Header Ads

Header ADS

Real Hacking | Is Everything Sequencing possible? Let's not know some basic ideas

Assalamu Alaikum ... 


 pashapashibd.blogspot.com On behalf of the party, I am starting my tune today with the wishes of the new year.



Actually hacking has more than zero. But hacking is not just hacking. 😒 There are many wood burning straws in the back. To be a real hacker, you have to spend the same time as you need to spend the same talent. 😭 Today many brothers have heard the message that brothers hacking will learn that many of them posting today because of their pressures. There are many tunes on hacking in the trickby. They are also very useful. But the initial or initial issues of hacking have little to be said. There are only a few tips taught here. But to be a real hacker you have to start a long time. I will discuss some steps on this topic today. Actually there are many good hackers in Bangladesh. My greetings to them. If you make a mistake in my writing, please see it in a favorable way and please correct it.
___________________________________

Actually hacking is a type of hacking, or hacking with different software, but they are not equally effective in all cases. For this reason, to learn real hacking you must have good knowledge about networking, programming, web hosting, remote access, IP networking and many more, although I do not understand the issues myself. Still, I understand that I am sharing it among you. But do not make it wrong to think of hacking technique. Because, it is a theme for your hacking jest or basic. In this you will learn all the steps. You can do some work yourself. But there are a lot of things to understand from the Google search and find out about their use.
😊😊😊😊😊😊😊😊😊😊😊😊😊😊😊😊

First of all, real hacking is a few steps
😊😊😊😊
😊😊😊😊
1. Collection of specific information
2. Port Scanning
3. Find out all the information about the target operating system
4. Find out the system
5. System Ateak Preparation
6. Attack on the system
7. At the end, implement all the things you want to do
___________________________________

Collect information

Find out the IP of the website or system you want to hack first. This is the most important thing. Open Prompt Prompt for it and type:

ping yoururl.com

Then enter it. See your website's IP. Then collect detailed information about this IP. Collect all the information about the website (eg: owner's email, site service, contact number etc.) These can come in many ways later. Then enter your target URL and search for this domain owner's email, domain information and all the information you want to include in this address.


Then, to know the location of the IP address, you can go to this address to know its location. Anyway, try to find out all the information you need about Google search.

___________________________________

Port scanning

Port scanning is the way to find the road to the operating system or website. Suppose you do steal a house, then you must know that you enter the door or open any door or gain access to it from any side. This is something like that. Through this, basically to find out where you would like it to be, it is easy or weak. For this, you can use an expensive port scanner or use any free software. Its job is to find out which ports of any system are open or closed or running. You can use NMAP or SUPERSCAN software for this purpose. If you reply to the port from the port when you scan the port with NMAP, then the port is running. Download this software with Google search. Then start working. If you search Google on its usage you will get many tutorials.
To find your PC's port, enter the command prompt

Netstat -no

Then enter it. See, the ports of your PC are doing so. For NMAP downloads go here.
___________________________________

Operating System Information

You must know the information about the operating system for hacking. For example, victim uses any operating system. Windows is Linux or Unix not Mac? Then you have to find out the operating system version. What is the version of Windows, Windows 7, not 8 or XP? You must be aware of these for running aquat etac. If you do not know, you can not properly enter the remote system. The tools that are available for this purpose are: NMAP, Netscantool pro Proof Try to collect these with Google search. Hope to get it very easily.
___________________________________

Find out the system kiosks

That is, finding a system where there is no excuse or weakness. Almost all systems have problems in any donor space. It could be the problem of programming, problems of any software etc. Now, at this stage, we will be working on the problems of the system. To see that the system has any ports open or running and to collect detailed information about that port. You can use many tools for this. But Nessas, Nikto, Core Impact, these tools are great tools for this job. You can take a look at how to use them from different sites in Google.
__________________________________

System Attak Final Preparation and Attack

At this stage, you will have to prepare a system or website at the final of your system. For this, basically your system will find out the vulnerabilities that Port vulnerability has to find the Apache port. To find out, type in command prompt:

telnet your target ip or url port

Or, an example:

telnet 10.127.25.32 80

(For assuming your target IP is 80, here's the port which you will find to be weak.)

Press enter and enter it. You see, you got your desired object in the 2nd line. Now you have to download the expose code for your Apache and port. This code is, some source code or commands to run the ATAC according to the system's specific vulnerability. Download it to download Google and download it and compile it. Diameter, all the work is done. Run the ATAC using this code. It is not possible to give details of the matter. Try again to tune in. And you can find out how to make an attack with the expose code by Google. You can watch videos of YouTube.

To search the expo code

1: Here

2: -Or here]

___________________________________

Install a tool on a remote system and take full access to the system

Now that you have successfully managed to control the remote system. What next You can do a lot like your wish The user can steal browsing cookies. You can take password. You can install a kelanger or Trojan on PC, for the next access. Or delete all the log files of that PC or copy any file. That's what you want, so can.

However, there is a desire to write more about this later. If you get a good response, write more.

Thank you all. Good will be good
___________________________________

B: - My next post will be how to get the rooted Linux version up to date. 😊😊 Good for that and support me with a good comment Thank you.

No comments

Theme images by Raycat. Powered by Blogger.