Unthinkable Hacking Techniques !!!

Discussion in 'Ethical hacking Tips' started by Bhullarz, Oct 28, 2008.

  1. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    Hi Guys ! I am posting this article for those who use pirated softwares. Because this is the time to stop using pirated softwares. You can't even imagine what your loss can be if you are using your PC for professional purposes.

    Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.

    Another MOST DANGEROUS HACKING TECHNIQUE is quite undetectable. You know what are you type in browser's address bar is resolved by your ISP's Domain Name Servers. What if your request goes to a hackers's machine first and then goes to ISP. Yes, this is possible a simple VBSCRIPT or WSH Script can do the trick. you won't be able to know that you are being watched or you are being traced. No firewall or no anti-hacking tool wil help you. Usually such scripts might be available as registration scripts for some kind of softwares.

    Now About Windows XP users, this operating system's services are available through internet which can be very dangerous. Do you that by default you are all drives are ready to share data over network. Another thing is TERMINAL SERVICES which allows multiple users on a single machine. It means if you are working on your machine, if someone can log in to your machine remotely and you won't be alerted.

    If you are downloading Operating Systems from Internet. Then take care that you download from trusted sources only. Cause it is very easy to embed some tracking code into your OS Images which can not be detected later on by any security software.

    If you are using LINUX Operating Systems, it is highly recommeded that you use the softwares from trusted sources only otherwise you can be hacked or can cause damage to your machine.

    Another good hacking tool is sniffer which is used by network administrator. It scans the network traffic and can filter sensitive information like passwords, credit card numbers etc. So if you are using credit cards at cafes so beware. you can be victim.
     
    Last edited: Oct 28, 2008
    anuvab1911, akelius and dahalpancaj like this.
  2. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    ya really. All (most of them) the keygens and cracks that i download will caught in the AV. All are server programs (trojan -RAT tool) which is capable of controlling our system remotely. if ur PC is connected with net make sure u do all the AV updates. Its better to install 2 firewalls.
     
  3. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    Get a linux firewall that only allows outbound traffic and now inbound traffic (If you are really paranoid). I dont care really, I find stuff like that I format all my stuff is on another HDD.
     
  4. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    I found another hacking technique which is quite popular now a days that is USING VIDEO SITES, TROJANS are delivered to your pc. Yes, by visiting a video site, if you download the codec to view the video, you can install a server on your machine.

    These technique uses a software called DOWNLOADER which is basically a small client which receives malware on your machine, if installed. Usually if some link is taking you to some page with VIDEO PLAYER but you are not able to view the video ( and you will not able to view the video for sure, because there is no video for you, just an outfit of a video player is there), website will ask you to download the CODEC ( small piece of software which enables the machine to play different types of media files). Actually this will not be a codec, but a trojan program which will be installed on your machine. Now the person who is having server for this DOWNLOADER, can send any kind of malware to your machine. It works like a door for HACKER. Now HACKER can not only retrieve your personal data but also can test his/her viruses on your machine. It helps HACKER to always update his VIRUS before your anti-virus start recognizing the virus.
    This is damn good way of spreading viruses and now a days FACEBOOK and GOOGLE are really fighting with this problem. According to CNET News , on your facebook, you will receive a message which will contain google link to view a video, when you click on link, it will take you to some non-google page and ask you to download codec to view the video. and in above mentioned way DOWNLOADER will be installed on your machine.

    So, BEWARE ALL FACEBOOK USERS. IF YOU ARE RECEIVING SUCH MESSAGES , DON'T FOLLOW THEM.

    news reference :
    Code:
    http://news.cnet.com/8301-1009_3-10078353-83.html
     
    Darkness_inside likes this.
  5. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    I too encountered similar things like this video codec. Even if all the codecs are installed in our system it will say that "wmv codec not installed" or some error like this. If we click that ......... Trojan installed in our system. But experienced net users will be aware of these things.
    Good info for beginners..
     
  6. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    yes its true but that why u have to be smart about what u download if u cant find a patched software or a serial key for the program then think smart about downloading keygens i guess i get lucky because everytime i download one i never got a virus ...................YET at least lol
     
  7. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com

    May be there can be another case, you got the virus but your antivirus was already disabled by another virus. So, no virus got detected. ;-)
     
  8. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    Naw i can assure u 100% thats not the case
     
  9. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    So, I wish you gud luck bro in that case.
     
  10. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    This can't happen when u re smart than the virus program. I've all the keygens and cracks but i'll archive it and protect it with a password. there are many other techniques too.. :lipsrseal
     
  11. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    Archiving the keygens is different thing and using them is another aspect. If you have to use a keygen, you must have to extract, means it will come out of archive, will enter into system's memory, where it can go with its ill-works.

    I tell you the best way to test various softwares or testing various untrusted softwares (keygens use or patched ) on your machine. Just use VIRTUALBOX (by SUN Microsystems). Try all untrusted softwares firstly in Virtual Windows, if everything seems fine, then try it in your real time operating system.

    Virtual Box allows you to run another operating system like Windows XP,Windows Vista, Linux, Apple's OS, Sun's OS with in your windows like any other application software.
     
    dahalpancaj likes this.
  12. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    If u re beginner u should be worried about the trojan getting into systems memory and all sorts of stuff. If u know how to handle it, then u re the master and it's a slave. It doesn't goes to system's memory as quickly as u said. So, no need of virtual box. just use ur mind box (Presence of mind is enough)..
     
  13. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    Bro ! Why don't you share working knowledge here regarding using these trojans ? It would be good for all.
     
  14. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    handling it doesn't mean a very great thing. U can actually monitor ur system using a firewall. If the trojan starts to connect to any other remote computer or so, it'll definitely open a port. That will be indicated by the firewall, then u can arrest that. simple
     
  15. pradeep

    pradeep Team Leader

    Joined:
    Apr 4, 2005
    Messages:
    1,645
    Likes Received:
    87
    Trophy Points:
    0
    Occupation:
    Programmer
    Location:
    Kolkata, India
    Home Page:
    http://blog.pradeep.net.in
    Bhullarz is very right, have a good anti-virus software and never download OSes from the internet!
     
  16. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    Yes, Firewall can help you.but........
    Bro, If you have studied the behavior of TROJANS, there are many of them which are coded to bypass your FIREWALL settings. If you are programmer and has done some network programming, you must be aware that how difficult is it to bypass Windows Xp's firewall and if you are hacker, you will be knowing there are many way to bypass even 3rd party firewalls too.
    So, firewall won't help you always. You need to be aware what is happening to your system.
     
  17. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    I too studied about the behavior of trojans and all. But i think u re not so familiar with that. Whenever a file needs to access internet, A good AV like kasersky will ask the user that " this process tries to connect with the internet and asks for the option "Allow or Block". So u can very well decide whether to allow it or not. Jus download any trojans and check that with a good antivirus with up to date database.
     
  18. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    well there are some oses u can download from the internet such as Linux for example


    my favorite ( Backtrack) which you can download at remote-exploit forums or something like tat
     
  19. Bhullarz

    Bhullarz New Member

    Joined:
    Nov 15, 2006
    Messages:
    253
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    System Manager
    Home Page:
    http://www.tutors161.com
    Think of a program which connects to internet For example FTP Client, which needs access to internet to make uploads/downloads but someone has attached TROJAN with it, which uses FTP Client's processes to communicate with some server. What you gonna do now? Kaspersky will show that FTP Client processes are trying to access internet, Won't you allow those processes if you want to upload you website? If you block any process to access internet, your software will not work, or if you allow it will activate the trojan.
    Trojan is still undetected by your antivirus program.
    Kindly solve this problem, neo_vi.
     
  20. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    If some one has packed a trojan with an ftp client, the setup file or the ftp client's executable file will be detected in the antivirus. So u don't need to worry about that.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice