Your Ad Here

Journey Begins - First Step to hacking

To start with this tutorial you must be ready with following :
1. A port scanner Utility like nmap or superscan and experiment with them so that you can use them.......
nmap can be downloaded from insecure.org
2.A good anonymity like TOR or Wingate.
3.Desire to learn and research.

Tutorial:
1. Use port scanner to know what ports are opened in the target system.

Example command: nmap -sS 12.12.12.21

Result will look like below,

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2007-07-12 05:07 EST
Interesting ports on 12.12.12.21
(The 1637 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp filtered ftp
22/tcp open ssh
23/tcp open telnet
111/tcp open sunrpc
139/tcp open netbios-ssn
1024/tcp open kdm
6000/tcp open X11

2. Try to find the exact version of services

Example command: nmap -sV –version-all host.com

3. Search for existing vulnerabilities for this exact service version.
4. Analyze the changelog details of soft wares in their release notes.
5. Now, you can know the security problems of this abc service and its 1.xx version.
6. Understand how the attacks will be deployed for this.

These are not just steps; you have to work/retry hard to get positive results. And don’t try these against google.com or yahoo.com

After the basics, you have to consider about your anonymity. Don’t use simple proxies for anonymity. Try different networks such as TOR . Don’t use the formal techniques always.

All above things are just basics to understand security problems and attacks. Start preventing your system/network from attackers after knowing everything about attacks.

P.S : For learning purpose only.
: First try it on other computers on same router as you.
: Try for long forgotten sites which are not maintained now so that you can find vulnerabilities and their exploits.

0 comments: