-  WARNING
 - Misuse of this information may be a local and/or federal criminal  act (crime). This article is intended to be informational and should  only be used for ethical purposes and never for illegal purposes. 
- Don't think for one second that just because you followed the steps  means you will be a hacker. It takes years of study to be good.
 
 - Do not delete entire logfiles, instead, just remove the  incriminating entries from the file. What do you think would look more  suspicious; logs with a few entries missing, or the entire log file  destroyed? But other question is, if there is a backup logfile? What if  they just look for differences and find the exact things you erased?  Always think about your actions. Best thing is to delete random lines of  log, including your.
 - Be extremely careful if you think you have found a very easy crack  or a crude mistake in security management. A security professional that  protects that system may be trying to track you or may be setting up a honeypot.
 - If you aren't confident with your skills, stay away from breaking  into government and military networks. Even if they have weak security,  they have strong money to trace and bust you. If you do find a hole in  such network, it's best to hand it to more experienced hacker who you  trust, who can put these systems into good use.
 - Although you may heard the opposite, don't help anyone to patch  their programs or systems. This is considered extremely lame and leads  to being banned from most real hacking communities. And if you would  release private exploit someone found, he can become your enemy - and  he's probably better than you are.
 - Never do anything "for fun". Remember it's not a toy to hack into  network, but it's a power to change the world. Don't waste that on  childish actions. Again, don't change anything in the system to mark it  as "owned" or anything that silly
 
Things You'll Need
- A (fast operating) computer with a connection to the Internet.
 - A proxy (Optional; The Onion Router is best choice here)
 - An IP scanner
 - Petraflops help
 - Brute-force program. For MD5 hashes the best one is BarsWF
 
 
 
 
 
          
      
 
  
 
 
 
 
 
 
 
 
 
 
 
No comments:
Post a Comment