The Strife
Would you like to react to this message? Create an account in a few clicks or log in to continue.

The Strife

We are the rebellion. We are the revolution. We are The Strife.
 
HomeLatest imagesSearchRegisterLog in

 

 Where Should I Start?

Go down 
2 posters
AuthorMessage
khainne

khainne


Posts : 7
Join date : 2012-03-10

Where Should I Start? Empty
PostSubject: Where Should I Start?   Where Should I Start? I_icon_minitimeSun Apr 01, 2012 8:29 pm

"Do not learn to hack, but hack to learn". Many new comers see this motto tagged around HF and take it head on. The word Motto is defined as "a sentence, phrase, or word expressing the spirit or purpose of a person, organization, city, etc." So DO NOT read some random TuT(tutorial) about hacking a website, network, or PC and get caught. That said, please continue reading.


In the beginning we all asked ourselves a few questions...

Where do I start?
Where do I go to learn?
What do I need to Hack?


There are numerous facets in the world of hacking that can be VERY overwhelming to a beginner. So many that you will always learn something new until you stop hacking. There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking. So here is a list of programs you should download, tools you should utilize, lessons you should learn, and why you should learn them. Along with links to TuTs from our L33T members. Starting with the basics:


[You must be registered and logged in to see this link.]
Google is hands down the most powerful and accurate search engine. Before creating a new thread with a simple question(nothing wrong with asking us) search for it on Google.

[You must be registered and logged in to see this link.]
Wikipedia is a great site for information. It is not a dictionary but an encyclopedia openly update/changed by the public. So you don't have to worry about read some cryptic definition that leaves you with more questions. Nine out of Ten when you search with Google you will see Wiki at the top or close to.

[You must be registered and logged in to see this link.]
If there is a new hacking tool you just download and you want to learn more about it and how to use it. Search the HF for it, there is nothing that you as a beginner know more of than our VeTs.

[You must be registered and logged in to see this link.]
Many rules have changed ever since Google bought Youtube in 2006.
More explicit and sensitive videos are allowed more and more than the prevailing years of 2006.
You can search for practically any video dealing with hack tools and attacks.


[You must be registered and logged in to see this link.] - Created by Unclean Spirit
[You must be registered and logged in to see this link.]- Created by Unclean Spirit
You simply can not get more simple than .bat files. Batch files are a good way to introduce yourself to CMD Prompt( to get to: Start>Run: tpye "cmd" enter) However batch files are commonly made with notepad. You can create simple or intricate virus .bat files that cause all sorts of chaos. You can find all kinds of virals at the [You must be registered and logged in to see this link.]
"Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols."


[You must be registered and logged in to see this link.]- Created by Crow
[You must be registered and logged in to see this link.]
Unlike Cain and Abel this program can be burned to a CD or configured to a USB to boot from. Meaning that you can have no password access to any computer profile and still crack the password. As far as i know, Cain and Abel can only function if you have access to at least a guest account.


[You must be registered and logged in to see this link.]- Created by Follower
[You must be registered and logged in to see this link.] - Provided by Ethical Hacking Articles
[You must be registered and logged in to see this link.] - Created by xgsconan
[You must be registered and logged in to see this link.]
"Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. "



[You must be registered and logged in to see this link.]- Created by VipVince
[You must be registered and logged in to see this link.] -Created by 3 4 1
[You must be registered and logged in to see this link.]
Keylogging is a method used for gathering information from your victims computer by recording keystrokes, Screenshots, and other activities. It is hard to find Keylogging tools that are completely undetectable to security programs. The few that are undetectable soon are added to security information databases. This reiterates what i said in the beginning, "There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking."


[You must be registered and logged in to see this link.]- Created by Empa7hy
[You must be registered and logged in to see this link.]- Created by Austral Hacker
[You must be registered and logged in to see this link.]
"Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing." Basically tells you everything you need to know about your targets potential vulnerabilities. Very powerful and needed tool.


This is what I believe a new comer should start with. Many people have different ways of training that work just as well. However, this is the basics of the basics. Become well briefed in all these categories because they are the most used tools for a hacker using the Windows OS. Now you can delve deeper into the world of hacking. Don't forget, "Do not learn to hack, but hack to learn".



[You must be registered and logged in to see this link.]
Back to top Go down
Marik Mace
Admin
Marik Mace


Posts : 4
Join date : 2012-03-10
Age : 25
Location : Washington

Where Should I Start? Empty
PostSubject: Re: Where Should I Start?   Where Should I Start? I_icon_minitimeFri Apr 06, 2012 4:13 am

Very useful but lot's of the links are broken or lead to pointless threads.
Hack to learn? Yea right.
Lets fuck shit up!
Back to top Go down
https://thestrife.board-directory.net
khainne

khainne


Posts : 7
Join date : 2012-03-10

Where Should I Start? Empty
PostSubject: Re: Where Should I Start?   Where Should I Start? I_icon_minitimeSun Apr 15, 2012 10:49 pm

Marik Mace wrote:
Very useful but lot's of the links are broken or lead to pointless threads.
Hack to learn? Yea right.
Lets fuck shit up!
Well, they can still be useful, i got this form a old forum post i made in a site.
Back to top Go down
Sponsored content





Where Should I Start? Empty
PostSubject: Re: Where Should I Start?   Where Should I Start? I_icon_minitime

Back to top Go down
 
Where Should I Start?
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
The Strife :: Main Section :: Cracked Programs-
Jump to: