tutorial learn to be a hacker

in #hacker7 years ago

image

Hackers with expertise can see & fix software flaws on computers; usually later published publicly on the Internet to make the system better. Unfortunately, a handful of evil-hearted people use that information for evil - they are usually called crackers. Basically the world of hackers & crackers is no different from the art world, here we are talking the art of Internet network security.

I hope the network security science in this paper is used for the good stuff - be Hacker is not Cracker. Do not expose you to karma for using knowledge to destroy the property of others. Moreover, at this time the need for hackers is increasing in Indonesia with more and more dotcommers who want IPO in various stock exchanges. The good name & value of a dotcom could fall even become worthless if dotcom is in collapse. Under these circumstances, hackers are expected to become security consultants for these dotcommers - because the Indonesian police & security apparatus are very weak & sad in the field of Information & Internet Technology. Whether for cybersquad, private cyberpatrol may be necessary for the survival of Indonesian dotcommers on the Internet.

Various Internet network security techniques can be obtained easily on the Internet such as http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http: // www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some of these techniques are books that number a few hundred pages that can be taken for free (free). Some Frequently Asked Questions (FAQ) about network security can be found at http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. And for the experimenter some scripts / programs that have been so can be obtained, among others, at http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html .

For readers who want to gain knowledge about the network can be downloaded for free from http: //pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . Some free softcopy books can be taken from http://pandu.dhs.org/Books-Online/. We should be especially grateful to the Pandu team led by I Made Wiryana for this. At the moment, I do not really know of an Indonesian discussion site that is actively discussing these hacking techniques - but may be partly discussed in advanced mailing lists such as [email protected] & [email protected] which operated by the Indonesian Linux User Group (KPLI) http://www.kpli.or.id.

The simplest way to look at system flaws is to seek information from various vendors eg at http://www.sans.org/newlook/publications/roadmap.htm#3b about the flaws of their own systems. In addition, monitor various Internet mailing lists related to network security as listed in http://www.sans.org/newlook/publications/roadmap.htm#3e.

Described by Front-Line Information Security Team, "Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks," [email protected]: //www.ns2.co.uk. A Cracker generally men aged 16-25 years. Based on statistics of Internet users in Indonesia then actually the majority of Internet users in Indonesia are young people at this age as well. Indeed, this age is a very ideal age in the new science, including Internet science, it is unfortunate if we do not successfully mengternetkan to 25000 Indonesian schools s / d in 2002 - because the future of the Indonesian nation is in the hands of our young children.

Well, these young crackers generally crack to increase the ability / use of resources in the network for its own sake. Generally the crackers are opportunis. Seeing weakness by running a scanner program. After gaining root access, the cracker will install the backdoor and close all common flaws.

As we all know, most companies / dotcommers will use the Internet for (1) their web server hosting, (2) e-mail communications and (3) provide web / internet access to their employees. Separation of Internet and IntraNet networks is generally done by using Firewall software and Proxy server. Looking at the above usage conditions, the weakness of the system can generally be translucent for example by penetrating external mailserver / outside which is used to facilitate access to mail out of the company. In addition, using aggressive-SNMP scanners & programs that force SNMP community strings can turn a router into a bridge (bridge) which can then be used for stepping stones to enter into the company's internal network (IntraNet).

In order for crackers to be protected during an attack, cloacking is done by jumping from a machine that has been compromised by a telnet or rsh program. On an intermediary machine that uses Windows attacks can be done by jumping from the Wingate program. In addition, jumping can be done through a poorly configured proxy device.

After successfully jumping and entering another system, the cracker usually probes the network and collects the required information. This is done in several ways, for example (1) using nslookup to execute the command 'ls ', (2) viewing HTML files in your webserver to identify other machines, (3) viewing various documents on FTP server, 4) connecting to the mail server and using the 'expn ' command, and (5) mem-finger users on other external machines.

The next step, the cracker will identify the network components that are trusted by any system. These network components are usually the server administrators and servers that are usually considered the safest in the network. Start with NFS access & export checks to critical directories like / usr / bin, / etc and / home. Exploit the machine through the weakness of the Common Gateway Interface (CGI), with access to /etc/hosts.allow file.

Furthermore, crackers must identify weak network components and can be conquered. Cracker can use programs on Linux like ADMhack, mscan, nmap and many other small scanners. Programs like 'ps' & 'netstat' are created by trojans (remember the Trojan horse story in classical greek story) to hide the scanning process. For a fairly advanced cracker can use aggressive-SNMP scanning to scan equipment with SNMP.

Once the cracker successfully identifies weak network components and can be conquered, then the cracker will run the program to conquer the weak daemon program on the server. The program daemon is a program on a server that usually runs behind the scenes (as a daemon / demon). Successfully conquering this daemon program will allow a Cracker to gain access as 'root' (the highest administrator on the server).

To eliminate traces, a cracker usually performs a clean-up operation operation by clearing various log files. And add a program to enter from the backdoor 'backdooring'. Replace the .rhosts file in / usr / bin for easy access to the conquered machine via rsh & csh.

Furthermore, a cracker can use a machine that has been conquered for its own sake, for example taking sensitive information that should not be read; cracking another machine by jumping from a conquered machine; installing a sniffer to view / record the various traffic / communications that pass; can even turn off the system / network by running the command 'rm -rf / &'. The latter will be very fatal consequences because the system will be destroyed altogether, especially if all the software is placed on the hard disk. The process of re-installing the whole system should be done, it would be confusing if this is done on machines that run mission critical.

Therefore all machines & routers running critical missions should always be checked for security & patches by newer software. Backups are especially important for machines running critical missions to be saved from the cracker that disables the system by 'rm -rf / &'.

For those of us who daily struggling on the Internet will usually really appreciate the existence of the hackers (not Cracker). Because thanks to the hackers that the Internet exists and we can enjoy like this now, even continue to improve to become a better system again. The various flaws of the system are fixed because of the cleverness of hacker peers who often work on the fix. voluntarily because of his hobby. Moreover, often the results of his hacking on the spread for free on the Internet for the purposes of the Internet community. A noble value & culture gotong royong grew in the virtual world of the Internet that usually seem futuristic and far from social taste.

The development of these hacker hobbies is crucial for the survival of dotcommers in the Indonesian Internet rides. As one form in fact, in the near future Insha Allah around mid-April 2001 will be held hacking competition on the Internet to break into a server that has been specified in advance. Hacking competition is in motori by young people in Indonesian Linux User Groups (KPLI) Semarang driven by young people such as Kresno Aji ([email protected]), Agus Hartanto ([email protected]) & Lekso Budi Handoko (handoko @ research.dinus.ac.id). Like most other young people, they are generally capital-tight - help & sponsorship will certainly be very useful and eagerly anticipated by these young peers.

Hopefully all this will add to the spirit of readers, especially young readers, to move in the world of hackers are exciting and challenging. If the words Captain Jean Luc Picard in the Next Generation Startrek Films, "To boldly go where no one has gone before".

so understand dlu his philosophy .. new dech berkoar-koar. do not be so pretentious and admit-ngaku likes hacking kalk ngk tau ngek ngeng ngok..okey

Sort:  

I love you hacking trick sso very...n

You welcome

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.028
BTC 54260.52
ETH 2284.10
USDT 1.00
SBD 2.30