Thursday, July 12, 2012

[Image: 0XGWk.png]

So first off I see a lot of people asking should I learn to program and what language to learn. So first off I would like to say that if you want to learn to hack, this would be a great skill to learn! All the hacking programs you see have been made with programming. If you know programming, than you will have a great start to hacking! So if you have decided that you want to learn programming, then a good language to start off on might be Python, I have heard that it is a bit choppy but personally it is the language I started off on, and the one that I found easy to learn. You can get python at its website:

http://python.org/

Some other languages that I know of but haven't really worked with are: C ,C++, C#, Java, Perl, Visual Basic, and PHP. Some tutorials that might be useful to you are:

Tutorial on C#

Tutorial on Python

Tutorial on Java

[Image: Brss8.png]

So I have been testing and messing around with ratting for a few weeks now. First off I'll let you know that RAT stands for "Remote Administrative Tool" Basically Rat is what it says it is, a tool to to let you remotely control a computer.

Some highlights of RAT'ing are:
  • Screen Capture
  • Sound Capture
  • Webcam Capture
  • Sending IM's to the slave
  • Having all saved passwords
  • Forceing the slave to go to a website
  • Being able to see all the files on the slaves computer
  • Remote scripting
  • Hiding the desktop icons
  • Hiding the taskbar
  • Installing and deleting programs/files
  • Playing piano noises on the slaves computer

Note: The 'slave' is the computer you are controlling.

I personally have decided not to RAT, because I would like to stay on the legal side of things, but this all personal preference I'm not going to tell you that you should or shouldn't. Some Tutorials that really go into depth on RAT'ing are:

Darkcomet R.A.T Tutorial

Cybergate R.A.T Tutorial

If you would like to read more about R.A.T's or just ask a question about a R.A.T than you should go to the following section.

R.A.T Section of HF

[Image: B4GyW.png]

So this isn't exactly hacking but it is used for the same reason. Social Engineering (SE) is used to manipulate people or companies to get what you want. People use SE for all types of things, for example, you may want to manipulate a friend with the following e-mail to get their password.

"Hello Bob, we have received many notifications saying that someone is trying to log onto your account from a different location, and we will need the following questions answered to verify that this is your account:

Name-
Email-
Location-
Password-

Please reply with an email with those four questions answered. We are sorry for the inconvenience, but we would like to make sure that your account stays safe from malicious hackers.

Sincerely,

The Facebook Team"

If your lucky your slave would send you the E-mail and password to their account. SE is used for way more than just passwords though. Many people use SE to get free items from companies. If you would like to learn more on SE than you should go to the following section.

Social Engineering Section of HF

[Image: FPIhq.png]

What key logging is, is a program that logs your (Or the person you send it to) key strokes on the keyboard. This is most commonly used to try and get passwords for facebook, gmail, xbox account, ect. If you would like to learn more about key logging, than you should head to the following section.

Key logging section

[Image: PFNQf.png]

I don't really know much about this but I know that phreaking is phone hacking. To get more information on this type of hacking you should check out the following section.

Phreaking section

[Image: Hsn6d.png]

What this is to me is just URL hacking. Basically what you do is edit the URL of the page you are on until you can get to admin pages. The part of the site where you can learn more about SQLI injection is here.

SQL Injection section

Since this doesn't really tell you much I will link you to Wikipedia where the first paragraph pretty much says it all.

Wikipedia for SQL Injection

[Image: 2zm3h.png]

This is a kinda weird thing, and it's not really hacking. Since this does however have it's own section on the site, I thought I would tell you what it is, so at least you know. E-whoring is getting pictures of fairly hot women (Preferably naked) and selling them on sites such as Craigslist. When you sell the pictures you usually act like you are the girl, selling pictures of yourself. As you can see this is just a money making method, that I believe is illegal. I have talked to some people who have done this, and they have told me that you can make a lot of money doing this. One guy specifically made around $100 in a month! So there is a lot of money in this. The section for E-Whoring is here:

E-Whoring Section

[Image: ETh4s.png]

There are plenty more types of hacking but these are just a few of the basic hacking types. I will post a more in depth guide later when I learn more about the different types of hacking myself, but I thought that this would help at least guide some of the newcomers on the site. I would also like to say that I am not responsible for any type of hacking that you do. This is just a a simple guide to help you decide where to start with hacking.

Thanks for reading this quick guide, if you have any questions feel free to PM me, and I'll try to get back to you as soon as possible. Finally the guide was made entirely by me, Blades. If you are going to share this with anyone please be sure to give the credit to the creator of the guide, me.

Beginners guide to hacking

  • Uploaded by: MIN Software
  • Views:
  • Share

    0 comments:

    Post a Comment

     

    Our Team Members

    Copyright © hacker va bao mat | Designed by Templateism.com | WPResearcher.com