What is hacking?
A: The terms "hack" are also used
to refer to a modification of a
program or device to give the user
access to features that were
otherwise unavailable, such as DIY
circuit bending. It is from this
usage that the term "hacking" is
often incorrectly used to refer to
more nefarious criminal uses such
as identity theft, credit card fraud
or other actions categorized as
computer crime.
Q: What is cracking?
A: Password cracking is the process
of recovering passwords from data
that has been stored in or
transmitted by a computer system.
A common approach is to
repeatedly try guesses for the
password. The purpose of password
cracking might be to help a user
recover a forgotten password
(though installing an entirely new
password is less of a security risk,
but involves system administration
privileges), to gain unauthorized
access to a system, or as a
preventive measure by system
administrators to check for easily
crackable passwords. On a file-by
file basis, password cracking is
utilized to gain access to digital
evidence for which a judge has
allowed access but the particular
file's access is restricted.
Q: What is a virus/trojan/
malicious script?
A: A computer virus is a computer
program that can copy itself and
infect a computer. The term "virus"
is also commonly but erroneously
used to refer to other types of
malware, adware, and spyware
programs that do not have the
reproductive ability. A true virus
can only spread from one computer
to another (in some form of
executable code) when its host is
taken to the target computer; for
instance because a user sent it
over a network or the Internet, or
carried it on a removable medium
such as a floppy disk, CD, DVD, or
USB drive. Viruses can increase
their chances of spreading to other
computers by infecting files on a
network file system or a file system
that is accessed by another
computer..
Q: What is a stealer?
A: A stealer is a software designed
to create viruses. This virus is
called as a server. You send the
server to the victim and if they
open it all their passes (according
to how the stealer is built) will be
sent to you via email, or ftp or a
php webhost.
Q: What is a RAT?
A: A Rat is a software created that
created similar servers (virus). If
the victim opens it they will be
your RAT. You can have a complete
access to their system. There are
hundereds of features.
RAT - Remote Administration Tool.
Q: What is a keylogger?
A: A keylogger is a software
designed to create servers. You
send the server to the victim and if
they open it all their keystrokes
would be sent you via email, ftp,
php webhost etc.
Q: What is BOT?
A: A bot is a malicious program
which has several purposes. They
are usually told what to do by a
botnet admin although many of
the features now are automated.
Q: What is a BOTNET?
A: A botnet is a network of
infected computers that all connect
to one area where they are
commanded by the botnet admin.
Q: What is a crypter?
A: All your servers that you create
of a keylogger, stealer, RATs etc.
are detected by antivirus. So
inorder to make it FUD (Fully
UnDetectable) we use a crypter
and crypt your infected server.
Q: How does a crypter work?
A: A crypter has a built in or
external file called stub. This stub
is based on common encryptions
like rc4, xor, tweafish, blowfish etc.
When you crypt your infected file
the crypter embeds the stub onto
your server and covers the server.
Just like how you paint your rusted
metals. And makes it undetectable
from anti-virus.
Q: What is reverting?
A: Reverting is a technique used to
obtain forgotten passwords. But a
hacker uses this method to access
the victims account.
Q: What is social engineering?
A: It is a psychological approach,
where you manipulate people into
performing actions or divulging
confidential information, rather
than by breaking in or using
technical hacking techniques
(essentially a fancier, more
technical way of lying).
Q: What is DDos?
A: DOS - Denial Of Service.
This is using bots. If you have a
large number of bots you make
them send packets to the target
site and make them break down.
Q: How is website and forum
hack possible?
A: There are lots of methods. The
most basic one is you find exploits
on a webserver and use them to
gain access and deface it. Sql, XSS,
LFI, RFI, DNS poisoning etc.
Q: Can everyone be Hacker?
A: Yes, but u have a brain and
common sense.
A: The terms "hack" are also used
to refer to a modification of a
program or device to give the user
access to features that were
otherwise unavailable, such as DIY
circuit bending. It is from this
usage that the term "hacking" is
often incorrectly used to refer to
more nefarious criminal uses such
as identity theft, credit card fraud
or other actions categorized as
computer crime.
Q: What is cracking?
A: Password cracking is the process
of recovering passwords from data
that has been stored in or
transmitted by a computer system.
A common approach is to
repeatedly try guesses for the
password. The purpose of password
cracking might be to help a user
recover a forgotten password
(though installing an entirely new
password is less of a security risk,
but involves system administration
privileges), to gain unauthorized
access to a system, or as a
preventive measure by system
administrators to check for easily
crackable passwords. On a file-by
file basis, password cracking is
utilized to gain access to digital
evidence for which a judge has
allowed access but the particular
file's access is restricted.
Q: What is a virus/trojan/
malicious script?
A: A computer virus is a computer
program that can copy itself and
infect a computer. The term "virus"
is also commonly but erroneously
used to refer to other types of
malware, adware, and spyware
programs that do not have the
reproductive ability. A true virus
can only spread from one computer
to another (in some form of
executable code) when its host is
taken to the target computer; for
instance because a user sent it
over a network or the Internet, or
carried it on a removable medium
such as a floppy disk, CD, DVD, or
USB drive. Viruses can increase
their chances of spreading to other
computers by infecting files on a
network file system or a file system
that is accessed by another
computer..
Q: What is a stealer?
A: A stealer is a software designed
to create viruses. This virus is
called as a server. You send the
server to the victim and if they
open it all their passes (according
to how the stealer is built) will be
sent to you via email, or ftp or a
php webhost.
Q: What is a RAT?
A: A Rat is a software created that
created similar servers (virus). If
the victim opens it they will be
your RAT. You can have a complete
access to their system. There are
hundereds of features.
RAT - Remote Administration Tool.
Q: What is a keylogger?
A: A keylogger is a software
designed to create servers. You
send the server to the victim and if
they open it all their keystrokes
would be sent you via email, ftp,
php webhost etc.
Q: What is BOT?
A: A bot is a malicious program
which has several purposes. They
are usually told what to do by a
botnet admin although many of
the features now are automated.
Q: What is a BOTNET?
A: A botnet is a network of
infected computers that all connect
to one area where they are
commanded by the botnet admin.
Q: What is a crypter?
A: All your servers that you create
of a keylogger, stealer, RATs etc.
are detected by antivirus. So
inorder to make it FUD (Fully
UnDetectable) we use a crypter
and crypt your infected server.
Q: How does a crypter work?
A: A crypter has a built in or
external file called stub. This stub
is based on common encryptions
like rc4, xor, tweafish, blowfish etc.
When you crypt your infected file
the crypter embeds the stub onto
your server and covers the server.
Just like how you paint your rusted
metals. And makes it undetectable
from anti-virus.
Q: What is reverting?
A: Reverting is a technique used to
obtain forgotten passwords. But a
hacker uses this method to access
the victims account.
Q: What is social engineering?
A: It is a psychological approach,
where you manipulate people into
performing actions or divulging
confidential information, rather
than by breaking in or using
technical hacking techniques
(essentially a fancier, more
technical way of lying).
Q: What is DDos?
A: DOS - Denial Of Service.
This is using bots. If you have a
large number of bots you make
them send packets to the target
site and make them break down.
Q: How is website and forum
hack possible?
A: There are lots of methods. The
most basic one is you find exploits
on a webserver and use them to
gain access and deface it. Sql, XSS,
LFI, RFI, DNS poisoning etc.
Q: Can everyone be Hacker?
A: Yes, but u have a brain and
common sense.
No comments:
Post a Comment