Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


The COMPLETE beginners guide to hacking filter_list
Author
Message
RE: The COMPLETE beginners guide to hacking #21
Thanks for sharing bro guide is really detailed. Learned a lot of new stuff actually Smile

Reply

RE: The COMPLETE beginners guide to hacking #22
Old thread, but given It's still active, I'll provide my view In a few simple words.

There can never be a "complete guide" to hacking, beginner or otherwise.
[Image: AD83g1A.png]

Reply

RE: The COMPLETE beginners guide to hacking #23
(03-13-2019, 05:55 AM)mothered Wrote: Old thread, but given It's still active, I'll provide my view In a few simple words.

There can never be a "complete guide" to hacking, beginner or otherwise.

I agree, and anything that's titled "complete guide" makes me doubt it even more. Anything that even comes close to complete would not fit in a single post. For example, this is missing fundamentals of networking, cryptography, programming, exploitation. The closest I've come to a "complete" beginner's "guide" is probably Art of Exploitation.

Reply

RE: The COMPLETE beginners guide to hacking #24
(03-13-2019, 09:33 AM)reGEN Wrote:
(03-13-2019, 05:55 AM)mothered Wrote: Old thread, but given It's still active, I'll provide my view In a few simple words.

There can never be a "complete guide" to hacking, beginner or otherwise.

I agree, and anything that's titled "complete guide" makes me doubt it even more. Anything that even comes close to complete would not fit in a single post. For example, this is missing fundamentals of networking, cryptography, programming, exploitation. The closest I've come to a "complete" beginner's "guide" is probably Art of Exploitation.

Well said.

"Complete", Is to have every possible content without any room for Inclusions. It's simply not possible.
[Image: AD83g1A.png]

Reply

RE: The COMPLETE beginners guide to hacking #25
old but nice thank you for this tut Smile
(>( G )<)

Reply

RE: The COMPLETE beginners guide to hacking #26
very informative, thanks for sharing

Reply

RE: The COMPLETE beginners guide to hacking #27
The goodbye.exe won't run, "Component 'MSWINSCK.00r or one of its dependencies not correctly registered: a file is missing or invalid ". Any fix?

Reply

RE: The COMPLETE beginners guide to hacking #28
Very helpful, thank you for sharing.

Reply

RE: The COMPLETE beginners guide to hacking #29
Well, I learned a little bit man

Reply

RE: The COMPLETE beginners guide to hacking #30
(04-15-2016, 06:28 PM)Quarantine Wrote:
The COMPLETE beginners guide to hacking

Thank you for sharing.
This was very helpful




Hi there. Thanks for taking the time to view this thread. I'm sure you will learn something new from it Smile 

Sections:
1) Introduction 
2) The hacker manifesto 
3) What is hacking? 
4) Choosing your path 
5) Where should I start? 
6) Basic terminology 
7) Keylogging 
8) RAT's 
9) Java Driveby's 
10) Crypters 
11) Dosing and DDosing, what's the difference? 
12) Staying anonymous 
13) Proxies 
14) VPN's 
15) Alternatives, tips and tricks 
16) Extending your knowledge 
17) Closing section 


H
You must register or login to view this content.

How to use Goodbye: Find the URL of the site you want to DDos. Type in the site and then the page you want the traffic to go to. 
Example: Site - website.com Page - /example.htm 
Press "Start " to start the attack. 
Once the number of blocked packets is above 400 you should stop the attack as anything after that will be redundant (won't have any further effect). 
Pinging the site: I couldn't remember this method off the top of my head so I have referenced a post made on NextGenUpdate. 
1. Open cmd and type 'ping example.com' ^Replace example.com with the site you want to attack 
2. Write down the IP address that shows up. 
3. So you would type this in ur cmd: ping XX.XXX.X.XXX -t -l ## 
^Replace XX.XXX.X.XXX with the IP address you want to attack 
^^Replace ## with the amount of time you want to send the attack for. The longer the attack, the more effective it will be. 
4. Allow the process to finish. Check back a bit later to see if the site is down. 
Refreshing the page: You are probably thinking I'm an idiot for posting this method, but it's probably not what you expected it to be. 
I'd like to point out that this method does not involve: 
• Pressing F5 
• Clicking refresh 
So... You guessed it. We will be using an auto-refresher. I recommend Auto-Refresh Plus in the Chrome webstore. Download it and select custom time. Set it to 1 second. This will reload the page every second, and eventually overload the server. This may take some time.

SECTION 12 - Staying anonymous
Staying anonymous while online is something that many people can't seem to do. Every day, I go on HF and look through the beginner hacking section. And every time I see 10-20 threads all asking the same sort of thing. "How to hide IP?" "Change IP?" "Free VPN?" "How to staying anonymous?". And I always see the same replies. "Damn kid. Doesn't even know how to use a proxy" "We are not your army" "Ever heard of this magical thing called Google?" "Use the search button before posting". For those of you that encounter that sort of thing, I hope the following sections answer your questions. First off, why is it important to stay anonymous? Well, this question shouldn't really need answering. If you don't stay anonymous, your effectively allowing people to steal your identity. It's important to cover your tracks while online because there will always be somebody there, waiting to exploit even the first slip-up they see. Moral of the story: STAY ANONYMOUS!! The following 4 sections will teach you how to do that.

SECTION 13 – Proxies
Everyone has heard of proxies. Thing is, most people have no idea how to use them. Before I show you how to use a proxy, I will explain a little bit about what a proxy is and what it does. Every network has its own IP address. When you visit a website, it logs your IP address. Now, some websites don't like certain IP addresses to access them. So they block that IP address from accessing the page. What a proxy is, is basically a tunnel that all the traffic from that page goes through. The tunnel sends the traffic to another IP address. This tricks the website into thinking that the IP address at the end of the tunnel is yours, and allows you access to the page. Now that you know what a proxy is, you can set one up. First off, find a proxy (free proxies can be found at http://hidemyass.com). Every (common) browser has proxy settings, so find your browsers proxy settings area. For Google Chrome, go 'Tools'-->'Advanced'-->'LAN options'-->'Proxy settings'. Type in the proxy then select the appropriate settings (e.g. HTTPS or Socks5). Then you need to restart Chrome (just close it then open it again). Go tohttp://whatismyip.com to check if the proxy is working properly. If it is, it should display a different IP to your actual one.

SECTION 14 - VPN's
Many of you have probably heard of VPN's before. For those of you who don't know what they are, VPN's are VirtualPrivateNetworks. A detailed explanation of what they are can be found in section 6. Connecting to a VPN is really easy. 
I will teach you how to connect to a VPN on: 
• Your PC 
• Your iDevice 
Before I teach you how to do that, you will need to find a VPN to use. Here is a list of VPN's you might want to try. 
Free VPN's: 
• http://bestcanadavpn.com Best Canada VPN 
• http://hideme.ru HideMe.ru
• http://hotspotshield.com Hotspot Shield 
Paid VPN's: 
• http://hidemyass.com HideMyAss 
• http://nvpn.comn VPN 
• http://openvpn.net OpenVPN
How to connect to a VPN on your PC:
This will teach you how to connect to a VPN on your PC. 
- Click on the WiFi icon on the taskbar. 
- Select the option ‘Open Network and Sharing Center’ 
- Click ‘Connect to a new connection or network’ - Select ‘Connect to a workplace’ and then click next 
- Click next - Select ‘Use my internet (VPN)’ - Type in the address of the VPN you want to connect to 
- Type in the username and password then click Connect - You should see the screen 
You’re done! This should appear. 
How to set up a VPN on your iDevice: 
Heres how to connect to a VPN using your iDevice. For this tutorial we will be using the free VPN, BestCanadaVPN. I will be going over all the steps needed to set this up and a few other things. First off, you need to open up settings. Now go "General"-->"Network"-->"VPN" Now tap the "Add VPN configuration" button. It will bring up this menu. Now fill in the boxes with these. Description: VPN Server: bestcanadavpn.com Account: free Secret: (put anything here) Now we need to get the password. So open up safari and head over to bestcanadavpn.com You will see the password on the homepage. Now type the password into the "Password" box in the VPN configuration. Now tap "Save". Congratulations! You have just set up the VPN on your iDevice! Now you need to connect to it. To do that just press the "On" button. Once you are connected, it will say so and a VPN icon will appear in the status bar. ***PLEASE NOTE*** The VPN password changes every 24 hours. Using a VPN will provide a significant amount more protection that a proxy, but won't make you completely untraceable.

SECTION 15 – Alternatives, tips and tricks
This section will cover some of the alternatives to proxies and VPN's. These methods are probably a little bit harder to use, but they are just as good (if not better). 

Change your IP
Most routers have a setting which allows you to clone your MAC address and set it as your IP address. This allows you to hide your location and disguise it as. Use anonymous web searches Some sites offer anonymous web searches. This doesn't offer very good anonymity, but hey, it's better than nothing. 

Ctrl+Shift+Delete 
This amazing little shortcut can clear cookies and data, web history and autofill data incredibly quickly! It's great and takes almost no time to do. 

Put Tor on a USB 
Tor is a network which provides anonymity while on the Internet. Most schools will not allow you to download it and install it. So just download it onto a USB at home and run it when you get to school. Your school won't have a clue what you are doing online! 

Use private browsing 
Most browsers have a private browsing option. This opens up a session which doesn't save cookies, and can't be tracked in an administrator system. Its great because anyone can use it. 

Double Desktop Switcher 
Yup, everyone knows this one, but it does work! Download Double Desktop Switcher onto a USB and bring it to school. You can do whatever you want and when a teacher walks by just press the hotkey to change screens. 

Use your mobile/iPod 
Most schools think they are smart an monitor all the traffic on their computers. The reality is that they are dumb idiots as they don't monitor mobile traffic. I have downloaded torrents and done a whole bunch of stuff on my iPod and my school hadn't had a clue! 

Use public computers 
Don't do hacking stuff from home. Go to an Internet cafe or the library. Bring all your stuff on a USB and run it from that. 

Combine methods 
If you seriously want to stay safe while online, try this: Go to a public place and use a public computer. Sign in with fake information. Connect to a paid VPN. Go online using private browsing. Then set up your browser so it used a paid web proxy. Open up Tor on your USB. Go to a site which offers anonymous web searching.

With all of that, your Internet will probably be so slow it's unbearable, but you will be anonymous!!!! Oh yeah... did I mention that all of these will slow your internet connection speed? No? Too bad. 
I’m kidding. They will slow down your connection, but not by very much, so the trade-off is worth it. 

SECTION 16 – Extending your knowledge 
“Don’t learn to hack, hack to learn”. You’ve probably seen that posted all around the internet. To a certain extent, it’s true. Hacking is often used to gain knowledge you wouldn’t otherwise be able to know. However if you don’t learn to hack, how can you hack? 
This section will help you discover ways to extend your knowledge of hacking. Now, in order to do this, you will need to spend extensive amounts of time browsing the internet. There’s no other way. There are also no shortcuts. If you don’t put in the work, you won’t get the results. End of story. 
Now that we’ve got that out of the way, let’s begin. 
Since you’re probably too lazy to use google, here are some useful sites: 
• Hackforums.net 
• Crackhackforum.com 
• Hackthissite.org 
Those are pretty much the only sites you will need to start off with. They have almost ENDLESS supplies of knowledge, and have relatively friendly members. Sign up for those sites and you’ll be well on your way to becoming a successful hacker. 

SECTION 17 – Closing section

Congratulations, you’ve finally reached the last section! I bet it took you a while to read through all of that, but you’ve probably learned a lot too. Now most of my knowledge has been passed down to you. I put a lot of time and effort into typing this up (7 hours to be more precise), and spell-checked this over 50 times. I even added images in (lucky you) so this guide would be easy to follow. So please, post a short thank you message in the original thread. That takes 30 seconds, this took 7 hours. 
Remember, knowledge is power. But if you misuse that power it will be taken away from you. Stay true to yourself and the world will do so aswell.[/hide]

Reply







Users browsing this thread: 2 Guest(s)