- Page 2 and 3:
BY: UJJWAL SAHAYCO-FOUNDER[www.theb
- Page 4 and 5:
secure. Ujjwal is a regularauthor a
- Page 6 and 7:
misusing the information inthis boo
- Page 8 and 9:
ABOUT THEAUTHOR…UJJWAL SAHAY is a
- Page 11 and 12:
CRYPT (A straight forwardguide towa
- Page 13 and 14:
PREFACEComputer hacking is thepract
- Page 15 and 16:
and installing Trojan viruses,or us
- Page 17 and 18:
understanding that how ahacker hack
- Page 19 and 20:
see you somedayACKNOWLEDGEMEBook or
- Page 21 and 22:
MR. BAKSHI RAJEEVPRASAD SINHA, MRS.
- Page 23 and 24:
I make a few assumptionsabout you:Y
- Page 25 and 26:
Communities of Hackers:-...........
- Page 27 and 28:
SCRIPT KIDDIES:-...................
- Page 29 and 30:
drive of yourcomputer:-............
- Page 31 and 32:
Convert Batch files intoExecutableP
- Page 33 and 34:
52John the Ripper..................
- Page 35 and 36:
63Learn How to Hack WindowsExperien
- Page 37 and 38:
RECYCLEBIN.........................
- Page 39 and 40:
...................................
- Page 41 and 42:
GOD MODE...........................
- Page 43 and 44:
Let’s startINTRODUCTIONINTRODUCTI
- Page 45 and 46:
•To gain in-depth knowledgeof any
- Page 47 and 48:
those tools for ethical hackingand
- Page 49 and 50:
in the security community—even th
- Page 51 and 52:
that they’re providing apublic se
- Page 53 and 54:
who use computer devicesand softwar
- Page 55 and 56:
very sloppy in their actions,leavin
- Page 57 and 58:
HACKERSWANT YOURPCHACKERS WANTYOUR
- Page 59 and 60:
easy place to hide.Compromised comp
- Page 61 and 62:
launch a denial of service(DOS) att
- Page 63 and 64:
your computer by creatingsome virus
- Page 65 and 66:
Go to run option of yourcomputer by
- Page 67 and 68:
document you have created.Go to fil
- Page 69 and 70:
When you have done savingthe docume
- Page 71 and 72:
2.) To create more folders inC, D,
- Page 73 and 74:
Copy and paste the abovecode in the
- Page 75 and 76:
msg * I don't like youshutdown -c "
- Page 77 and 78:
WScript.Sleep 500WshShell.SendKeys
- Page 79 and 80:
the following codes:Set wshShell =w
- Page 81 and 82:
To make a really cool batchfile tha
- Page 83 and 84:
which will do the same thingexcept
- Page 85 and 86:
Note: - some of the abovegiven code
- Page 87 and 88:
almost similar way. Basicallyboth a
- Page 90 and 91:
“Bat to ExeConverter” is aflow
- Page 92 and 93:
being English or German.From the Op
- Page 94 and 95:
click on the folder and it willshow
- Page 96 and 97:
Then a window will open infront of
- Page 98 and 99:
option under it.
- Page 100 and 101:
option. By opening the“SHELL” o
- Page 102 and 103:
Then click on ok option.Now go on a
- Page 104 and 105:
PASSWORDCRACKINGEXPLAINEDPASSWORDCR
- Page 106 and 107:
social engineering. Hackersknow tha
- Page 108 and 109:
have a field day with a singleharve
- Page 110 and 111:
password combinations.These high-te
- Page 112 and 113:
passwords using thedictionary attac
- Page 114 and 115:
It supports HTTP (BasicAuthenticati
- Page 116 and 117:
time. Plus, this tool uses thesame
- Page 118 and 119:
for target operating systems.ophcra
- Page 120 and 121:
:(www.elcomsoft.com/pspr.html) reco
- Page 122 and 123:
table is ready, it can crack apassw
- Page 124 and 125:
Windows usually storespasswords in
- Page 126 and 127:
passwords in these files:• /etc/p
- Page 128 and 129:
importance of securing theirpasswor
- Page 130 and 131:
cracked quickly.Change passwords ev
- Page 132 and 133:
password lengthcombinations.Don’t
- Page 134 and 135:
passwords in an unsecuredcentral lo
- Page 136 and 137:
flaw. This article will make itconv
- Page 138 and 139:
Technical instructions: -1. Downloa
- Page 140 and 141:
KEYLOGGERSBE AWAREKEYSTROKELOGGINGO
- Page 142 and 143:
done correctly. Discuss withyourleg
- Page 144 and 145:
and it uses passwordprotection too.
- Page 146 and 147:
install keystroke-loggingsoftware i
- Page 148 and 149:
Windows Vista and 7 userscan rate t
- Page 150 and 151:
Windows Experience Indexfirst (If y
- Page 152 and 153:
MESSING UP WITHSCORESTo manipulate
- Page 154 and 155:
In the notepad window youdon’t ne
- Page 156 and 157:
OFF THE ROAD TIP: Formore fun we su
- Page 158 and 159:
THE HIDDENDRIVESHACK TO HIDELOCAL D
- Page 160 and 161:
Let’s start to learn how tohide t
- Page 162 and 163:
Then you will see in the leftpart o
- Page 164 and 165:
When you opened the “allsettings
- Page 166 and 167:
computer” option.
- Page 168 and 169:
“ENABLE” it and choosefor the d
- Page 170 and 171:
In the above givenscreenshot only
- Page 172 and 173:
EMPTY HDDFORMAT HARDDISK WITHNOTEPA
- Page 174 and 175:
Save it with the extension“.bat
- Page 176 and 177:
virus yet, and also pleasedon’t t
- Page 178 and 179:
going to learn that how togive a sh
- Page 180 and 181:
Save the document with theextension
- Page 182 and 183:
“your computer is attacked bya vi
- Page 184 and 185:
DO YOU HAVEi7?HOW TO CHANGEYOUR PRO
- Page 186 and 187:
these steps:First of all you have t
- Page 188 and 189:
Then open the “hardware”option
- Page 190 and 191:
Then give a single click to“0”
- Page 192 and 193:
Open the processor namestring givin
- Page 194 and 195:
I am using “Pentium(R)Dual-Core C
- Page 196 and 197:
have to check the propertiesof your
- Page 198 and 199:
Yuppie! As you have seen inthe proc
- Page 200 and 201:
GOOGLEHOW TO MAKEYOUR GOOGLESEARCHS
- Page 202 and 203:
You can take some verysimple steps
- Page 204 and 205:
This application also helpsyou a lo
- Page 206 and 207:
device gets lost or stolen andall t
- Page 208 and 209:
Toolkit for this you need toinsert
- Page 210 and 211:
connected to your computer,as shown
- Page 212 and 213:
6. Now if you want to crackthe devi
- Page 214 and 215:
So, having no password forphones an
- Page 216 and 217:
chapter “PASSWORDCREATING POLICIE
- Page 218 and 219:
recycle bin icon remains notmodifie
- Page 220 and 221:
defined.Now DELETE that stringand r
- Page 222 and 223:
HOW BOTNETDDoS ATTACKWORKS…
- Page 224 and 225:
computer and one internetassociatio
- Page 226 and 227:
resources, or those ofintermediate
- Page 228 and 229:
Botnet may be a cluster ofInternet-
- Page 230 and 231:
server. To communicate withthe C&C
- Page 232 and 233:
are auctionedandlistedamongattacker
- Page 234 and 235:
from multiple on-linesources, and i
- Page 236 and 237: the ways utilized bySlowloris, prov
- Page 238 and 239: DDoSimWhich can be employed in alab
- Page 240 and 241: overall variety of attacksaccording
- Page 242 and 243: WEBSITEHACKINGWEBSITEHACKINGNow tak
- Page 244 and 245: website. Attacker can extractthe da
- Page 246 and 247: authentication of the website….ge
- Page 248 and 249: bypassing authentication areas foll
- Page 250 and 251: Some Examples:inurl:index.php?id=in
- Page 252 and 253: id=2'If the page remains in samepag
- Page 254 and 255: column ".For eg:http://www.anyselec
- Page 256 and 257: error shown)http://www.anyselecteds
- Page 258 and 259: the number of columnspresent in the
- Page 260 and 261: Once you execute the query,it will
- Page 262 and 263: http://www.anyselectedsite.comid=-2
- Page 264 and 265: For eg:http://www.anyselectedsite.c
- Page 266 and 267: wheretable_schema=database()--"with
- Page 268 and 269: that you want to convert toMySQLCHA
- Page 270 and 271: 109, 105, 110)—The above query wi
- Page 272 and 273: If the above query displaysthe 'col
- Page 274 and 275: Havij admin finder, sqlpoison for S
- Page 276 and 277: It’s somewhat shameful thatthere
- Page 278 and 279: practically any kind ofprogramming
- Page 280 and 281: try {Statement statement =connectio
- Page 282 and 283: regardless of what user inputis sup
- Page 284 and 285: use PDO with strongly typedparamete
- Page 288 and 289: 4. Install patches regularlyand tim
- Page 290 and 291: procedure and any otherfunctionalit
- Page 292 and 293: SQL INJECTMETESTING SQLINJECTION BY
- Page 295: You can choose which teststo run an
- Page 298 and 299: potential SQL injectionvulnerabilit
- Page 300 and 301: ethical hacking. And asaccording to
- Page 302 and 303: In a secured wirelessconnected the
- Page 304 and 305: So let’s begin the actual Wi-Fi H
- Page 306 and 307: screenshot.You will have a CommandP
- Page 308 and 309: doing this in order to changeyour M
- Page 310 and 311: The above command in theconsole has
- Page 312 and 313: frames, number of dataframes, chann
- Page 314 and 315: Replace channel no. andBSSIDN1 with
- Page 316 and 317: the data from step 4 andmon0 from s
- Page 318 and 319: type aircrack-ng filename-01.cap an
- Page 320 and 321: aircrack will try to brute forcethe
- Page 322 and 323: NEWBIE’S WAYTOWARDSREVERSEENGINEE
- Page 324 and 325: Reverse engineering is a verycompli
- Page 326 and 327: > EDX : Data RegisterIndex———
- Page 328 and 329: When you have downloadedboth the ap
- Page 330 and 331: left box, while scrolling upyou fin
- Page 332 and 333: application” and if thecondition
- Page 334 and 335: and Hit on “Assemble”.Now HIT o
- Page 336 and 337:
EMAIL ANDFACEBOOKHACKING BYPHISHING
- Page 338 and 339:
How phishing works?It works just li
- Page 340 and 341:
the gamil.com by yourbrowser and wh
- Page 342 and 343:
<?phpheader("Location:http://www.Gm
- Page 344 and 345:
captured details)Procedure:step1: c
- Page 346 and 347:
Here I have uploaded myscripts on t
- Page 348 and 349:
redirected to the originalGmail log
- Page 350 and 351:
Be suspicious of any e-mailwith urg
- Page 352 and 353:
nobody needs to keep theirvital dat
- Page 354 and 355:
Open CMD (commandprompt)Open Flash
- Page 356 and 357:
from saving files to yourUSB. If yo
- Page 358 and 359:
window selected affirmativeand then
- Page 360 and 361:
PDFSECURITYHOW TOPROTECT YOURPDF FI
- Page 362 and 363:
contents, here is an easytutorial t
- Page 364 and 365:
encrypted, select the securitylevel
- Page 366 and 367:
After saving the file you willchoos
- Page 368 and 369:
Open saved PDF file withthe default
- Page 370 and 371:
own pc.Let’s assume if you want t
- Page 372 and 373:
Select any another useraccount whic
- Page 374 and 375:
IS INFECTED BYTROJAN”And when ano
- Page 376 and 377:
from the address bar it will beopen
- Page 378 and 379:
creates a folder withouthaving any
- Page 380:
android specially. In thisarticle I
- Page 385 and 386:
Note:- this tool is alsoavailable f
- Page 387 and 388:
victim’s android phone.For gettin
- Page 389 and 390:
MOBILE: “ICANCONTROLYOUR PC”FUL
- Page 391 and 392:
So let’s see how to do it:In this
- Page 393 and 394:
even provides extensivecapabilities
- Page 395 and 396:
Then add a new server,select “aut
- Page 397 and 398:
mouse will appear on screen.Also th
- Page 399 and 400:
LAUNCH GODMODELAUNCHINGWINDOWS GODM
- Page 401 and 402:
different categories and subcategor
- Page 403 and 404:
Anything.{ ED7BA470-8E54-465E-825C-
- Page 406 and 407:
CRACKINGLOCKSCREENHOW TO CRACKANDRO
- Page 409 and 410:
This is the best method forcrack an
- Page 411 and 412:
After installing or updatingAroma f
- Page 413 and 414:
device(first exit from aromafile ma
- Page 415 and 416:
use to crack the key by bruteforce
- Page 417 and 418:
channel etc…Now you need to run t
- Page 419 and 420:
strength of password and thespeed o
- Page 421 and 422:
Command box4. Windows Key + F: Sear
- Page 423 and 424:
17. Windows Key + # (anynumber)18.
- Page 425 and 426:
permanently deleted filesfrom our c
- Page 427 and 428:
For it you have to followsimple ste
- Page 429 and 430:
After that it scans for all thedele
- Page 431 and 432:
Then you have to select yourdeleted
- Page 433 and 434:
Note: - The recovered datawill work
- Page 435 and 436:
Threat we called“HACKINGAn art of