http://wormholetravel.net/darkside.html
LOX
The Legion Of Xtremers
“vinnu”
and Dhiraj Singh Bhandral (a well known creative software developer)
are also known as the LOX (The Legion Of Xtremers) or LOXians.
LOXians are known for their stateofthe-art hacks. As being recreation
hackers, they can develop the solutions for the extremely secure
environments. LOX is known for its lively worms. They also provide
the security consultancy & penetration testing services. LOXians
are the specialists in artificial life and have developed their own
technology of a truly learning, replicating and thinking machine.
The
World of Hacking
We've
swept this place.
You've
got nothing.
Nothing
but your bloody knives
and
your fancy karate gimmicks.
We
have guns.
No,
you have bullets and the hope
that
when your guns are empty...
...I’m
no longer standing,
because
if I am...
...you'll
all be dead
before
you've reloaded.
That's
impossible!
Kill
him.
(…and
sound of gunshots prevails the scene…)
My
turn.
Die!
Die!
Why
won't you die?!
Why
won't you die?
Beneath
this mask
there
is more than flesh.
Beneath
this mask there is an idea, Mr. Creedy.
And
ideas are bulletproof.
V
for Vendetta (Hollywood movie)
Who
need this paper?
The
world is full of brave men & women, who are always curious,
creative, and live to know more and ready to do something
different in their own way. Off course in this paper, we are
talking about the wannabe hackers, students,security personnel and
secret agents, spies, intelligence personnel, etc. who are
responsible for the ultra advanced security technologies.
Why
need to study this paper?
This
paper contains information that can be applied practically to
secure or test the security of any kind of machines &
therefore any information (although nothing is secure in this
world at full extent) and to carry out the state of the art
hacks. So dministrators and developers must study this
paper carefully. Because, if you don’t know the
attacking tactics, then how will you secure the systems from
the attacks? Only knowledge is not enough, you must know how the
things work practically, the dedicated attacker can invent new
attacking technologies, therefore, you must be creative in
finding out all of such techniques, which can be used to attack
and only then, you can develop a security system
effectively. Remember, a single failure of security means total
failure of security system. Because that single event can be
proven deadliest. As in the words of NSA (National
Security Agency-USA), “even the most secure safe of the world
is not secure and totally useless if someone forgets to close
its doors properly”.
Be
a part of Hacker’s Society
We
should be thankful to army and the hackers for evolving the
science of Hacking. The hacking does not just meant about the
computers, but is possible everywhere, wherever, whenever &
nowhere. Actually people get hacked even in their normal life.
So everyone should read this paper with interest.
Who
The Hackers Are?
The
hackers are just like us. Made of same flesh and bones but think
differently. What normal people cannot think even in their
dreams, hackers can do that in reality. The hackers possess
higher degree of attitude and fortitude. Whatever they do is for
humanity. They are responsible for the modern day technology and
they have developed the techniques to cop with future problems.
They are responsible for creating and updating the top security
systems. Think about it, if hackers will be absent from our society,
then, our society will be totally unable to secure the country and
will be considered as a dull society.
A
rough picture of hackers is shown in Hollywood movies,making them
heroes of the modern society. But actually hackers are more than
that. The Hollywood hackers cannot withstand the modern day
detection and prevention systems. What they are shown doing was
done few years back. Nowadays hackers have to be more
intelligent & more creative. And must have to guess what
they are going to tackle in few moments ahead.
The
hacking world is much more glamorous than the fashionable modeling
world. It’s fascinating, because impossible looking jobs are done
successfully. Moreover you really need not to spend a huge amount of
money for it. What is invested is you brain, intelligence & the
time. And it makes you live in two different worlds, a real world in
which you are currently leaving and the other, the virtual world.
Imagine if a same person leaving in two different worlds.
The
hackers may have two different characters in both worlds. Yes every
kind of virtual netizens (the virtual citizens) have a different name
and address, which may or may not point to their real world
character. Hackers have a different name called HANDLE, a different
address, and homes in virtual world and all these things must not
point to their real names addresses. These things are the must for
the black hats; white hat hackers may have their nicknames or real
names as their handler. It is always better to do all the good stuff
with your real names, isn’t it?
Like
in real world, the virtual world is also full of two sides, where in
one side few people are always trying to crackdown the systems and
few people are in other side defending the valuable resources from
such guys.
Well
friends, we are not going to call all such attacking guys as bad
guys because, they may be doing this whole stuff for the sake of
their countries welfare, for the sake of defense services, for
investigating the criminal activities or for the sake of study as
most of the hackers are not financially sound to emulate the real
security systems so they have to try a hand on the real world working
systems or for any other reason.
Well
friends, the another strong reason for hacking is the information
itself, if precious may give you a lots of money and this business is
hundred times better than real criminal activities as the law
implementations are not so strong enough for legal prosecution. Also,
the cracked side may never want itself to be disclosed as a victim
and publicized as a breached party for business reasons and for the
sake of not losing their clients. The good hacker always informs
the victims after a successful break-in. I bet you they might respect
you if you do it and may offer you a good amount for the exhaustive
security penetration testing.
The
history is proof itself that none of the hackers are imprisoned long
for real big-big scams. Instead, they got the name & fame.
Thus several corporations get behind them to own their
creativity. The examples are, Morris, Kevin Mitnik etc. Morris
is known for famous morris worm, which brought more than 75% of
Internet down in its earlier infection within few hours. Morris
was just doing his bachelors degree at that time. Kevin Mitnik
is known for the impossible state of the art hacks. There are
several Hollywood movies inspired by Mitnick’s hacks.
Remember,
the advanced countries are advanced not just by their wealth,
but in technologies also. And these countries are advanced
because they know how to protect themselves and their wealth. And no
one other than a hacker can provide a better security. Even in
the modern wars & terrorism the countries having effective
hacking skills and technologies are secure enough than those,
which do not have ultra advanced technologies. The time is the
best proof that even in world wars, the First World War was prevailed
by the tanks and minimal air strike technologies. While Second World
War was prevailed by new technology guns, bombs, submarines,
encryption machines and air power and the war condition were changed
by Atomic bombs. All in all, the technology dominates everywhere.
Hackers
Are Not Bad Guys Hackers can be a male or female and all are not bad
guys. But as the media mostly call them a criminal that is why they
don’t take media persons as their friends. Remember only hackers
are responsible for securing our country from secret information
thefts. They are responsible for checking the security and improving
it. Otherwise every tenth part of a second a spy or criminal or
enemy countries are trying to prey upon our secrets by any
means. If you are thinking to guard a secret system in deep
underground and employing thousands of commandos and the system will
be secure then… give up this opinion as soon as possible. The
hacker does not need physical access to hack down the systems; they
can do it remotely from other ends of the planet earth.
The
modern day hackers are equipped with techniques by which they can
even view that what the remote systems are showing at their monitors
and even without connecting to the victim systems by any means, just
by receiving the emwaves leakage from the victim monitors or data
channels. That is why the A2 level of security evolved. The A2
level security is considered the foolproof security and is
considered as top security (most secure in this world) and employs
the em leakage proof transmission channels and the monitors. Even the
whole building where the secret system is kept is made em leak proof.
But
remember there is a term mostly used in hacking world i.e. there
must be a fool somewhere who will trespass the foolproof
security. But a criminal is a bad guy. A criminal is a criminal &
not a hacker at all. Media please take a note of it. There are two
kinds of guys mostly termed as hackers by most of people. They are:
1)
Script Kiddies
2)
Black Hats
Well,
script kiddies are the guys and gals using the software created
by others and use it for the purpose of breaking in or for
criminal activity without knowing the potential of the
software’s use. They don’t know how the things work and
mostly leave their identity & traces and thus get caught.
They don’t know how to carry out the hacks manually. These
people are termed as hackers by media and other people that are
not true, hackers know how the things work and how to dominate
the technology safely. The other kind i.e. the black hats are
truly criminals. But they differ from script kiddies as they
know the advantages as well as disadvantages of the technology
and can dominate the technology by inventing their own ways as
the hackers do. But for bad intentions and use their knowledge
against the humanity or for criminal activity. Remember they
are only criminals and not the hackers. In the similar way
the terrorist group is never called an army or police even
if they hold the guns and are trained in army fashion.
The
Mindset of a Hacker
The
only people having high level of positive attitude can become
hackers. Better say, an optimism of very high state. This is
because, the people suspecting their own way of working can’t be
sure about realizing their own vision & thinking or rather say
the dreams. In real world, most people call them over confident.
We are asking those people then, what is the level of
confidence? Actually people found them talking & thinking
what they can’t think even in far beyond times. But the answer
to those poor people, the over confident people are able to
invent or discover their own ways of doing the things. All great
discoverers & inventors were over confident and were strict
to their vision and achieved success. Actually, hacker’s mindset is
totally different from the normal people; their limit of thinking is
beyond explanation.
People
term them over confident, because they haven’t achieved those
very levels of vision and thinking. They can’t even think about
walking on those virtual paths, on which the over confident people
are walking. All in all, the over confident itself means,
attitude beyond limits, therefore, this term should not be taken
as negative compliment, instead, it is the passport to the limitless
world of hacking.
Social
Engineering
A
special branch of science of hacking is Social Engineering, under
which attacks related to human brain factor are studied. The attacker
is called a social engineer. Actually a social engineer is a person
with highly sophisticated knowledge of working and responses of human
brain. He bears a great amount of attitude and the confidence. He has
the great ability to modify himself according to the environment and
to respond quickly against any kind of challenges thrown to him. They
are always near us in the time of need as fast friends (but not all
fast friends are social engineers) and sympathetically hold
our emotions and thus get our faith.
A
social engineer may join the victim corporation as an employee or may
become boyfriend of the administrator. In security industry it is a
well-known fact that it is extremely difficult to stop a social
engineer from achieving his goals. Remember the truth that a
social engineer can even make a corporation vulnerable which
employs totally flawless software & hardware systems by gaining
the privileged access to highly authenticating places within the
victim corporations.
Step-by-step
Hacking
The
hackers are disciplined like army personnel. They follow the steps to
carry out the hacks. These steps are related to each other one after
the other. These steps are:
1)
Setting a goal and target
2)
Reconnaissance
3)
Attack and exploit
4)
Do the stuff
5)
Clear the logs
6)
Terminate
Before
carrying out the hacks the hacker must have the knowledge of the
several things like languages like, c,c++, html, perl, python,
assembly, JavaScript, java, visual basic, etc. and the way different
kinds of machine architectures work and their way of storing data and
the encryption and decryption systems and how to take advantages of
leakages in encryption systems. Well don’t panic friends; this
paper cares for those who are just stepping into this field of
science. Step by step you will have to follow the paper in order to
be a hacker. We think you have a Windows (2003, 2008, XP) or Linux
system on x86 architecture. Even if you don’t have, just keep on
reading. Before trying to hack the systems, we must know the
advantages and disadvantages of the technologies used in the system &
of your own techniques also. We must know how to exploit the
vulnerabilities successfully. Therefore in this paper, we are going
to discus the hacks and the exploits first. So that we can land on
the war field equipped with the essential equipments, gear and the
techniques.
Комментариев нет:
Отправить комментарий