SlideShare a Scribd company logo
Hery Intelligent Technology
IT Solution Center
Network Security Penetrating Testing
IT Community Malaysia (ITCom)
http://www.itcom.activeboard.com/
DEFINITION
In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge. –
Wikipedia.
In other words, hacker is someone that able to make a hole at a security wall. The
hole is any vulnerable of a host/server/computer. From the hole, hacker could
inject a script to exploit the victim.
OBJECTIVES
The main objectives of this slide is not going to tell you the very basic of hacking. In
this slide I am not talking abut, What is Black Hat, White Hat, Blue Hat, Grey Hat
or white hack of any hat of hacker. This is because, for me, if you know perfectly
about the “hat”, you are still not a hacker.

In a simple word, to be a hacker, you need knowledge about what script do, how the
exploit work, why must use the payloads, what is the best OS to hack and the next
hack of hack.
Actually, this book is not show you “How to be a hacker”, because this slide I made it
is not for the “Very Stupid Newbies” and also not for the “The Best Fuc*king Shit
Master of Hacker”. The aim reader of this slides is for the intermediate, newbies,
researcher, network security,, computer company, network developer, and more.
This is because, this slides will touch a bit about basic hacking to support definition of
hack, this slide will discuss about ideas of hacking and bit about social
engineering.
TOOL’S LIST
When the process of hacking take place, then the thing that very important is OS.
What is OS? OS is Operating System. Example of OS is Windows XP, Vista, 7.
Windows is provided by Microsoft. There is another OS that provided by different
company such as Linux. In Linux, there is OS Ubuntu, Red Hat, Opera and more.
In this case of hacking, we will differentiate Apple OS. Because Apple OS we will
go thru accurately for the next slides. (Also for Android OS/Phone OS).
The most popular OS in hacking world is Backtrack from Linux and Windows XP from
Microsoft. Backtrack OS, there is many version. There is Backtrack 2,3,4,5. The
latest is Backtrack 5 R3. But, nowadays, Backtrack is new OS of hacking in Linux,
because the newest is Kali Linux 1.0.6 like that. The Kali Linux (KL) or Backtrack
(BT) is different with the Windows XP. Windows XP is not built-to-hack like BT and
KL. Hence, the KL and BT is a free OS that everyone can download from their
website, but Windows XP is not a free OS. Windows XP is built-to-use. It is mean,
or the Documentation work, graphic or anything else. It is very flexible to use
compare to BT and KL is not to flexible.
TOOL’S LIST
But, these two OS, there is the most very important thing that they are the same, it is
these two OS is VULNERABLE. In other words, it could be hacked. That’s why
these two OS can be use to hack.
The tools most popular to use is on the list:

Tools

Uses

OS

Metasploit / armitage (Graphical)

General Hacking Tools

BT/Win

Havij / SQLMap

Website Hacking

BT/Win

Aircrack

Wifi Hacking

BT/Win

Cisco Firewall

Firewall PenTest

BT

Ettercap / Wireshark / Cain&Abel

Sniffing

BT/Win
TOOL’S LIST
The list is not complete. But that is the most best tools. Besides that, to support that
tools, there is some tools are need to let the tools above running well.
The tools are:

Tools

Uses

OS

Zenmap / Netcat

Scanner

BT/Win

MD5 HASH

Decrypter

BT/Win/Webs

These tools are free tools and can get from the any hacker’s website.
TOOL’S LIST
This is the flow how’s the tools work up:

Aircrack
The Aircrack will crack Wifi,
then Zenmap scan IP,
use firewall shutter to
penetrate firewall,
Metasploit try to
penetrate, send exploit
to collect data and
crash system, use
ettercap to collect
cookies password.

Web Browser

Success
Hacked!

Metasploit

Firewall
(Cannot
Defeated)

Exploit &
Payload

Firewall Down

Ettercap

Hack

Data
Receive

Password
Receive

Zenmap

Remote
Control
Havij/
SQLMap
Uploading
Shell

Finding URL, test vulnerability, vulnerable
detected, decrypt hash, login to webs,
upload a shell and access the data.

Vulnerable

Decrypt Hash

Logged In

Password
Found
WHY SHOULD…?
We must know about the terminology. It is because, when we know the actual
definition of the term in hacking, then we can adapt something to be something
uses. The example I will count it after this.
The word that are important to know is ”Exploit”. Exploit is a “specialized” small
programs that could that advantages and deliver a payload, which will grant
attacker the control. Metasploit is a great tool that has a vast number of exploits.
Payload is delivered by exploit and is used to control the remote system. Think of it
this way.
“Exploit is like terrorist that is carrying a bomb in his backpack. He enters the
system and leaves his backpack there. Most popular and widely known payload is
“meterpreter”, that has a lot of features. With it you can browse remote files,
download them, upload your own, capture keystrokes and more. Through
meterpreter, you can pivot and attack machines in networks that are not your
own”
SOMETHING TO BE SOMETHING
I will give you two options. If you are a newbie, maybe you feel like you want to try. If
you are a intermediate hacker, you will see how we can adapt the Thins to be
Something more good.
#First: Hacking ATM Bank.
When you are understand the flow above, then you will how is this work.
“At the evening, you and your friends do to McDonald to buy something to eat.
Then you bring your laptop. Behind the McD, there is a Bank. When you turn on
your laptop, the Bank’s Wifi signal is detected. Then you crack the wifi, try to
penetrate the firewall the you re being a remote control of the computer. Then you
are using Zenmap to find the IP of the ATM machines, you found it, then you crack
the Firewall and you re successfully. Upload the payload and exploit. Now, you are
controlling the ATM Machines” – Actually, ATM machine are using Windows 2000
and oldest. This is mean, the OS of the ATM machine is easy to hack.
SOMETHING TO BE SOMETHING
#Second: Hacking as a work.
If you re noticed, when you re running BT, the sniffer is not work to the external
network. The sniffer just work on your internal network. Social-Engineering-Toolkit
(SET) also the same. Do you ever think that XAMPP and WAMP server is not work
for external network but just work for internal network? So, how to make XAMPP
and WAMP server work for external network (Globally)? The answer is registered
your computer as a domain. Then people can connect to you.
This is the same way:
“You register your network as a Linux domain server, then running BT or KL. Then,
your sniffer will work people globally. Then, promote your self to social network as
a hired hacker. If someone need to hack, they must pay you. When they paying
you, then you have to sniff the victim, get their password and sell it to “Needers”. The same thing for using Msf and SET.
SOMETHING TO BE SOMETHING
The conclusion for this section is, you must be creative. You have to think what you
need to do. What you need something to do the do. If you keep trying and trying
and trying, you can make the hack with your own way.
The computer is following you command, we made it, it is mean we can crack it! This
note is note for bad purpose, even it is, but I just make it for researcher network
security.
LAST WORDS
These note are very important. I made these slide with to many words because I want
to let all people know, to be a hacker is not only asking people with the stupid
question ; “How to hack facebook?” , “please tell me how to hack”. This stupid
question will not help you. You must READ, LEARN, TEST, BE BRAVE, then you will
have it.
These note have been created by the Moderator Of Network in IT Community
Malaysia. – Http://www.itcom.activeboard.com/ . This website forum is
vulnerable, but, please do not hack it. Because there is nothing important to
hack. If you need something, just need to register and ask as many question you
want.
Lastly, I’ve made mistakes. I am a normal human, human will make mistakes. So, if
you feel I am wrong, then just ask me, I will change it and discuss about it. I also
beg apologize for my bad English Spelling, Grammar, Grandpa, Grander and so
what the Hack Grand so on.

Thank you,
Call Me If You In Trouble,
I am Sharper.

Hery Intelligent Technology
IT Solution Center
Network Security Penetrating Testing
IT Community Malaysia (ITCom)
http://www.itcom.activeboard.com/

More Related Content

What's hot

Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
Askao Ahmed Saad
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
amrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdfamrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdf
amrapalibuildersreviews
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
Tjylen Veselyj
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
Yam Peleg
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
Damon Cortesi
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeUtkarsh Sengar
 
How to bypass email gateways using common payloads... Bsides Manchester 2017
How to bypass email gateways using common payloads... Bsides Manchester 2017How to bypass email gateways using common payloads... Bsides Manchester 2017
How to bypass email gateways using common payloads... Bsides Manchester 2017
Neil Lines
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Enemies of the west
Enemies of the westEnemies of the west
Enemies of the west
Neil Lines
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Mazin Ahmed
 
Pentesting with Metasploit
Pentesting with MetasploitPentesting with Metasploit
Pentesting with Metasploit
Prakashchand Suthar
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 

What's hot (20)

Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
amrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdfamrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdf
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
 
How to bypass email gateways using common payloads... Bsides Manchester 2017
How to bypass email gateways using common payloads... Bsides Manchester 2017How to bypass email gateways using common payloads... Bsides Manchester 2017
How to bypass email gateways using common payloads... Bsides Manchester 2017
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Enemies of the west
Enemies of the westEnemies of the west
Enemies of the west
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Cyber security
Cyber securityCyber security
Cyber security
 
Pentesting with Metasploit
Pentesting with MetasploitPentesting with Metasploit
Pentesting with Metasploit
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 

Similar to Hack the book Mini

Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
Felipe Prado
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
IndianArmy38
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
IndianArmy38
 
Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
Ham'zzah Mir-zza
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
xererenhosdominaram
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
 
Ulfah
UlfahUlfah
Ulfahulfah
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
Hackfest Communication
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkComet
Pich Pra Tna
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of Technology
Akash Mittal
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsfaouzib
 
Move Fast and Fix Things
Move Fast and Fix ThingsMove Fast and Fix Things
Move Fast and Fix Things
Dan Kaminsky
 
Ettercap_Tool_Kali_Linux_Tool_Presentation
Ettercap_Tool_Kali_Linux_Tool_PresentationEttercap_Tool_Kali_Linux_Tool_Presentation
Ettercap_Tool_Kali_Linux_Tool_Presentation
prayag24103
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
Esteban Bedoya
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 

Similar to Hack the book Mini (20)

Basic hacking tutorial i
Basic hacking tutorial iBasic hacking tutorial i
Basic hacking tutorial i
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Ulfah
UlfahUlfah
Ulfah
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Hacking
HackingHacking
Hacking
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkComet
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of Technology
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Move Fast and Fix Things
Move Fast and Fix ThingsMove Fast and Fix Things
Move Fast and Fix Things
 
Ettercap_Tool_Kali_Linux_Tool_Presentation
Ettercap_Tool_Kali_Linux_Tool_PresentationEttercap_Tool_Kali_Linux_Tool_Presentation
Ettercap_Tool_Kali_Linux_Tool_Presentation
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 

More from Khairi Aiman

Sistem HITeCOB - Suruhanjaya Bangunan COB
Sistem HITeCOB - Suruhanjaya Bangunan COBSistem HITeCOB - Suruhanjaya Bangunan COB
Sistem HITeCOB - Suruhanjaya Bangunan COB
Khairi Aiman
 
Overview to Data Transaction Management
Overview to Data Transaction ManagementOverview to Data Transaction Management
Overview to Data Transaction Management
Khairi Aiman
 
Xamarin.Form : Basic to Mobile Development
Xamarin.Form : Basic to Mobile DevelopmentXamarin.Form : Basic to Mobile Development
Xamarin.Form : Basic to Mobile Development
Khairi Aiman
 
Overview to Xamarin : Understanding Xamarin Architecture
Overview to Xamarin : Understanding Xamarin ArchitectureOverview to Xamarin : Understanding Xamarin Architecture
Overview to Xamarin : Understanding Xamarin Architecture
Khairi Aiman
 
Xamarin.Forms Application UI XAML Definition
Xamarin.Forms Application UI XAML DefinitionXamarin.Forms Application UI XAML Definition
Xamarin.Forms Application UI XAML Definition
Khairi Aiman
 
C# programming : Chapter One
C# programming : Chapter OneC# programming : Chapter One
C# programming : Chapter One
Khairi Aiman
 
Catalouge 2016 Hery Intelligent Technology
Catalouge 2016 Hery Intelligent TechnologyCatalouge 2016 Hery Intelligent Technology
Catalouge 2016 Hery Intelligent Technology
Khairi Aiman
 
HIT Catalogue 2016
HIT Catalogue 2016HIT Catalogue 2016
HIT Catalogue 2016
Khairi Aiman
 
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & MukadimahPrinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
Khairi Aiman
 
Meterpreter in Metasploit User Guide
Meterpreter in Metasploit User GuideMeterpreter in Metasploit User Guide
Meterpreter in Metasploit User Guide
Khairi Aiman
 
Hacking SSL When Using RC4
Hacking SSL When Using RC4Hacking SSL When Using RC4
Hacking SSL When Using RC4
Khairi Aiman
 
Hery Intelligent Technology - Corporate Profile 2015
Hery Intelligent Technology - Corporate Profile 2015Hery Intelligent Technology - Corporate Profile 2015
Hery Intelligent Technology - Corporate Profile 2015
Khairi Aiman
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004
Khairi Aiman
 
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
Khairi Aiman
 
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
Khairi Aiman
 
13 May 1969
13 May 196913 May 1969
13 May 1969
Khairi Aiman
 
Bahasa kebangsaan
Bahasa kebangsaanBahasa kebangsaan
Bahasa kebangsaan
Khairi Aiman
 
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
Khairi Aiman
 
Burger doll order form
Burger doll order formBurger doll order form
Burger doll order form
Khairi Aiman
 
Kiosk teknologi masa kini - Kajian Soalan
Kiosk teknologi masa kini - Kajian SoalanKiosk teknologi masa kini - Kajian Soalan
Kiosk teknologi masa kini - Kajian Soalan
Khairi Aiman
 

More from Khairi Aiman (20)

Sistem HITeCOB - Suruhanjaya Bangunan COB
Sistem HITeCOB - Suruhanjaya Bangunan COBSistem HITeCOB - Suruhanjaya Bangunan COB
Sistem HITeCOB - Suruhanjaya Bangunan COB
 
Overview to Data Transaction Management
Overview to Data Transaction ManagementOverview to Data Transaction Management
Overview to Data Transaction Management
 
Xamarin.Form : Basic to Mobile Development
Xamarin.Form : Basic to Mobile DevelopmentXamarin.Form : Basic to Mobile Development
Xamarin.Form : Basic to Mobile Development
 
Overview to Xamarin : Understanding Xamarin Architecture
Overview to Xamarin : Understanding Xamarin ArchitectureOverview to Xamarin : Understanding Xamarin Architecture
Overview to Xamarin : Understanding Xamarin Architecture
 
Xamarin.Forms Application UI XAML Definition
Xamarin.Forms Application UI XAML DefinitionXamarin.Forms Application UI XAML Definition
Xamarin.Forms Application UI XAML Definition
 
C# programming : Chapter One
C# programming : Chapter OneC# programming : Chapter One
C# programming : Chapter One
 
Catalouge 2016 Hery Intelligent Technology
Catalouge 2016 Hery Intelligent TechnologyCatalouge 2016 Hery Intelligent Technology
Catalouge 2016 Hery Intelligent Technology
 
HIT Catalogue 2016
HIT Catalogue 2016HIT Catalogue 2016
HIT Catalogue 2016
 
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & MukadimahPrinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
Prinsip perakaunan tinkatan 4 bab 7 Part 1 - Pelarasan & Mukadimah
 
Meterpreter in Metasploit User Guide
Meterpreter in Metasploit User GuideMeterpreter in Metasploit User Guide
Meterpreter in Metasploit User Guide
 
Hacking SSL When Using RC4
Hacking SSL When Using RC4Hacking SSL When Using RC4
Hacking SSL When Using RC4
 
Hery Intelligent Technology - Corporate Profile 2015
Hery Intelligent Technology - Corporate Profile 2015Hery Intelligent Technology - Corporate Profile 2015
Hery Intelligent Technology - Corporate Profile 2015
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004
 
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)
 
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)
 
13 May 1969
13 May 196913 May 1969
13 May 1969
 
Bahasa kebangsaan
Bahasa kebangsaanBahasa kebangsaan
Bahasa kebangsaan
 
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
(SOCIAL ENGINEERING - MY) - Psiko rakan kerja
 
Burger doll order form
Burger doll order formBurger doll order form
Burger doll order form
 
Kiosk teknologi masa kini - Kajian Soalan
Kiosk teknologi masa kini - Kajian SoalanKiosk teknologi masa kini - Kajian Soalan
Kiosk teknologi masa kini - Kajian Soalan
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Hack the book Mini

  • 1. Hery Intelligent Technology IT Solution Center Network Security Penetrating Testing IT Community Malaysia (ITCom) http://www.itcom.activeboard.com/
  • 2. DEFINITION In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. – Wikipedia. In other words, hacker is someone that able to make a hole at a security wall. The hole is any vulnerable of a host/server/computer. From the hole, hacker could inject a script to exploit the victim.
  • 3. OBJECTIVES The main objectives of this slide is not going to tell you the very basic of hacking. In this slide I am not talking abut, What is Black Hat, White Hat, Blue Hat, Grey Hat or white hack of any hat of hacker. This is because, for me, if you know perfectly about the “hat”, you are still not a hacker. In a simple word, to be a hacker, you need knowledge about what script do, how the exploit work, why must use the payloads, what is the best OS to hack and the next hack of hack. Actually, this book is not show you “How to be a hacker”, because this slide I made it is not for the “Very Stupid Newbies” and also not for the “The Best Fuc*king Shit Master of Hacker”. The aim reader of this slides is for the intermediate, newbies, researcher, network security,, computer company, network developer, and more. This is because, this slides will touch a bit about basic hacking to support definition of hack, this slide will discuss about ideas of hacking and bit about social engineering.
  • 4. TOOL’S LIST When the process of hacking take place, then the thing that very important is OS. What is OS? OS is Operating System. Example of OS is Windows XP, Vista, 7. Windows is provided by Microsoft. There is another OS that provided by different company such as Linux. In Linux, there is OS Ubuntu, Red Hat, Opera and more. In this case of hacking, we will differentiate Apple OS. Because Apple OS we will go thru accurately for the next slides. (Also for Android OS/Phone OS). The most popular OS in hacking world is Backtrack from Linux and Windows XP from Microsoft. Backtrack OS, there is many version. There is Backtrack 2,3,4,5. The latest is Backtrack 5 R3. But, nowadays, Backtrack is new OS of hacking in Linux, because the newest is Kali Linux 1.0.6 like that. The Kali Linux (KL) or Backtrack (BT) is different with the Windows XP. Windows XP is not built-to-hack like BT and KL. Hence, the KL and BT is a free OS that everyone can download from their website, but Windows XP is not a free OS. Windows XP is built-to-use. It is mean, or the Documentation work, graphic or anything else. It is very flexible to use compare to BT and KL is not to flexible.
  • 5. TOOL’S LIST But, these two OS, there is the most very important thing that they are the same, it is these two OS is VULNERABLE. In other words, it could be hacked. That’s why these two OS can be use to hack. The tools most popular to use is on the list: Tools Uses OS Metasploit / armitage (Graphical) General Hacking Tools BT/Win Havij / SQLMap Website Hacking BT/Win Aircrack Wifi Hacking BT/Win Cisco Firewall Firewall PenTest BT Ettercap / Wireshark / Cain&Abel Sniffing BT/Win
  • 6. TOOL’S LIST The list is not complete. But that is the most best tools. Besides that, to support that tools, there is some tools are need to let the tools above running well. The tools are: Tools Uses OS Zenmap / Netcat Scanner BT/Win MD5 HASH Decrypter BT/Win/Webs These tools are free tools and can get from the any hacker’s website.
  • 7. TOOL’S LIST This is the flow how’s the tools work up: Aircrack The Aircrack will crack Wifi, then Zenmap scan IP, use firewall shutter to penetrate firewall, Metasploit try to penetrate, send exploit to collect data and crash system, use ettercap to collect cookies password. Web Browser Success Hacked! Metasploit Firewall (Cannot Defeated) Exploit & Payload Firewall Down Ettercap Hack Data Receive Password Receive Zenmap Remote Control Havij/ SQLMap Uploading Shell Finding URL, test vulnerability, vulnerable detected, decrypt hash, login to webs, upload a shell and access the data. Vulnerable Decrypt Hash Logged In Password Found
  • 8. WHY SHOULD…? We must know about the terminology. It is because, when we know the actual definition of the term in hacking, then we can adapt something to be something uses. The example I will count it after this. The word that are important to know is ”Exploit”. Exploit is a “specialized” small programs that could that advantages and deliver a payload, which will grant attacker the control. Metasploit is a great tool that has a vast number of exploits. Payload is delivered by exploit and is used to control the remote system. Think of it this way. “Exploit is like terrorist that is carrying a bomb in his backpack. He enters the system and leaves his backpack there. Most popular and widely known payload is “meterpreter”, that has a lot of features. With it you can browse remote files, download them, upload your own, capture keystrokes and more. Through meterpreter, you can pivot and attack machines in networks that are not your own”
  • 9. SOMETHING TO BE SOMETHING I will give you two options. If you are a newbie, maybe you feel like you want to try. If you are a intermediate hacker, you will see how we can adapt the Thins to be Something more good. #First: Hacking ATM Bank. When you are understand the flow above, then you will how is this work. “At the evening, you and your friends do to McDonald to buy something to eat. Then you bring your laptop. Behind the McD, there is a Bank. When you turn on your laptop, the Bank’s Wifi signal is detected. Then you crack the wifi, try to penetrate the firewall the you re being a remote control of the computer. Then you are using Zenmap to find the IP of the ATM machines, you found it, then you crack the Firewall and you re successfully. Upload the payload and exploit. Now, you are controlling the ATM Machines” – Actually, ATM machine are using Windows 2000 and oldest. This is mean, the OS of the ATM machine is easy to hack.
  • 10. SOMETHING TO BE SOMETHING #Second: Hacking as a work. If you re noticed, when you re running BT, the sniffer is not work to the external network. The sniffer just work on your internal network. Social-Engineering-Toolkit (SET) also the same. Do you ever think that XAMPP and WAMP server is not work for external network but just work for internal network? So, how to make XAMPP and WAMP server work for external network (Globally)? The answer is registered your computer as a domain. Then people can connect to you. This is the same way: “You register your network as a Linux domain server, then running BT or KL. Then, your sniffer will work people globally. Then, promote your self to social network as a hired hacker. If someone need to hack, they must pay you. When they paying you, then you have to sniff the victim, get their password and sell it to “Needers”. The same thing for using Msf and SET.
  • 11. SOMETHING TO BE SOMETHING The conclusion for this section is, you must be creative. You have to think what you need to do. What you need something to do the do. If you keep trying and trying and trying, you can make the hack with your own way. The computer is following you command, we made it, it is mean we can crack it! This note is note for bad purpose, even it is, but I just make it for researcher network security.
  • 12. LAST WORDS These note are very important. I made these slide with to many words because I want to let all people know, to be a hacker is not only asking people with the stupid question ; “How to hack facebook?” , “please tell me how to hack”. This stupid question will not help you. You must READ, LEARN, TEST, BE BRAVE, then you will have it. These note have been created by the Moderator Of Network in IT Community Malaysia. – Http://www.itcom.activeboard.com/ . This website forum is vulnerable, but, please do not hack it. Because there is nothing important to hack. If you need something, just need to register and ask as many question you want. Lastly, I’ve made mistakes. I am a normal human, human will make mistakes. So, if you feel I am wrong, then just ask me, I will change it and discuss about it. I also beg apologize for my bad English Spelling, Grammar, Grandpa, Grander and so what the Hack Grand so on. Thank you, Call Me If You In Trouble, I am Sharper. Hery Intelligent Technology IT Solution Center Network Security Penetrating Testing IT Community Malaysia (ITCom) http://www.itcom.activeboard.com/