How to Become a Hacker


How to Become a Hacker

 
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”.In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.
 

What Skills do I Need to Become a Hacker?

 
In simple words, there is no magic to become a  Hacker. But like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it. 
 

What is the Best Way to Become a Hacker?

 
As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called
Become a Hacker
Learn Hacking
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindseton you.
The following skills are uncovered in this book
1. You will learn all the hacker underground tricks and learn to apply them in real world situations.
2. You will be put into a hacker mindset so that you will learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream to become a Hacker.
So what are you waiting for? Go grab your copy now from the following link
 
 
 

Wait… This is not the end. Rather it is just the beginning of your journey. To become a hacker, all you need is dedication and hard work. I wish you all the best for your future success.

How to Trace Any IP Address


ipmapIn my earlier post I had discussed abouthow to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below
ip2location_results
You can also visually trace route any IP address back to it’s location. For this just visithttp://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

RA.ONE FREE DOWNLOAD


RA.One Hindi avi video download ,RA.One Hindi 3GP video download,RA.One Hindi MP4 video download
Movie Name: RA.One (2011)
Source: SCAM
Category: Bollywood Movies
Genre: Action | Adventure | Sci-Fi
Cast & Crew: Shah Rukh Khan, Kareena Kapoor and Arjun Rampal
Description: A father trying hard to 'fit-in' in his Son's badass world. A son is trying hard to 'dude-up' his dad from 'aiiiyyyo' to 'YO!' And a mother lost in translation between her husband's 'ingeva' and her son's 'Inn'it!' While Shekhar (Shahrukh Khan) was trying every trick in the book to woo his son, get 'dude-ified' and 'up his coolness quotient' his son had given up on him. Just when the father-son duo hit a deadlock- Shekhar strikes gold when he designs one hell of a game. Finally it all starts falling in place, as the family comes together, only to find themselves in the middle of a crash... not just a hard drive crash but a crash that would drive them to a disaster and make their lives go - KABOOM!!! All hell breaks loose when the game that was meant to be played with starts playing them Ra.One- The next level.
Length: 2hr 21min
Release Date: 26 October 2011
Releaser: subhan4ever
Downloads:- 55428
3Gp FORMAT
AVI FORMAT

How to Detect Anonymous IP Addresses


Detect-ProxyAs the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
 
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
 
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.
 

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind andFraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

TOP 15 Google Engineers You Can Add in Google+



Google Engineers
Here are the awesome minds behind the working of Google. If you are passionate about technology and the internet, and always wonder about the people who make it happen. Then this is your golden chance to know how they think and what they are doing, right now! That too not through techcrunch or slashdot but from their own mouth. Google, recently launched their social networking platform - Google+. Since the launch it had witnessed steady growth in members. But, still its overlooked by many when compared with Facebook. The point is, Google is proud of their creation ( we all are) and the people their are actually using it in their real life. A small investigation in the Google forums help me find out that some of the most exciting people at Google are in Google+. No more did I wait, I created a 'Google Engineers' Circle in my profile ( +Akhil ) and right away added the 15 most awesome people I found. It includes Larry Page, Sergey Brin - The founders of Google , Eric Schmidt - CEO of Google , then Guido Van- the founder of Python programming language and some of the awesome people who programmed the Google App Engine.

Add The Google Engineers To My Google+

I have shared the 'Google Engineers' circle in my Google + profile. You can add the circle on a single click if you could send me a friend request in Google+. Otherwise, you can also add them individually from the profile links I provide below.
With these people in your circles. You'd be getting all the updates happening at Google every day. They even conduct exclusive hangouts for teaching the latest releases like Google+ APIs. You can also find tonnes of other Google Engineers and and other famous people from this set of guys. Hope you'd have more useful social networking with Google+. Web is what you make of it ;).

Check Your Site’s Digg Saturation

Blogstorm had a fun little post a couple of days ago which inspired me to whip up this little search tool. I came across the article on Weblog Tools Collection which had the following to say:
Digg saturation: Patrick from Blogstorm came up with a way to rank websites using a Digg saturation value that he came up with by searching Google with a specific URI. Apparently Google really likes sites that are Dugg.
This got me to thinking… why should people have to go elsewhere to conduct the search, I worked out a method to integrate this into the site without having to leave when I wrote my article on How to Bootleg Everything! So, here is a simple little form you can use to see what your Blog’s Digg saturation level is.

After you do, drop a comment below and let us all know where you are at! Right now OMB is at 1,930! I had to check it like 3 times because I couldn’t believe it! (I still can’t!)
To use the search form replace “YOUR-DOMAIN.com” with your actual domain name.

Digg Saturation Search










How to Hack password----part THREE WARNING

  •  WARNING
  • Misuse of this information may be a local and/or federal criminal act (crime). This article is intended to be informational and should only be used for ethical purposes and never for illegal purposes.
    • Don't think for one second that just because you followed the steps means you will be a hacker. It takes years of study to be good.
  • Do not delete entire logfiles, instead, just remove the incriminating entries from the file. What do you think would look more suspicious; logs with a few entries missing, or the entire log file destroyed? But other question is, if there is a backup logfile? What if they just look for differences and find the exact things you erased? Always think about your actions. Best thing is to delete random lines of log, including your.
  • Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. A security professional that protects that system may be trying to track you or may be setting up a honeypot.
  • If you aren't confident with your skills, stay away from breaking into government and military networks. Even if they have weak security, they have strong money to trace and bust you. If you do find a hole in such network, it's best to hand it to more experienced hacker who you trust, who can put these systems into good use.
  • Although you may heard the opposite, don't help anyone to patch their programs or systems. This is considered extremely lame and leads to being banned from most real hacking communities. And if you would release private exploit someone found, he can become your enemy - and he's probably better than you are.
  • Never do anything "for fun". Remember it's not a toy to hack into network, but it's a power to change the world. Don't waste that on childish actions. Again, don't change anything in the system to mark it as "owned" or anything that silly

Things You'll Need

  • A (fast operating) computer with a connection to the Internet.
  • A proxy (Optional; The Onion Router is best choice here)
  • An IP scanner
  • Petraflops help
  • Brute-force program. For MD5 hashes the best one is BarsWF

How to Hack password----part TWO

  •  TIPS
  •  
  •  
  • Read books discussing TCP/IP networking.
  • Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and requires a lot of professional knowledge to do anything serious in real environments.
  • Although it's great there are many legal, safe training grounds available for anyone, there is a sad truth that you won't become any near "medicore" if you won't start doing illegal actions. You can't become anyone if you won't find real problems on real systems, with the real risk of getting caught. Keep that in mind.
  • Remember, hacking is not about breaking into computers, getting well paid job, selling exploits on black market nor (especially) helping anyone to secure machines. You're *not* here to help admin do his job. You're here to become *best*. Keep in mind, if your target is not "being best", you won't ever become good. Of course, don't get cocky, don't think about yourself as the best of the best. Just make this your final target, you must become better and better. Every day you didn't learn something new, is a wasted day. You and only you counts - become best, at any cost. There are no half-ways, you must give full yourself.
  • Using these tactics on a popular corporate or government computer is asking for trouble unless you're a professional hacker. Keep in mind there are people a bit more knowledgeable than you who are protecting these systems for a living. Once found, they sometimes monitor intruders to let them incriminate themselves first before legal action is taken. This means you might think you have free access after hacking into a system, when in fact, you're being watched, and may be stopped at any moment.
  • Find information online related to hacking, or to even attend an "underground" hacking event, visit these sites:

    • enigmagroup.org A legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials.
    • insecure.org Hacking tools and other software.
    • [1] Learn to hack, keep yourself safe, and many other useful computer skills.
    • securityforest.com Tools, papers, exploits, and other reference material.

Use Google Maps to Calculate Walking Distances

If you are one of those folks that has a set walking or jogging path that you like to follow, but you don’t know exactly how far you’re covering you can use the new Geodistance.com site to help you answer that very question.
It’s quite simple to use… just zoom in on the Google Map until you’re at the magnification level desired. You can click and drag the mouse to move the maps, then when you’ve got the map where you want it in the screen simply click on the starting point to insert a starting pin and then begin clicking along the route.

You’ll see the distance automatically increasing as you move along, and when you’re done you have the option to save the route or you can even export the map to view it in Google Earth. If you don’t yet have Google Earth, I recommend you get the Google Pack which includes it.
Assuming you’ve already got Google Earth installed, here is the route file from the sample I created in the photo. Just save it to your computer and then double click it to open it in Google Earth.

How to Hack password----part one

Hacking can be difficult and there are many different ways to hack and many different exploits to use. Hacking is neither defined nor limited by exploitation or exploration. Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack or you are sure it's worth it AND you won't get caught.

Hacking was primarily used for learning new things about systems and computing in general, 'in the good old days'. In recent years it has taken dark connotations and in general has been looked down upon. Likewise, many corporations now employ "hackers" to test the strengths and weaknesses of their own systems. These hackers know when to stop, and it is the positive trust they have built that earn them large salaries.

There is a major difference between a hacker and a cracker. A cracker is motivated by malicious (namely: money) reasons; a hacker is attempting to gain knowledge through exploration, at any cost and in any way - not always legal.


STEP

  1. 1
    Learn a programming language. You shouldn't limit yourself to any particular language. C is the language the systems are built in, it teaches you what's very important in hacking: how the memory really works. Python or Ruby are modern, powerful scripting languages, that can be used to automatize various tasks; Perl is a good choice in this field as well. PHP is worth learning only because it's what newbies use to "hack" poorly written web-applications (forums, blogs etc). Bash scripting is a must, that's how you can easily manipulate most servers - writing one-line scripts, which will do most of the job. Finally, you can't do much without knowledge of ASM - you *can't* exploit a program if you don't know that.
  2. 2
    Use a *nix terminal for commands. Cygwin will help emulate this for Windows users. DOS is worthless in this area. The tools in this article can be found for Windows based machines. Nmap particularly, uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to the lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible, more reliable, and more secure. Most Linux distributions come with many useful tools pre-installed.
  3. 3
    Try securing your machine first. Make sure you fully understood all common techniques, including the way to protect yourself. Start with basics - found a server which has site about racism, homophobia or other bad activities? Try to hack it, any way you can. Yet again, don't change the site, just make it yours.
  4. 4
    Know your target.
    Know your target.
    Know your target. The process of gathering information about your target is known as 'enumeration'. Can you reach the remote system? You can use the ping utility (which is included in most operating systems) to see if the target is 'alive', however, you can not always trust the results of the ping utility, as it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
  5. 5
    Determine the operating system (OS). This is important because how can you gain access to a system if you don't know what the system is? This step involves running a scan of the ports. Try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.
  6. 6
    Find some path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered. Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming. An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be bruteforced.
  7. 7
    Crack the password or authentication process.
    Crack the password or authentication process.
    Crack the password or authentication process. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software. Users are often discouraged from using weak passwords, so brute force may take a lot of time. These days there are major improvenments in brute-force techniques. Most hashing algorithms are found weak, and you can significally improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost). Also new techniques use graphic card like the processor - and it's thousands times faster. You may try using Rainbow Tables for fastest password cracking. Notice that password cracking is good technique only if you already got the hash of password. Trying every possible password while logging to remote machine is not a good idea, as it's easily detected by intrusion detection systems, pollute system logs and may take years to complete. It's often much easier to find other way into system, than cracking password.
  8. 8
    Get super user (root) privileges. Try to get root privileges if targeting a *nix machine, or administrator privileges if taking Windows systems. Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super user privileges. This is a user account that is given the same privileges as the "root" user in Linux and BSD operating systems. For routers this is the "admin" account by default (unless it has been changed), for Windows, this is the Administrator account, etc. Just because you have gained access to a connection doesn't mean you can access everything. Only a super user, the administrator account, or the root account can do this.
  9. 9
    Use various tricks. Often to gain super user status you have use tactics such as creating a "buffer overflow", which is basically causing the memory to dump and allowing you to inject a code or perform a task at a higher level then you're normally authorized. In unix-like systems this will happen if the bugged software has setuid bit set, so program will be executed as different user (superuser for example). Only writing or finding an insecure program that you can execute on their machine will allow you to do this.
  10. 10
    Create a backdoor. Once you have gained full control over a machine, it's best to make sure you can come back again. This can be done by 'backdooring' an important system service, such as the SSH server. However your backdoor may be removed upon the next system upgrade - really experienced hackers would backdoor the compiler itself, so every compiled software would be a potential way to come back.
  11. 11
    Cover your tracks. Never ever let the administrator know that the system is compromised. Do not change the website (if any), do not create more files than you really need. Do not create any additional users. Act as fast as possible. If you patched a server like SSHD, make sure it has your secret password hard-coded. If someone tries to login with this password, the server should let them in, but shouldn't contain any crucial information.