Comprehensive: Journey of a Hacker 2012 Vol-(I) from Intermediate Hacker to Elite Hacker
Total Page:16
File Type:pdf, Size:1020Kb
Comprehensive: Journey of a Hacker 2012 Vol-(I) From Intermediate Hacker To Elite Hacker. By Scryptaxxeler A guide for those who want to be an Elite but can’t get the right direction. Disclaimer: This is work of pure plagiarism. It will be difficult to give reference to all those from whose works I am going to plagiarize. However some parts will be work of me any anyone can copy and distribute it as is. This will give an insight into the dark world of hackers, which will include much info regarding breaking and breaching of cyber crime laws. This is not to be used for Illegal purpose. But is intended for the letting the common people, System Administrators know where lies the weakest link. Remember, the chain is as weak as the weakest link. About: This book is intended to provide information on how to become an elite hacker. It’s much more than the CEH courses that are provided for script kiddies. Brief overviews of the included topics are: The volume-1 is the Intermediate Level Hackers Book To hacking which includes: Metasploit Framework Burp Suite, W3AF Framework,etc. How bank accounts are hacked. Social Engineering Toolkit The volume-2 is the the Level where Hackers doesn’t rely on exploiting tools, he writes it himself which includes: Sandbox Evasions. Programming skills for a Hacker. Reversing to the Level Of Assembly. Heap Spraying, Use after Free, Stack Overflow. Deciphering the cookie and much more. PART-I The hackers Framework Chapter 1:Setting up a pentest edition of Linux. Chapter 2:The Metasploit Framework Chapter 3:Web Security:The Burp Suite and W3AF Chapter 4:Social Engineering Tools Chapter 1: Setting up a Penetration Testing Edition of Linux. This chapter is intended to introduce to a penetration distribution of Linux. I will be discussing details of the Backtrack 5.But you guys can check NodeZero and Ubuntu Pentest Edition. Lets begin then. Backtrack: BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community. Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs. BackTrack Clean Hard Drive Install This method of installation is the simplest available. The assumption is that the whole hard drive is going to be used for BackTrack. 1. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface. 2. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console. 3. Select your geographical location and click “forward”. Same for the Keyboard layout. 4. The next screen allows you to configure the partitioning layout. The assumption is that we are deleting the whole drive and installing BackTrack on it. 5. Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done. 6. Log into BackTrack with the default username and password root / toor. Change root password. 7. Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot. BackTrack Dual Boot Install with Windows (Tested on Win 7) This method of installation is the simplest available. The assumption is that the you have a Windows installation taking up all the space on your drive, and you would like to resize and repartition your drive to allow a BackTrack install alongside your Windows. BACK UP YOUR WINDOWS INSTALLATION FIRST. 1. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface. 2. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console. 3. Select your geographical location and click “forward”. Same for the Keyboard layout. 4. The next screen allows you to configure the partitioning layout. The assumption is that we are resizing the Windows 7 partition and installing BackTrack on the newly made space. 5. Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done. 6. Grub should allow you to boot both into BackTrack and Windows. 7. Log into BackTrack with the default username and password root / toor. Change root password. 8. Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot. BackTrack Live USB Install This method of getting a live install to a USB drive is the simplest available using Unetbootin. Note that we will format the USB drive and erase its contents. 1. Plug in your USB Drive (Minimum USB Drive capacity 2 GB) 2. Format the USB drive to FAT32 3. Download Unetbootin from http://unetbootin.sourceforge.net/ 4. Start Unetbootin and select diskimage (use the backtrack-final ISO) 5. Select your USB drive and click “OK” for creating a bootable BackTrack USB drive 6. Log into BackTrack with the default username and password root / toor. Install BackTrack in VMWare. 1. Follow the basic install instructions here to get BackTrack installed in a VMware machine. 2. Log into BackTrack. To install the VMWare drivers, the kernel source and headers need to be in place. By default in the BackTrack 4 final release, the kernel (denoted by {version} ) is configured and ready. However in some cases, you might need to make sure you have the latest kernel sources by typing in: apt-get update apt-get install linux-source cd /usr/src tar jxpf linux-source- {version}.tar.bz2 ln -s linux-source-{version} linux cd linux zcat /proc/config.gz > .config make scripts make prepare 3. Now that your kernel sources and headers are in place, run the “Install VMWare tools” for the specific guest VM. 4. Mount the VMWare tools virtual cd, copy over the VMWare tools package and run the installer: mount /dev/cdrom3 /mnt/cdrom cp /mnt/cdrom/VMwareTools-{version}.tar.gz /tmp/ cd /tmp/ tar zxpf VMwareTools-{version}.tar.gz cd vmware-tools-distrib ./vmware- install.pl 5. Complete the VMWare tools installation as required. Run “fix-splash” to reintroduce the green framebuffer console. Reboot. Flicked From: Backtrack Official Site. Well Installation done Lets have some understating of what it offers: This will give you location of the Network Exploitation Tools in backtrack 5(For new users). As you can see Backtrack has already Grouped the essential Tools for You. See other screen shot: This will take 1000 pages if I give screenshots for all the tools in Backtrack.The better is I give you the list and you can use google to find about the tools.Aint that cool. The List you are going to see will blow you head off. I intended to include this for reference purposes. You can skip the list to around 100th page. The best way to learn about the tools is to use search engine which will be give you best access for gaining more knowlwdge of the tool. Thanks to ZitsTif for the list that he has uploaded to his site. #############################NOTE########################################## Date: Fri Jul 15 16:42:13 EDT 2011 Version: Backtrack 5 - gnome - 32bit A tool I installed that doesn't come with Backtrack 5 by default: sysv-rc-conf Command I ran before running dpkg --list > toolslist.txt sudo apt-get update && sudo apt-get upgrade -y && sudo msfupdate I also installed VirtualBox Guest Host Additions. ############################################################################ ||/ Name Version Description ii 0trace 1.0-bt4 0trace is a traceroute tool that can be run within an existing, open TCP connection - therefore bypassing some types of stateful packet filters with ease. ii 3proxy 0.6.1-bt2 3APA3A 3proxy tiny proxy server ii ace 1.10-bt2 ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order t ii adduser 3.112ubuntu1 add and remove users and groups ii admsnmp 0.1-bt3 SNMP audit scanner. ii afflib 3.6.10-bt1 An open source implementation of AFF written in C. ii air 2.0.0-bt2 AIR is a GUI front-end to dd/dc3dd designed for easily creating forensic images. ii aircrack-ng 1.1-bt9 Aircrack-ng wireless exploitation and enumeration suite ii alacarte 0.13.1-0ubuntu1 easy GNOME menu editing tool ii alsa-base 1.0.22.1+dfsg-0ubuntu3 ALSA driver configuration files ii alsa-tools 1.0.22-0ubuntu1 Console based ALSA utilities for specific hardware ii alsa-utils 1.0.22-0ubuntu5 ALSA utilities ii amap 5.2-bt4 Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the ii apache2 2.2.14-5ubuntu8.4 Apache HTTP Server metapackage ii apache2-mpm-prefork 2.2.14-5ubuntu8.4 Apache HTTP Server - traditional non-threaded model ii apache2-utils 2.2.14-5ubuntu8.4 utility programs for webservers ii apache2.2-bin 2.2.14-5ubuntu8.4 Apache HTTP Server common binary files ii apache2.2-common 2.2.14-5ubuntu8.4 Apache HTTP Server common files ii app-install-data 0.10.04.7 Ubuntu applications (data files) rc apparmor 2.5.1-0ubuntu0.10.04.3 User-space parser utility for AppArmor rc apparmor-utils 2.5.1-0ubuntu0.10.04.3 Utilities for controlling AppArmor ii apport 1.13.3-0ubuntu2 automatically generate crash reports for debugging ii apport-symptoms 0.9 symptom scripts for apport ii apt 0.7.25.3ubuntu9.4 Advanced front-end for dpkg ii apt-transport-https 0.7.25.3ubuntu9.4 APT https transport ii apt-utils 0.7.25.3ubuntu9.4 APT utility programs ii aptitude 0.4.11.11-1ubuntu10 terminal-based package manager ii arping 2.09-bt0 Broadcasts a who-has ARP packet on the network and prints answers.