Hack to Learn


  • Introduction to Firewalls 





When you use internet in your college/school/ ­offfice , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us what is firewall.
What is Firewall?
Firewall is working like a security guard standing outside the office. Usually, What the security guard do? He will allow those who has identity card and block those who has not the identity card. Right? Likewise, The firewall will block unauthorized access to the system. Firewall may be a software or hardware. It will work based on the set of rules defined bythe administrator.
Using Firewall administrator can block certain website from being accessed.
•All traffic from inside and outside of the network must pass through the firewall.
•Only authorized trafic will be allowed to pass(based on the set of rules)
Types of Fire Walls
 • Packet Filtering
• Application level gate way
 • Circuit level gate way. Packet Filtering (Network Layer)
A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packets. Router is configured such that it can filter incoming and outgoing packets. The packets will filtered based on the source and destination IP address. IP spoofing attack is possible in this packet filtering. IP spoofing can be achieved by changing the source IP address of packets. Stateful Inspection Firewalls A stateful inspection packet filters tightens the rules of TCP traffic by creating a state tableof out bound TCP connection. If the packet matches with existing connection based on the state table, it will be allowed. If it does notmatch, It will be evaluted according to the ruleset for new connections. Aplictaion Level Gateway Application level gateway is also known as proxy server. The user communicate with the gateway using application layer of TCP/IP stack. The gateway asks the user for the name of the remote host to be connected. When the user enters valid user ID, gateway will give access to the remote application. This will block the malicious activity and correct the application behavior. This will ensure the safety of company. More secure than packet filtering. Easy to log and audit all incoming traffic at the application level. Application-lev ­el filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address Circuit Level Gateway The circuit level gateway works at session layer of OSI model. Monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on the session rules. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. This firewall is used when the administrator trustsinternal users.
Why Firewall?
 • Firewall block unauthorized users, prohibitsvulnerable services from entering or leaving the network. •Protection from IP spoofing and routing attacks.
 • Protection against Remote login, Trojan backdoors, Session hijacking, cookie stealing,etc. Limitation of Firewalls
 •The firewall cannot protect against attacks that by pass the firewall.
•The firewall does not protect against internal threats
•The firewall cannot protect against the transfer of virus infected progams (or) files. It would be impossible for the firewall to scan all incoming files, emails for viruses.

  • What is Hacking?



What people think hacking is ------------------------------------------------------------

defacing websites , show off , make fake domains and deface , database leak, getting 5,000 frnds , Fame , harsh Attitude , showing people you're a big personality , facebook,s password , gmail's password , hotmail's password blah blah.

This listed above works is done by scriptkiddes, wannabes , ETC ETC.

What hacking/hacker is in reality --------------------------------------------------------------

Hacker - the person learns from each and everything in life. Hacking is culture , providing security , making world secure , helping everyone for free. Providing open source stuff, Awesome programming skills , awesome understanding of networks , pentesting , Very Friendly attitude , hacker learns from people , and share knowledge to people. hacker believes in sharing , helping.
Hacker attitude - there are many problem in this world. but if i solved one , make sure , i will not have to solve it again.



  • Must Read If You Truly want to become a true hacker:-





1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.

2) There is NO DIRECT SOFTWARE to Hack Facebook , Google , Yahoo or any other big website. All the softwares that claim to do so are scam. They are just meant to take your money and in worse cases, those softwares have trojans or keyloggers in them. As a result your account gets hacked trying to hack others.

3) NEVER EVER use the keyloggers or trojans you find as freeware on internet. Hackers are not fools. They compile keyloggers and trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.

4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made softwares and would depend on them for hacking anything then your functionality would be limited upto the functionality of the software. When you are not going to use your brain , just doing the copy paste thing, then how can you even think of being a good hacker.

5) If you are a good Hacker, you already become a good programmer , a good script writer , a good web developer and an excellent security expert. Well any good Hacker will/should have good knowledge of various aspects and programming languages. to do XSS (Cross Site Scripting ) , PHP INJECTION , SQL INJECTION , PHISHING , FOOTPRINTING etc… you will have to be good at programing and scripting. And when you know the Various loop holes , vulnerabilities and security tips, you already become a Computer Security Expert.


  • What is Prorat?




Prorat is one of RAT (Remote Administration Tools) are
widely used to take over the computer system. Tool made by
PRO Group, a group of Turkish hackers community, can be
used as a tool Hacking computers in a network. Use of Prorat
quite simple, you simply enter the IP (Internet Protocol) is the
target computer and then go through one open port. The
hardest part is finding where an open port. But you can use a
variety of network analysis tools such as nmap, Ethercap,
LookHost, etc.


















Here are the features provided by PRORAT:

- Remote Control
- Viewing System Info, application running and the Task Manager
- Add process, file, or download files
- Admin FTP
- Format the HDD (hard disk damage)
- Remotely download
- Running MS-DOS, Batch Script, VBScript
- Adding a Registry Entry
-Keylogger: Password Recording
- Make Screnshoot, see your Windows desktop instantly
- Send messages and chat
- Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and Online Controls


download link..

0 comments:

Post a Comment