu'll learn mr but l ngnrng ltr on.
A rgrmmr m ddtnll execute a hl ult gnt h trgt. Fr ntn, he m brk nt a PC rm nd n r mr dv tht r rnt. A n ltrntv, h m check th dumtr in th building nd tr t lk for uful data (.g.,, wrd). Hkr allude t th rh "dumtr dvng".
Ntwrk
Prgrmmr' n tulz th knd f ttk l, n most ntwrk r bl thrugh th ntrnt. Th mt mmn frm of ntwrk ttk r:
Ang a ntwrk ung a rggd mdm
Tkng dvntg f weaknesses n dgtl trnrt mnnt (.g.,, NtBIOS)
Sndng a ntnuu trm f rut t a ntwrk
Rggng th tm nd lltng dt kt t gt t secret nfrmtn
Ortng Stm
Th ttk l n mrtnt jb n n hkr' tlkt. Tht bu h PC h a rtng framework. Al, there r a lt f tl tht u n u t rk th OS (..,, rtng arrangement) of a mutr.
Thr are a tn of rtng frameworks ut thr. Hwvr, rgrmmr uull center rund th mt ulr n (.g.,, Wndw tm). Here r m f th OS ttk tht u n u:
Dtrng th urt f a fl tm
Dhrng wrd
Attkng r-ntrdud uthnttn ntrumnt
Tkng dvntg f vulnrblt n rtn rtl
Altn
Sm hkr utlz PC rgrm t ult ntwrk. Oftn, a hkr gn t a mhn thrugh a wb-bd ltn r n ml-rltd rgrm. Th mt ulr mmbr f this t are:
Sndng "m" (..,, grbg ml) t ndvdul
Intllng mlwr (i.e.,, mlu ftwr) n objective tm
Bng urt tm (.g.,, frwll) thrugh "n th web" conventions (.g.,, SMTP, HTTP, IMAP, t.)
Hkng - A Gud for Bgnnr
Thr are mn lrnng mtrl for hackers. Mt f these mtrl r fr, u wnt have to spend any money just t develop ur hkng kll. Unfrtuntl, mt f the hkng rur that ull find are rtd for intermediate nd/r expert hkr. Yu wnt bnft from th said mtrl f you are a mlt bgnnr.
Yu wll dvr a quick nd way t bm a hkr. The thr-t lrnng rgrm tht you will see hr rtd for newbies. It wll hl u mtr th b of hacking ung a lgl mthd f lrnng.
Frt Step Lrn More but Cmutr nd Ntwrk
Hkng nvlv mutr nd ntwrk. It rur advanced mutr knowledge and ntwrkng kll. Obvul, u wont b able t hack a mutr f u dnt even knw the difference btwn TCP/IP nd Wndw XP. T bm a hacker, you mut knw th b of mutr-rltd technology.
It would be best f ull expose urlf t different rtng tm. More nd more l r wthng t Lnux systems you huld lrn th basics of that OS. On you have mastered th basics of mutr nd ntwrk, undrtndng hw xlt and vulnerabilities wrk wll be .
Snd St Rd Basic Hkng Books
Thr r untl hacking bk ut there. A basic Google search will give u hundreds of vlbl learning mtrl. However, n you are nw to th hacking wrld, you huld fu n the b ideas and principles of hacking. It tmtng t grab bk but dvnd t uh Wireshark utlztn or payload ltn, but u wnt bnft from th study mthd. Th dl learning strategy fr a mlx concept (like computer hkng) t mtr the b nd build u ur knwldg nd skills lwl.
This Bk wll vr th b aspects of hkng. Aftr rdng th bk, ull be bl t ttk systems nd undrtnd complex d rltd t dgtl security.
Thrd Step Learn How t Prgrm
If u wnt t be a klld hacker, u huld know how t create your wn rgrm. Prgrmmng kll r mrtnt fr anyone wh is ru but hkng. It true that there are tons of rgrm and ready-made tools vlbl nln. Hwvr, rlng on thr peoples work nt a gd d. Th ability to create ur wn rgrm nd mdf xtng hkng tl can hl u grtl in ur quest t become a hkng xrt.
There r a lt f programming lngug tht u n h frm. But f you r a total nwb, you should tud Python frt. Pthn one of th mlt programming lngug ut thr. Hwvr, t is extremely effective in writing d fr hkng ur. Th is th main rn wh many hkr rfr this lngug over C++ r Rub. Yull learn mr about Pthn n th nxt htr.
How t Hk with Pthn
Pthn n f th bt programming lngug fr hacking. This lngug t learn nd wrful nugh t tf ll f your rgrmmng nd. In th htr, ull learn th b f Pthn. You wll know hw t launch t, hw to wrt codes wth t, and hw to ml t.
Imrtnt Nt: Th htr assumes tht you r ung Kali Linux, an rtng system tht is rtd fr hkr. Kl Lnux ntn hundrd f built-in hkng tl that u n u t tt your systems r attack thr ntwrk. In addition, th OS is mltl fr.
How to Gt Pthn Modules
An excellent benefit of ung Kl Lnux tht t comes wth a pre-installed vrn of Python. Tht means u can start writing codes without dwnldng nthng. Th default mdul nd lngug lbrr f Python allow you to rfrm a wd rng f activities. For instance, the rd-md vrn f Pthn h exception hndlng, fl handling, mth and numbr modules, and dt t.
Pthn built-in tl nd components r nugh to rt fftv hkng tools. But u n enhance the fftvn and flexibility f th lngug b downloading ddtnl mdul frm thrd-rt sources. These extra mdul are th main rn wh many hackers h Pthn fr their rgrmmng needs.
Intllng a Mdul
Just lk thr Lnux systems, Kali Lnux rur wgt when acquiring new fl r programs frm th internet. This command dwnld ur hn file or rgrm from its rtv repository. Thn, you have t dmr th dwnldd module and u the fllwng mmnd:
Python tu. install
Lt um tht you wnt t dwnld Nm (a thn mdul) frm www.xl.rg. T gt th mdul, you must:
1. Turn on ur Kl Lnux mutr.
2. Launch a trmnl (th mll wndw tht tk ur nut).
3. T th fllwng code:
Kl > wgt http://xael.org/norman/python/python-nmap/python-nmap-0.3.4.tar.gz
4. Extract th file by tng:
Kl > tr xzf python-nmap-0.3.4.tar.gz
5. Access the drtr u rtd by entering:
Kl > d python-nmap-.03.4/
6. Issue the code given blw to fnh th process:
Kali > python tu. install
Congratulations. Yu ufull ntlld a Pthn module n ur Kl Lnux computer. Now, you can u the said mdul for ur hkng tvt. Important Nt: Th the mthd tht you mut u t dd more mdul t your operating tm. It mght m lng nd mlx t frt. But n u get used t it, rtng a large lltn of thrd-rt modules wll b a walk n th park.
Hw to Wrt Pthn Srt
In this rt f th book, ull lrn how t wrt d ung th Pthn language. It will l xln the fundmntl terms, nt, nd ntx f Pthn d. Rd th mtrl rfull; it wll help u become a knowledgeable rgrmmr nd hacker.