Ok I'm back up at 3 o'clock in the morning to bring you another article.. Many of us out there think of ourselves as hackers but what is a REAL hacker....Well for those of you out there that play with college computers and local schools.... you are nothing !! The making of a real hacker is being able to find a 'virgin' system and breking in and really doing someting to it...Hacking is not a term to be used lightly....Not only that but hacking is also something not to be taking lightly and flagrently....The reason for hacking....Well you don't hack into a computer just to wreck it or to destoy it even though it is phun, the reason to hack into a computer is to learn from it and conquer it... The idea of actually entering a system, without authorization is life line of hacking....those out there who know what hacking is knows what to do and what not to do but what are the basic rules......Well... here's a short more or less complete list of do's and don'ts on hacking: I. Do not purposely destroy a system -- What's the use of destorying a system anyone....after it's destruction a system is no good and can serve you no real purpose II. Do not leave real names or real handles anywhere on a system -- This is the most important thing to remember....you might want to be recognized for breaking a system but a signature or trademark can only mean your apprehension III. Do not under no circumstance hack a system directly -- If you really plan on hacking a system by running a program or script doing it direct could be dangerous if someone see's you attempting to hack your call be CAN be traced...The best thing to do in this situation is to use a PBX or a outdial of some sort IV. Do not mess with accounts or defaults -- No matter what kind of urge you get , by messing with someones account or messing with the system defaults will let the business notice the intrusion of an outside presence which more or less means a termination of your access V. Do not mess with anything you don't know -- Don't go around the system trying junk you don't understand cause this can only lead to you messing up the system or getting caught VI. Hack during the out of work hours -- By hacking late at night or early in the morning to can escape the chances of someone watching you VII. Do not post your findings on local boards -- Do not post up new stuff you find unless you really want swarms of people at it....A very important thing to control is the urge to brag about systems you find but this could lead to an abuse of the system which in turn leads to the system shutdown....Don't get me wrong about not sharing knowledge but you don't want to send something public unless you have made sure that you have done all you wanted to do with the system That's more or less what you don't what to do....things you might want to do is: I. Set up a account for yourself -- By setting up an account for yourself it will elimanate the chores of finding a backdoor to the system II. Leech files -- Another thing that should be done if possible is to get as many 'interesting' files as you can since they could be useful in later hacking quests III. Fix the security -- If you get a system that has a 'drop' password you should really try to fix it so there is none to make life easier for the following hackers who attempt to infiltrate the system IV. Keep track of the system -- No matter how dumg the system might be or how impossible the security is you should always keep track of all numbers you have V. Look for interestin items in the system -- Keep an eye for stuff that resembles passwords or other numbers since this could lead to new systems or usable passwords That more or less covers that....BUT how do you find 'virgin' systems? Well this is a part of hacking that all hackers most do....scanning...Scanning or wardialing was brought to life by the popular hacker movie 'Wargames' which inspired the war games wardialer....what a wardial or scanner does is it goes thru all the numbers in a specified prefix.....A good wardialer or scanner should be able to go thru numbers and be able to store them in a file which you can go thru later when you're bored....The idea is to find system beloning to companies and business....it's a good idea to find out a prefix to lets say your downtown area... Another thing that most companies also have is frequecies hooked up to computers... This is a lot tuffer to scan for since you would nee to set up a HAM radio to go thru frequencies and collect infomation on what frequencies have carriers on the other ends...This is a fairly difficult thing to do but he rewards could be great....the most importan thing to remeber is to scan with the HAM in you car or something.....scanning from a fixed location will only cause police and FBI to show up at your doorsteps.. When you've located a system don;t get discouraged if you get no response... many system think that if they set it up to connect at wierd parity's or stop bits and baud rate it's all the security so it is very important to find a communication program that will allow to do wierd things such as connecting at 1100 bauds and 1800 bauds....also to be able to set the parity to mark and space... Well I hope this phile helps you starters...I'm going to crash now I've done my good deed for the day....well keep hacking but remember to hack safe! Have phun StYLe formaly ThE gH0sT formaly ThE gH0sT
This blog gives you the Hacking and computer Stuff as free, That no sites or Forums gives and power to learn more in a interesting way. As you all know every one wants to be hacker or a computer geek in life because in today;s generation hacking like cool thing. On this site there is no Bull shit only hacking is there, fine. LET'S START OUR JOURNEY
Search For Hacking
Translate into Hacking language
Sunday, December 9, 2012
Hacking Rules
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment