пятница, 3 февраля 2017 г.

Access Denied. Guide for Code Breakers.


http://wormholetravel.net/darkside.html

LOX The Legion Of Xtremers
vinnu” and Dhiraj Singh Bhandral (a well known creative software developer) are also known as the LOX (The Legion Of Xtremers) or LOXians. LOXians are known for their stateofthe-art hacks. As being recreation hackers, they can develop the solutions for the extremely secure environments. LOX is known for its lively worms. They also provide the security consultancy & penetration testing services. LOXians are the specialists in artificial life and have developed their own technology of a truly learning, replicating and thinking machine.
The World of Hacking
We've swept this place.
You've got nothing.
Nothing but your bloody knives
and your fancy karate gimmicks.
We have guns.
No, you have bullets and the hope
that when your guns are empty...
...I’m no longer standing,
because if I am...
...you'll all be dead
before you've reloaded.
That's impossible!
Kill him.
(…and sound of gunshots prevails the scene…)
My turn.
Die! Die!
Why won't you die?!
Why won't you die?
Beneath this mask
there is more than flesh.
Beneath this mask there is an idea, Mr. Creedy.
And ideas are bulletproof.
V for Vendetta (Hollywood movie)

Who need this paper?
The world is full of brave men & women, who are always curious, creative, and live to know more and ready to do something different in their own way. Off course in this paper, we are talking about the wannabe hackers, students,security personnel and secret agents, spies, intelligence personnel, etc. who are responsible for the ultra advanced security technologies.

Why need to study this paper?
This paper contains information that can be applied practically to secure or test the security of any kind of machines & therefore any information (although nothing is secure in this world at full extent) and to carry out the state of the art hacks. So dministrators and developers must study this paper carefully. Because, if you don’t know the attacking tactics, then how will you secure the systems from the attacks? Only knowledge is not enough, you must know how the things work practically, the dedicated attacker can invent new attacking technologies, therefore, you must be creative in finding out all of such techniques, which can be used to attack and only then, you can develop a security system effectively. Remember, a single failure of security means total failure of security system. Because that single event can be proven deadliest. As in the words of NSA (National Security Agency-USA), “even the most secure safe of the world is not secure and totally useless if someone forgets to close its doors properly”.

Be a part of Hacker’s Society
We should be thankful to army and the hackers for evolving the science of Hacking. The hacking does not just meant about the computers, but is possible everywhere, wherever, whenever & nowhere. Actually people get hacked even in their normal life. So everyone should read this paper with interest.

Who The Hackers Are?
The hackers are just like us. Made of same flesh and bones but think differently. What normal people cannot think even in their dreams, hackers can do that in reality. The hackers possess higher degree of attitude and fortitude. Whatever they do is for humanity. They are responsible for the modern day technology and they have developed the techniques to cop with future problems. They are responsible for creating and updating the top security systems. Think about it, if hackers will be absent from our society, then, our society will be totally unable to secure the country and will be considered as a dull society.

A rough picture of hackers is shown in Hollywood movies,making them heroes of the modern society. But actually hackers are more than that. The Hollywood hackers cannot withstand the modern day detection and prevention systems. What they are shown doing was done few years back. Nowadays hackers have to be more intelligent & more creative. And must have to guess what they are going to tackle in few moments ahead.

The hacking world is much more glamorous than the fashionable modeling world. It’s fascinating, because impossible looking jobs are done successfully. Moreover you really need not to spend a huge amount of money for it. What is invested is you brain, intelligence & the time. And it makes you live in two different worlds, a real world in which you are currently leaving and the other, the virtual world. Imagine if a same person leaving in two different worlds.

The hackers may have two different characters in both worlds. Yes every kind of virtual netizens (the virtual citizens) have a different name and address, which may or may not point to their real world character. Hackers have a different name called HANDLE, a different address, and homes in virtual world and all these things must not point to their real names addresses. These things are the must for the black hats; white hat hackers may have their nicknames or real names as their handler. It is always better to do all the good stuff with your real names, isn’t it?
Like in real world, the virtual world is also full of two sides, where in one side few people are always trying to crackdown the systems and few people are in other side defending the valuable resources from such guys.

Well friends, we are not going to call all such attacking guys as bad guys because, they may be doing this whole stuff for the sake of their countries welfare, for the sake of defense services, for investigating the criminal activities or for the sake of study as most of the hackers are not financially sound to emulate the real security systems so they have to try a hand on the real world working systems or for any other reason.

Well friends, the another strong reason for hacking is the information itself, if precious may give you a lots of money and this business is hundred times better than real criminal activities as the law implementations are not so strong enough for legal prosecution. Also, the cracked side may never want itself to be disclosed as a victim and publicized as a breached party for business reasons and for the sake of not losing their clients. The good hacker always informs the victims after a successful break-in. I bet you they might respect you if you do it and may offer you a good amount for the exhaustive security penetration testing.

The history is proof itself that none of the hackers are imprisoned long for real big-big scams. Instead, they got the name & fame. Thus several corporations get behind them to own their creativity. The examples are, Morris, Kevin Mitnik etc. Morris is known for famous morris worm, which brought more than 75% of Internet down in its earlier infection within few hours. Morris was just doing his bachelors degree at that time. Kevin Mitnik is known for the impossible state of the art hacks. There are several Hollywood movies inspired by Mitnick’s hacks.

Remember, the advanced countries are advanced not just by their wealth, but in technologies also. And these countries are advanced because they know how to protect themselves and their wealth. And no one other than a hacker can provide a better security. Even in the modern wars & terrorism the countries having effective hacking skills and technologies are secure enough than those, which do not have ultra advanced technologies. The time is the best proof that even in world wars, the First World War was prevailed by the tanks and minimal air strike technologies. While Second World War was prevailed by new technology guns, bombs, submarines, encryption machines and air power and the war condition were changed by Atomic bombs. All in all, the technology dominates everywhere.

Hackers Are Not Bad Guys Hackers can be a male or female and all are not bad guys. But as the media mostly call them a criminal that is why they don’t take media persons as their friends. Remember only hackers are responsible for securing our country from secret information thefts. They are responsible for checking the security and improving it. Otherwise every tenth part of a second a spy or criminal or enemy countries are trying to prey upon our secrets by any means. If you are thinking to guard a secret system in deep underground and employing thousands of commandos and the system will be secure then… give up this opinion as soon as possible. The hacker does not need physical access to hack down the systems; they can do it remotely from other ends of the planet earth.

The modern day hackers are equipped with techniques by which they can even view that what the remote systems are showing at their monitors and even without connecting to the victim systems by any means, just by receiving the emwaves leakage from the victim monitors or data channels. That is why the A2 level of security evolved. The A2 level security is considered the foolproof security and is considered as top security (most secure in this world) and employs the em leakage proof transmission channels and the monitors. Even the whole building where the secret system is kept is made em leak proof.

But remember there is a term mostly used in hacking world i.e. there must be a fool somewhere who will trespass the foolproof security. But a criminal is a bad guy. A criminal is a criminal & not a hacker at all. Media please take a note of it. There are two kinds of guys mostly termed as hackers by most of people. They are:
1) Script Kiddies
2) Black Hats

Well, script kiddies are the guys and gals using the software created by others and use it for the purpose of breaking in or for criminal activity without knowing the potential of the software’s use. They don’t know how the things work and mostly leave their identity & traces and thus get caught. They don’t know how to carry out the hacks manually. These people are termed as hackers by media and other people that are not true, hackers know how the things work and how to dominate the technology safely. The other kind i.e. the black hats are truly criminals. But they differ from script kiddies as they know the advantages as well as disadvantages of the technology and can dominate the technology by inventing their own ways as the hackers do. But for bad intentions and use their knowledge against the humanity or for criminal activity. Remember they are only criminals and not the hackers. In the similar way the terrorist group is never called an army or police even if they hold the guns and are trained in army fashion.

The Mindset of a Hacker
The only people having high level of positive attitude can become hackers. Better say, an optimism of very high state. This is because, the people suspecting their own way of working can’t be sure about realizing their own vision & thinking or rather say the dreams. In real world, most people call them over confident. We are asking those people then, what is the level of confidence? Actually people found them talking & thinking what they can’t think even in far beyond times. But the answer to those poor people, the over confident people are able to invent or discover their own ways of doing the things. All great discoverers & inventors were over confident and were strict to their vision and achieved success. Actually, hacker’s mindset is totally different from the normal people; their limit of thinking is beyond explanation.

People term them over confident, because they haven’t achieved those very levels of vision and thinking. They can’t even think about walking on those virtual paths, on which the over confident people are walking. All in all, the over confident itself means, attitude beyond limits, therefore, this term should not be taken as negative compliment, instead, it is the passport to the limitless world of hacking.

Social Engineering
A special branch of science of hacking is Social Engineering, under which attacks related to human brain factor are studied. The attacker is called a social engineer. Actually a social engineer is a person with highly sophisticated knowledge of working and responses of human brain. He bears a great amount of attitude and the confidence. He has the great ability to modify himself according to the environment and to respond quickly against any kind of challenges thrown to him. They are always near us in the time of need as fast friends (but not all fast friends are social engineers) and sympathetically hold our emotions and thus get our faith.

A social engineer may join the victim corporation as an employee or may become boyfriend of the administrator. In security industry it is a well-known fact that it is extremely difficult to stop a social engineer from achieving his goals. Remember the truth that a social engineer can even make a corporation vulnerable which employs totally flawless software & hardware systems by gaining the privileged access to highly authenticating places within the victim corporations.

Step-by-step Hacking
The hackers are disciplined like army personnel. They follow the steps to carry out the hacks. These steps are related to each other one after the other. These steps are:
1) Setting a goal and target
2) Reconnaissance
3) Attack and exploit
4) Do the stuff
5) Clear the logs
6) Terminate
Before carrying out the hacks the hacker must have the knowledge of the several things like languages like, c,c++, html, perl, python, assembly, JavaScript, java, visual basic, etc. and the way different kinds of machine architectures work and their way of storing data and the encryption and decryption systems and how to take advantages of leakages in encryption systems. Well don’t panic friends; this paper cares for those who are just stepping into this field of science. Step by step you will have to follow the paper in order to be a hacker. We think you have a Windows (2003, 2008, XP) or Linux system on x86 architecture. Even if you don’t have, just keep on reading. Before trying to hack the systems, we must know the advantages and disadvantages of the technologies used in the system & of your own techniques also. We must know how to exploit the vulnerabilities successfully. Therefore in this paper, we are going to discus the hacks and the exploits first. So that we can land on the war field equipped with the essential equipments, gear and the techniques. 


Комментариев нет:

Отправить комментарий