Search This Blog

Thursday, December 16, 2010

Part Three - Programs

Now you know some of the viruses and their effects. To fuck someone's computer you can use some programs. To fuck someone's computer you can use some programs. Suitable for this purpose are programs to remotely access someone's computer. Most of them require installation on the computer of the victim, but there are those that do not require this. Programs like Radmin, VNC, Beyond Remote Server / Client, TeamViewer and others require prior installation. This means that you have access to the computer of the victim or you need some way by which to lure someone to install this program. Examples like say that this is the best antivirus. Programs such as NetTools, SuperScan, Netscan, AngryIP not require prior installation of the foreign computer. For them, you need only the IP address of the victim. Now you can to make everything with the computer. And there you can easily browse, or to delete,  or just to put a nice virus. To enter into someone's computer you can use the good old DOS. Choose from the Start Menu command RUN and type in the box TELNET. This will open a small DOS window. Here are some of the commands for Telnet:

c – close
d – display
o – open (hostname or IP) and (port)
q – quit
set – set
sen – send
st – status
u – unset
escape - set the escape character
exit - exit the Telnet
localecho -  turn on local echo on the terminal
negotiate - the establishment of Telnet options
options - follow up of active options
quit - exit the Telnet
status - print status information
usecrnul - send CR-NUL and CR-LF as a newline
xon - local control the flow of symbols
z - interruption of Telnet session
? - print help information to Telnet

Telnet for Unix

On Unix operating system Telnet service is part of system programs and additional installation is not required, and Telnet client is activated by:


telnet [-d] [-a] [-n tracefile] [-e escapechar] [[-l user] host [port]]

where the parameters of the command have the following meanings:

host - IP address or symbolic name, machine name, seeking an outlet. This is the only mandatory parameter
-d - turn on debug information in exchange with host machine.
-a - automatic login in the host machine with the username used for the current user ID.
-n tracefile -record file of information tracing the relationship with host machine .
-e escapechar - down the escape character to terminate the relationship with the host machine.
-l user - set the username to connect to host machine. Replaces the option-l-a.
port - port number for the service of the service, if not specified is assumed 23.

In the next lesson we`ll talk about how to hack the password.

Part Two - Video Lesson

Once we met with viruses, let's move on to the next lesson.
To fuck someone's computer you can use different bombers or spammers. There are many variety of them. Another way is you to make small virus and to send it to the victim whit changing icon and file name of a game or a certain song.

 

To send a virus to someone and he do not recognize it, you can attach it to any photo, game or otherwise. For this purpose you can use programs such as Joiner.

Tuesday, November 9, 2010

Viruses and Worms

In this section, you will meet only part of the viruses and worms. If someone wants to add a comment or question, let's do it in the comments after the article.
An old and nice virus is CIH. It hack the entire computer and BIOS. Its disadvantage is that it grabs all antivirus programs. Blaster reboot constantly. Cmoskill takes the control of the computer and it is crazy. Before you must to make adjustments to it and then gives the victim. Melissa is a network virus and spreads like an epidemic, causing much damage. T-virus helps you to create a small .bat virus. They are not caught by antivirus programs. Parrot is win32 EXE virus writen in Win32 ASM file. HDFLL - hard to grasp by antivirus programs. Its full the computer with hard DLL files in which there are random numbers Dock entire hard not finished. Just Me this is my favorite. Not caught by antivirus programs! Deletes everything from Windows. It is very useful because of its rapid action. Barrotes this is the first known Spanish virus appeared in 1993, once uploaded to your computer, it remains hidden until the date 5 January, when activated showing a series of features resembling the grating on the monitor. Cascade or Falling Letters. Established in Germany in 1997, this virus displays the screen "waterfall" of drop points every time you infect the computer. ILoveYou or Loveletter - So famous that it hardly needs no introduction, this "romantic" virus out of the Philippines in 2000 with its title "I LOVE YOU", he easily draws attention to itself and thus infect millions of computers around svyatNimda. The name is actually the word "admin" (administrator), written on the back. The link is the possibility of this type worm creates administrative rights on already infected computers. Nimda was established in China on 18 September 2001. SQLSlammer - This is another type of worm that caused quite a headache for many companies around the world. Appeared for the first time on January 25, 2003, the worm affects more than half a million servers a few days. Sobig this German virus appeared in the summer of 2003 of options under which spread throughout the network, the most dangerous is Sobig.F, launched their attack on August 19, using email and affecting a total of 1 million computers. Netsky is malicious code launched by Germany in 2004, exploits a vulnerability in Internet Explorer. Its creator is actually responsible for other known virus - Sasser. Infecting a computer with a Backdoor Trojan is one way a hacker to take over control of computer to another user over the Internet without his permission. NetBus is a bit old, but at the expense of this is very nice, fast, funny worm. SubSeven has many features. What makes him so good is malkoyat size server.exe. BackOffice has all important functions. Its disadvantage is that it wants installed. Lamespy is a typical trojan. Medium size, has won all features midsize server and good interface. GIP did not differ much from the top. Its advantage is that keep detailed log files and sends them to your inbox. Osiris Trojan is with many features. Designed primarily for monitoring ICQ to victim. Conficker is the last on the list but not the significance of the damage caused, Conficker appeared in November 2008.
The programs type Joiner are very suitable if you want to disguise a virus and to suggest the victim such as a picture.

Thursday, November 4, 2010

Part One - Viruses

The Viruses are most often small programs written for distribution and destruction of computer systems. The Viruses most often attach code to other files and thus infect them, make their copies and thus repeatable. The viruses most often infect executable files.

Types of viruses 
1. Polymorphic viruses - viruses that are extremely difficult to detect because they constantly change their code. It is known that no two identical code polymorphic viruses. Such a virus can make its thousands of modifications to protect th antivirus software. Each new copy of these viruses is encoded differently.
2. Macro viruses - that are among the most common viruses. This is because their creation is a breeze. Distribution is also supported by the fact that they are most commonly distributed with programs that are installed on each PC that is Microsoft Office.
3. Stealth viruses - these are the most dangerous viruses because they are made so that their discovery is really hard. - Some of these viruses infect the computer system and later spread to infect new systems. - Almost always code of stealth viruses is algorithmic locked by Da altered by any multiplication of the virus code. Most viruses are resident protection technique by which to protect themselves. - These viruses are extremely difficult to clean and detection in many cases forcing antivirus scan report that detected no viral infection. They showed no difference in file size and mark the sectors themselves in memory as mechanically damaged and thus their scan is skipped.
4. Resident viruses - when such a virus is loaded into the system remains r3ezidenten to shutdown. This is done through the functions of the operating system or BIOS-a. These viruses are very common and infect very many systems ..
5. File viruses - viruses that infect executable files or files with some information as the goal is to be loaded with the file itself and thereby gain access to the resources of the infected system.
6. Boot sector viruses - such viruses are activated when the system loader then read boot sector from external memory and execute it. When you try to access a conventional boot sector often apply stealth techniques and the operation was transferred to pre-preserved original boot record. Fall to boot and viruses of type Partition table (MBR) viruses. Distributed only in hard disks.


Virus programs:
1.Worm (worm) - as opposed to viruses, computer worms are malicious programs that replicate themselves from one system to another, instead of infecting files located in your computer. - Mass mailing email worm - worms themselves are sent to all email addresses they find on the infected system. - Internet worm known as "email worms are the most widely known modern worms and because of its method of distribution - through attachments.
2. Trojan (Trojan) - Trojan horse virus which is most often a virus that is disguised as a regular program activities as listening to music or watch a multimedia file, the virus is hidden inside. Thus, users hardly understand that they are infected with viruses.

Virus (Virus) A computer virus is a program that was created with the ability to replicate itself by infecting other files. When it comes to boot sector (boot sector) virus then infected boot sector of the operating system on a floppy disk or tvurdiya. Although the primary function that is certain viruses that multiply, most of them are dangerous because they contain code that breaks the information into the computer. The first computer virus was discovered in 1986 and since then the world have registered tens of thousands of virus. In most cases, only a small fraction of them are active and dangerous as contemporary antivirus programs largely protect consumers against new computer viruses, offering combined protection against Internet worms, viruses and Trojans.
Worm (Worm) Unlike viruses, computer worms are malicious programs that replicate themselves from one system to another, instead of infecting files located in your computer. For example, a worm that razporostranyava mass mail (mass-mailing email worm) send copies to all email addresses that you can find recorded in the infected computer. Network worm copies itself and spreads over the network, Internet worm spreads through Internet, etc.
Internet Worm (Internet Worm) Unlike viruses, worms do not infect other files. Instead, they are copied and distributed until completely discharge system resources on your computer. The most common and popular contemporary Internet worms worms are known as "email worm" because of its method of distribution - through attachments to emails sent to addresses taken from the Outlook Address Book or Outlook Express. To prevent this type of virus is necessary to never open attachments that you receive unexpectedly.
Trojan, Trojan (Trojan) The trojan is a program that installs to do something completely normal (eg to carry mp3 music), but actually doing something malicious (eg send numbers introduced credit cards gave a email address). Trojans are often used to obtain secret access to the system which are installed ie someone remotely control your computer. Trojans do not reproduce like viruses and do not spread as worms.
Macro Virus (Macro Virus) Macro viruses are written in programming languages (eg VisualBasic), supported by some products such as Microsoft Excel and Microsoft Word. Macros are small utilities that are included in a document to automatically perform certain actions for the user (eg, fast computation of a formula set values). Macro viruses are a common form of viral infection, which is exceeded only by Internet worms because of their easy distribution. As with any other virus, and macro viruses have a high risk of data loss. However, so far, Microsoft has introduced several forms of protection against unwanted execution of macros, this form of virus is widespread. Most often macro viruses infect a so-called "global template" (global template - as Normal.dot in Word), to be disseminated in any other documents on your computer.
Malware (Malware) Malicious code such as viruses, worms or Trojan horses are sometimes called "malware."
Polymorphic viruses (Polymorphic Virus) Polymorphic viruses change their code to avoid detection by antivirus programs. Polymorphic virus recode or change each time is recorded. This makes the possibility of very large variations.
Boot sector virus (Boot Sector Virus) Boot sector viruses are spread through infected floppy disks. This usually happens when users leave the disk in the floppy drive. When the system is started next time the computer tries to first boot from the floppy. If the disk is infected with boot sector virus, it will be recorded in the boot sector-and the hard disk. To protect your computer from boot sector viruses, you should change the settings in the CMOS so as to allow boot only from hard drive - C: \, but not from floppy - A: \.
Stealth (Stealth) Stealth viruses attempt to hide and can not be found. One method is to redirect calls made to the infected file. For example, the virus can stay in memory, and only when an application be made for writing on disk, it is activated.
File Viruses (File Viruses) File viruses infect executable files by inserting code in some parts of the original file so that code can be executed when someone is paid to the original file. In some cases, file viruses can label the whole file or delete the original and create a viral copy of the same name. File viruses always have as their purpose operating system (Windows, UNIX, Macintosh, DOS etc.).. Inscribing targets files resulting in total and irrevocable loss of original data.
Antivirus (Antivirus, Anti virus, Anti-virus) Antivirus or antivirus software is called a product which is used to detect malicious software code, protect computer system from infection and remove this code, if the infected system. Antivirus software is usually turned on by the producers themselves in independent tests to certify its quality and its ability to detect and remove viruses.
Disinfection (Disinfection) Cleaning, deleting or removing a virus called disinfection. In some cases disinfection can be achieved only by deleting the infected (infected) file. For example, a Trojan horse should always be deleted because it has no useful purpose and well-intentioned. On the other hand, a document that is infected with a macro virus should only be cleaned in order not to lose user data and utility macros. Although in most cases disinfection can be done without loss of valuable data, there is no guarantee that any file can be restored to its former condition. Therefore, antivirus experts recommend data recovery from pure backup copies. Anti-virus programs should rely only on the detection of viruses. However, if you saved up to date copy can restore a file by the antivirus program.
Heuristic (Heuristics) Heuristic scanning methods vary according to their manufacturer. Some companies argue that permit execution of certain actions of viruses in a secure and isolated environment. Other scanning every file opened or processed parts of malicious code. Heuristics are designed to detect unknown viruses before, so if viruses have recently written and distributed, the user still be protected. Heuristics are not 100% accurate and therefore recommends that users follow some basic rules of security for their computers are protected.
Blocking behavior (Behavior Blocking) Program behavior blocking monitors the actions of various files on your computer by preventing the operating system and related files from unwanted changes. Programs blocking behavior can monitor registry (registry) on Windows and warn the user if a program attempts to change it. So potrebitrelya may allow (for example, if you install new software) or to refuse to change (if any malicious program tries to save to your computer). Blocking behavior is a wonderful addition to other options to protect the operating system.
Check Integrity (Integrity Checker) Programs for checking the integrity scan and maintain a database of important information in the system or record critical system files. If a program tries to change any of these files, software for checking the integrity, will notify the user and will ask for consent. Programs for checking the integrity, can help a lot in protecting your computer system, but they require a higher level of knowledge in the field of viruses and computer software.
Antivirus Scanner (Scanner) Scanners are products used to detect malicious code. They also protect the system from infection and remove any existing contamination. Typically, scanners check files for malicious code in real time when the computer starts or when users make a request for verification. Scanners, also relying on methods of checking the integrity or blocking behavior to protect the system from unwanted changes.
Attachment (Attachment) Attachment is such a file is added to forwarded e-mail (email). The use of attachments is very convenient and useful. All modern programs (clients) to support sending email attachments, usually button in the program contains an image of a paper clip. On the other hand, sending attachments is the primary method of distribution of much of today's viruses. Virus writers often ask interesting names of attachments, thus causing the curiosity of the recipient. When launching the attachment, the virus runs and infects the system.
Portable Executable File (Portable Executable) Portable executable (PE EXE) is a program that can run itself on any operating system Windows (Windows 95, 98, NT, 2000, XP, and ME). An example of this file notepad.exe (Notepad). PE EXE may have an extension other than. Exe, for example. Scr - screen saver.
Active X (ActiveX) ActiveX controls are feasible or OLE. OCX files. Example of OLE (Object Linking and Embedding) is as ActiveX controls "notebook" which mozheda be integrated into a spreadsheet or text document. ActiveX controls can be performed only in the middle of the operating system Windows, as for each version create different controls. Unlike Java applets that are loaded only in browsers, ActiveX controls have access to the operating system itself, which in some cases, lead to security problems.

Friday, October 8, 2010

Third Lesson - How To Hack Someone

In this lesson we`ll talk about how we can hack someone's computer. Since the options that I describe are a few I will divide the lesson into several parts. The most commonly used techniques are viruses, flood, fucked the Windows through remote access to the computer. 
In the First Part we`ll talk about viruses, types of viruses, their effects and uses.
How to find them and all your questions, post in the Comments below the article. 

Second Lesson - Increasing Connection Speed

The easiest way to improve the connection speed is to use softuer. Before taking this step, you can check by testing how fast is your connection at the moment. In the Internet are good tools available for this purpose - a search on "Internet Speed Test" gives many results, simply select one of the programs. Do the test several times so you can decide better what is the average speed of the connection. Then do the following changes:
 First, remove the system QoS or Quality of Service, which should in principle to help your relationship work better, but it may take up to 20% of speed. If you use Windows XP Professional, follow these instructions to turn off the QoS:
  1.   Click Start and then Run.
  2.   Enter "gpedit.msc" in the box.
  3.   Under "Local Computer Policy" click the plus sign next to "Computer Configuration", then click this to "Administrative Templates".
  4.   Click the plus sign next to "Network" and select "QoS Packet Scheduler".
  5.   In the box to the right, double-click "Limit Reservable Bandwidth".
  6.   On the Settings tab, select Enabled.
  7.   In the box "Bandwidth Limit%" set to 0%. (Do not leave the field blank, and must write 0%.)
  8.   Click OK.
If you are using Windows Home Edition, follow these steps:
  1.    Click Start and then select Settings.
  2.    Select Control Panel and open "Network Connections".
  3.    Right click on "Local Area Connection" and select Properties.
  4.    In the General tab uncheck the beak against the QoS.
Apart from the changes, the networks are configured in Windows for the average user with a simple connection. They do not really know what connection you use - whether phone, DSL, or cable modem. It is therefore better to adjust network settings to your connection.The easiest way to do this is using the software. There are several programs that allow you to manage change. Some of them require you to enter values in the boxes, then they edit the Registry for you.
You can use TCP Optimizer. It only requires the user to specify the connection speed, how the connection and click on the button Optimize. After restarting your computer, your connection should have become significantly faster.
Now you can retest your connection speed.

These changes are a small part of what you can do to speed up Internet connection. If you want to learn more tips to increase speed, write Comments in this article.

First Lesson - Privacy

Web surfing is permitted, but the appropriation of foreign information, passwords, credit card numbers or sabotage of foreign computer is illegal. For this reason, we will first learn to protect ourself in the Net. We need not only to protect our computer against foreign attacks, but also to hide well, can not anyone follow us.
First, we need better protect our computer from foreign interference. It is desirable the version of our Windows to maintain Service Pack. So built FireWall to some extent protects our computer. There are cases where you need to disable that FireWall, so we need a good antivirus program.
Personally, I prefer Avast Pro. It has not only built FireWall, but in case of foreign attack, immediately signals and displays the IP address of the offender and thus we can return the favor...
This program not only protects us from different viruses but does not allow us to infect entering the infected Website.
Of course there are many other antivirus programs, which if you have any questions or your opinion, you can set them in the Comments below this post.
To hide ourself when we start to hack foreign computer, also we need some programs. Zone Alarm is a good program with many features, but sometimes it tied our hands and just when we are well to the purpose, can deny access and to block our actions, but in some cases is useful. When I want to hide my IP address, I use Hade Me IP. It not only hides my real IP address, but generates a new and makes tracking very difficult, almost impossible. This is a very useful program, where we use a computer with real IP. This program is paid, but do you believe that one hacker paid for something? And how? We`ll learn in subsequent lessons.
Use of foreign Wireless also an option, but is quite slow and sometimes quite difficult to finish the work.
The connection speed is also important. The faster the connection, the more difficult is tracking us and easier to do our work. How to increase the speed of your connection, will speak at our next lesson.

Thursday, October 7, 2010

Getting Started

The hacker is someone for whom in the computer world has no borders, protect, secrets and for him everything is possible. The most important thing for the hacker is not stopped before the failure, not to be denied and seek the way to success.
The tools of a hacker are Good Кnowledge in :
  • At least one Programming Language
  • Operating systems
  • Internet
  • Antivirus Programs
  • Viruses, Worms, etc.
  • Different types of programs
  • And last but not least - Creativity
Before we start attacking someone or something we`ll first learn to protect ourselves. In the next lesson we'll learn how to protect and remain unnoticed in cyberspace.

Brief Introduction

How to become a hacker? Many people dream to be hackers. Some succeed while others do not ... What it takes to be a hacker? Knowledge, the ability to apply them, cunning, ingenuity and a little talent...

One person can not to know everything, but he should be able to use their knowledge and enrich them. On the pages of this blog I will teach you of everything that I can and I will be glad to teach everything that you can do better than me.
Not save their comments so we can be mutually beneficial!

BLOG DIRECTORY, Submit blog free, Promote Blog, Best directory