Monday, April 18, 2011

Noob guide to hack

Q: What is hacking?

Hacking is unauthorized use of computer and network resources. This is normally done through the use of a 'backdoor' program installed on your machine. However, most people understand a hacker to be what is more accurately known as a 'cracker'.The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime.

Q: What is cracking?

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system.A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

Q: What is a virus/trojan/malicious script file?

A virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.Trojan executes on your computer, the attacker, i.e. the person running the server, has a high level of control over your computer, which can lead to destructive effects depending on the attacker’s purpose.

Q: What is a stealer?

A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.

Q: What is a RAT?

A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.
RAT - Remote Administration Tool.

Q: What is a keylogger?

A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.

Q: What is BOT?

A bot is a malicious program which has several purposes.
They are usually told what to do by a botnet admin although many of the features now are automated.

Q: What is a BOTNET?

A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.

Q: What is a crypter?

All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.

Q: How does a crypter work?

A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus

0 comments:

Post a Comment