The Secret of Hacking :: Thid Edition: Book Index                                                                        o...
Case study 7I am a Lt. Colonel in the army and have to often carry the confidential information burnedon the DVDs and CDs ...
Case study 15How to download valuable and interesting live streaming videos in high quality we find onYoutube, and Google,...
Case study 23I am a Lt. Colonel and we want to launch a hacking attack on the target person. To do thiswe need a high spee...
I am a Lt. Colonel in the army and I want to be able to listen to in and out mobile calls, seeSMSes of suspected persons w...
There are moments when we have to hack data or ID password from SSL based securitywebsites.We use the following process to...
Upcoming SlideShare
Loading in …5
×

Third index

462 views
424 views

Published on

hhh

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
462
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Third index

  1. 1. The Secret of Hacking :: Thid Edition: Book Index onLLA (Low Level Attack) 1: si er lvCase Study 1I am Lt. Colonel in the army and have physical access to suspected person’s computer. But naI don’t have any ID and password to access and copy information. Is there a way that couldallow me to access and copy all important data without cracking admin password? Fi eCase Study 2 asWe have physical access in the Windows environment of the suspected person whereas we chstore all data and information in the Linux partition. Can we access Linux partitions from urthe Windows operating system without breaking Linux ID and password? P ::Case study 3 eWe have suspected person’s computer with physical access but don’t have access into the filoperating system. How can we break the Windows, Linux, Unix ID and password to gain accessinto the operating system? e pl mCase study 4SaWhat are the ways to stay protected in the event of above three cases so that no one gets accessinto our data and information, and cannot break our, ID and password?Case study 5I am a Lt. Colonel in the army where we often arrest terrorists and recover pen drives, harddisks from them. But often the recovered drives are formatted. In such cases how can werecover the data and information previously stored on them?Case study 6We get DVDs and CDs from the terrorists but when we copy the information from thoseDVDs and Cds, some kind of copy error appears due to damaged condition. What is themethod to copy all the data and information stored on them?
  2. 2. Case study 7I am a Lt. Colonel in the army and have to often carry the confidential information burnedon the DVDs and CDs to the head office. Is there a way to burn CD and DVD so that others oncould not see or access data written on them? si erCase study 8 lvI am Lt. Colonel in the army and have to often carry the confidential information stored in nathe pen drive to the head office. Is there a way to store information on the pen drive so thatothers cannot see or access it? Fi eCase study 9 asWe want to hack the saved IDs and passwords ( from places such as Mozilla, FTP, Outlook, chetc) with the help of USB drive from the suspected person’s computer? urCase study 10 PIn many cases, we have to extract many phone numbers from the pdf bills and otherdocuments (doc, xls, html, txt, etc) in less than five minute to send bulk SMS. How can ::we do this? e fil eCase study 11 plHow to Track (ip address,physical location) anyone Just by sending email? mSaCase study 12How to scan target computers with the help of IP addresses?Case study 13How to compile exploits in order to hack target systems remotely?Case study 14How to detect unknown open ports to check the vulnerabilities?
  3. 3. Case study 15How to download valuable and interesting live streaming videos in high quality we find onYoutube, and Google, etc? on si erCase study 16 lvHow to crack password protected zip files we get from suspected target persons to see theinformation? na FiCase study 17 eHow to access the blocked websites such as Facebook, Orkut or any other site on the universityand company networks? as ch urCase study 18 PSometimes I visit flash based websites and forget ID and passwords. If I have to check suspectedperson’s e-mails, how can I bypass the Flash-based logins (ID and password)? :: e filCase study 19 eHow can we block the e-mail IDs of few miscreants who often cheat us with spams, phishing plattacks? How can we implement DDoS attack or e-mail bombing, etc. mSaCase study 20How can we crash Windows Vista or Windows 7 machines remotely by sending bad SMSpackets so that the target computers crash and reboot automatically with complete datadeletion on those systems?Case study 21How to defeat target person’s iPhone unlock password to check the data or install any spysoftware, specifically we don’t have information about the unlock password?Case study 22What is the path to view original PHP code to hack the target website?
  4. 4. Case study 23I am a Lt. Colonel and we want to launch a hacking attack on the target person. To do thiswe need a high speed Internet line. But the problem is we do not have a single high speed online. Insead, we have multiple Internet lines. How can we integrate multiple net connectionsin Linux for one high speed connection? si er lvCase study 24 naSometimes we install some limited days versions of the software which stop working oncetheir limited period comes to an end. How to break the time limit of any software? Fi eCase study 25 asIn many offices, we find mobile phones enabled with Bluetooth connectivity. How can we see chtheir SMS inbox or contacts and/or make calls from their mobile. P urCase study 26There are employees in our own offices or children at home . How can we keep track of them ::with the mobile phone using motion detection security? How to set up a normal computer eas a security camera without any CCTV or high-end camera? fil e pl mSaHigh LevelHacking AttacksH igh level attacks have high risk and are used by professional hackers andsecurity experts—
  5. 5. I am a Lt. Colonel in the army and I want to be able to listen to in and out mobile calls, seeSMSes of suspected persons without any alert. How can I solve this problem? I have twoconditions: on1. Having physical access to the suspect’s mobile to install SIS mobile virus to control it.2. I do not have any physical access and need to install mobile virus remotely using another simethod. er lvCase study 2 naIf our target is a tech savvy person he does not usually give his phone for physical access tokeep virus software at bay. Neither does he open an unknown SMS.. So we are left with one Filast option that is to just use a spy two way device and hide it in a teddy bear or a gift in orderto listen to his private conversations from his room or car. eCase study 3 as chSometime we get iPhone of the target person and want to know their Internet history, locked urcontacts, and app list, etc. In such scenario how can we do the forensic on iPhone to clinchmaximum information out of it about the suspected person? P :: eCase study 4 filSometimes we want to crack software protection like serials, licensing to bypass security forinformation’s. How can we do step by step reverse engineering? e plCase study 5 mSometimes we want to purchase illegal items using PayPal or Amazon or eBay. In suchSacases, we need a verified account where our credit card details are submitted. How can webypass this security so that we can verify our PayPal, Amazon, eBay accounts for full access?Case study 6Often we need to purchase eBooks, software’s on the internet but we cannot use actualcredit cards due to legal bindings. How to bypass PayPal or any payment gateway security?Case study 7How do Hackers Hack money with the Help of a Virus, fully Untraceable?Case study 8How to hack websites? We teach following topics: process of hacking, SQL injection, andbypass shell security.Case Study 9
  6. 6. There are moments when we have to hack data or ID password from SSL based securitywebsites.We use the following process to bypass SSL security. onCase study 10 siHow to Enter on iphone using Shellcode Custom virus build by Backtrack. erCase study 11 lvSometime we know our target physical location and want to hack their data and information, naand passwords but fail because our target does not open any e-mail sent from our end. At thesame time social eng is also not implemented. But we have another options and just hack the Fiwireless network, WPA, WEP passwords in order to show you the process of hacking. eCase study 12 asHow to Create own Virus to Hack data and information’s from target person?Under this topic, we discuss the following topics: ch1. Creation, Spreading process2. Undetection, and cathing ur3. Create own keylogger and rootkit PCase study 13 ::Sometime our taget person has more technical knowledge and doesn’t open any suspected eattachments or any virus mediums. In such cases, we need to use highest level of hacking filusing metasploit:Under this topic we cover highest levels like: how to launch a remote attack using IP address; ehow to use metasploit, automatic pen testing, metrepreter, install keylogger remotely , virus plcreation and encryption; how to use netcat, activx hacking using HTML file on IE 6-7-8 hacking mCase study 14SaHow to hack any information using spy devices like GPS location or pictures etc. when ourlast hacking drives fail? In such cases, we use some specific spy products.Example 2)Monitor someone by spy flights under 400 usd. With gps and auto update picturemodules.Case study 14USB HackingCase study 15How to secure own networks from all types of hacking attacks and how to communicate inhigh secret level? Security Advice. And more....

×