Hacking For beginners: Step by step practical guide

You are here

Kali Linux training>Chapter 1

How to become a hacker
Do you want to Become a Hacker?
I know you that’s why you are here
That’s why I write this post for you to learn how to hack for beginners
Ok in this post we will talk about some basic hacking, networking terms you should know.
Let’s start without wasting time.




Hacking terms you must know

Phishing: basically, phishing is a way to hack online accounts (like Facebook, Gmail) by making fake login page similar to an original login page. When you open a phishing page it looks like an original page, for example, see this screenshotphishing

Do yo think it is original but it is fake see the URL [Generally all online account login websites have SSL certificate mean https [ s mean secure].

The advance version of phishing:

Desktop Phishing

Tabnapping 

Desktop Phishing: This is the advanced type of phishing. It is same as above method, but in this approach, URL is not replaced for example if your computer is affected by this process and when you open facebook.com hacker fake page will open, but URL will not change. Here I try to explain itdesktop phishingAll modern browser detect desktop phishing and you need physical access to create desktop phishing page. Search on google if you need more info but enough for beginners

Tabnapping: If you open many tabs on browsing the internet then your account can be easily hacked by this method. In this attack when the victim clicks on the link from another site, for example, You and me are friends on Facebook, and I send you to link on facebook by the message.  When you open the link and 2-3  another tab, then your facebook tab page Url will be replaced by another page. You will think your account will be logout automatcially. You will again Login your account and I will get your password you will be redirected to facebook.com

Keylogger: this is software which records every word typed by the victim.  The main purpose of keyloggers are for hacking online accounts like FB because it records keyword, so it will also record password and username. Here are two types of Keylogger

  1. Software keylogger: These are software which records every keystroke. You can download free keylogger from the internet or make own if you can good knowledge of programming.
  2. Hardware keylogger: Hardware keylogger are is hardware device which needs to connect to computer then it records our keystrokes. Nowadays Hardware keyloggers are attached to the keyboard for hacking credit cards etc. Here are some hardware keyloggers hardware keylogger

Brute force attack: Another great way to hack passwords, In this hacker tells the system password minimum and maximum length + letter used in the password. Now system combine all these factors and start generating words and apply every word as the password. For Hacking Router brute force attack is used.

Wordlist attack: It is similar to above one but in these first hacker generates words and save these words to file using software like crunch. Another software apply every word as password. This attack used in hacking wpa\wpa2a. Aircrack can try 969 words/second as the password.

Ip address: Ip stands for internet protocol. It is the address of our device. To find your IP address type in google what is my IP.my ip address There are two types of Ip address. I) Public IP II) private IP. We connected through the internet by Public IP address. It can be changed by Vpn or using the proxy.

Vpn: VPN stands for virtual private network. VPN basically change your IP address. If you are using a Vpn and doing anything, nobody can know until VPN company does not expose you [ free VPN can if you doing something serious Ilegal]. Here is the working of Vpnworking-of-vpn

Web Server: 90% of you know what is web server but I you don’t know! No problem. It is a computer where files of a website are available. For example, you read these text images are hosted on a machine known as the web server.

Dos attack: it stands for Denial of service. Mainly it is used for attacking websites. In this, fake traffic is sent to the web server. When data exceeds the limit of bandwidth, it crashes the server. Here is server down website screenshot

 

server down

source http://sociable.co/

 

Easiest way to protect Dos attack is firewall which blocks this activity

ddos attack working

source: gohacking.com

DDOS attack:  it stands for Distributed Denial of service. In dos attack, there is only one machine but it DDOS there is multiple fake devices as shown in the screenshot. There is only one way to protect DDOS attack. Again firewall but here is working of the firewall is different Firewall can tolerate this attack like me I am using CloudFlare CDN for protecting DDOS attack.

SQL injection: DDOS attack crush the server but SQL injection helps you to hack websites. In this attack hacker attack site using coding. They run maliciously code to gain full access to a site. Enough for beginners.

Social engineering: It is not the hacking method. It is Hacking by the average person. Guessing password technique is know as social engineering. I am not expert in this, and it takes a lot of time.  Different for the different person so very time-consuming.

Language You should learn for Hacking

Python: Ask from any hacker. Every hacker must recommend Python. It is so easy and powerful. Here is Python course for beginners. After completing you will able to read or write any Python syntax. Beside Hacking, python helps in data science.

But you can’t hack anything using python for Hacking websites then you have to learn SQL injection, XSS. Now don’t search on google learn SQL injection because for understanding SQL injection you have knowledge of  SQL Database, PHP, Javascript, CSS, and HTML. This is a long process.

Types of Hacker: There are three types of Hacker

  1. Blackhat Hacker: These hackers are criminals they miss use hacking knowledge.
  2. White hat hacker:  These hackers are ethical hacker, or they use their knowledge for protecting computers
  3. Gray hat hacker:  This type of hacker work for money, or you can they work like both white hat and gray hat hackers.

Next post

How to install Kali Linux step by step [all ways]

Welcome to the second chapter In this we will discuss installing Kali Linux If you don’t know what is Kali Linux? It is operating system used by hackers because it has all software that needed in Hacking. It is free and open source Installing Kali Linux is some complex for beginners here is the full post to know how to fix it. You can dual boot with windows or install it inside the window known as virtualization. No more words let come to point How to dual boot with Kali

13 Comments

  1. manjeet kaur April 21, 2017
  2. Rick April 29, 2017
    • Harinderpreet singh April 29, 2017
  3. deepnuke May 1, 2017
  4. H2O May 9, 2017
  5. Gudiputi Sairam June 10, 2017
    • Harinderpreet singh June 10, 2017
  6. samir June 13, 2017
      • Y.D.K June 25, 2017
        • Harinderpreet singh June 25, 2017

Add Comment

Pin It on Pinterest

Share This