Tuesday, November 23, 2010

Google Haking

Hello Friends Today I will show you Google Hacking,
By reading this name many of us get misunderstand like we are going to hack Google.Google hacking does not mean hacking Google as google is very Big Enterprise we cannot hack google but in true sense Google Hacking  means:
               "Finding Accurate Result for our Search Query or Finding Exact Answer to our question using search engines like google,altavista,bing etc."

Now this does not mean we are not going to learn hacking in this chapter.Google Hacking is the first and basic thing for learning hacking
Before starting google Hacking you should see how google works here is the video which show how google works:





  In this video you can see how google  works like this all other search engines also works. When crawlers or spider go and get information from server many time they take passwords and confidential information from server and save it to there(search engine) database by which that confidential information of the server is open for the world through the search engine.We do not get that confidential information directly we can get it by adding  query to our question.Getting this type result  through search engine  is called google hacking. 

Let start basic of google hacking:
First you should know how result are displayed:
In this picture you can see google section of google that are Title,Text and URL.
When you type a word in google.Google see that world in all the three section in google and give result.We can less the number of result if we know in which section the word is there.
We can do it by the advanced query.The following are the some of basic query.

intitle:  -returns pages with that keyword in the title and the other
terms on the page somewhere eg intitle:hackesandcodes


allintitle: -only returns results that include all of your terms in the title eg allintitle:hacksandcodes

intext:  -returns pages with that keyword in the text and the other
terms on the page somewhere eg intext:hacksandcodes

  
inurl: -returns pages with that keyword in the url and the other
terms on the page somewhere eg inurl:hacksandcodes

 site: -allows you to narrow your search by either a site or a top-level domain. eg.site:loc.gov,site:hacksandcode.in

 filetype:   -search for a particular filetype eg ipod OR mp3 filetype:pdf ,password filetype:.xls;


cache: -find a copy of the page that google indexed even if that page does not exist.eg- cache:www.yahoo.com

 “phrase searching”- When we type google hacking in search box of google.Google take "google" as one question "hacking" as second question and "google hacking" as third question and join the answer of  this three question and give result and the number of result increase insted of that if we write "google hacking" in double quads it is consider as one question and we get less and accurate result 

  OR - returns results that include either of your search terms
eg ‘ipod OR mp3’ (NB: ‘OR’ must be UPPERCASE)   


  synonyms ~  -find alternative keywords eg ‘~deaf’ returns deaf, deafness, blindness, impairment etc.  

   define:  -find definitions from web pages and online glossaries etc eg ‘define:mp3’ 

 exclude use ‘-‘ -immediately before a word you wish to exclude from your search eg Iraq -war 

info: -provides a page of links to more information about specified url.



There is a software for advanced searching google hack you can downlod it at this link
Google hacks




There is the Google Hacking Database to get passwords,confidential information on web you can go to there by this link

Google hacking database 

You can download Advanced Google Hacking pdf at this link 
AdvancedGoogleHacking 

Thank you, 

Wednesday, November 10, 2010

History of hacking

Hello Friends I have posted this video and this post for you to know what is the History of hacking.

Hacking has been for around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities
Let See Some of the Hacker who have created the history due to there Passion in Hacking:
John Draper:Inspiration of Hacker
Jhon Draper  also known as Captain Crunch, Crunch or Crunchman . He is a computer programmer and former phone phreak.Draper was the son of a U.S. Air Force engineer.
Jhon draper was not hacking Computers but he was hacking phone which is known as phone phreak 
and become the the Inspiration for future hacker.
One day he noticed that some blind kids, named Dennie and Jimmie, were using the whistle from a "Cap'n Crunch" box to make free long distance telephone calls. They glued one of the holes shut in the whistle, and then blew it into the telephone. The modified whistle produced a pure 2600 Hz tone, which was the standard used by telephone electronics to signal that a call was over. When the telephone system heard the whistle it stopped all long distance charges, even though the call continued until one of the parties hung up.
John popularized the use of this whistle, and became known by the hacker handle "Cap'n Crunch". John became infamous, and was arrested in May, 1972 for illegal use of the telephone company's system. He received probation, and then was arrested again in 1976, convicted on wire fraud charges, and spent four months in Lompoc Federal Prison in California. Since then, he has held a variety of positions and given interviews on his experiences during the earliest days of long distance hacking. 

Robert Tappan Morris: Creator of First Worm
The Creator of first Worm
In 1988, Robert Tappan Morris [wiki], a Cornell University grad student (and son of the chief scientist at the National Computer Security Center), created the first Internet "worm [wiki]," a destructive program that replicates itself and moves through a computer network at breakneck speed. Partly to demonstrate his cracking prowess to classmates and partly to show how an MIT security system was vulnerable to attack, Morris wrote a software program that exploited a glitch in a Unix email program. Allegedly, Morris intended the worm program to infect only the MIT network. But during a 12-hour period, it spread rapidly, infecting thousands of systems and forcing some universities to shut down their computers altogether. Shocked by how quickly the worm was spreading, Morris helped a friend send out an anonymous message with instructions for system administrators to stop the plaque. But it was too late; the worm had propagated beyond control. In the end, every university affected had to spend thousands of dollars to fix its infected computers. Morris became the first person indicted under the CFAA when the U.S. government fined him $10,000 and sentenced him to probation and community service. However, the source code for the worm remains in wide circulation today. Almost 18 years after the incident, hackers are still using Morris’ worm as a starting point for new viruses.
Kevin Mitnick:The Real Hacker
Kivin Mitnic

By the 1990s, hacking had clearly transitioned from the child’s play of Cap’n Crunch toys to a brave new world of tech crime. And nothing underscored that shift more than when Kevin Mitnick [wiki] became the first hacker to earn an FBI Most Wanted distinction.
In 1976, while other Americans were celebrating the centennial, Mitnick was sweeping floors at a Radio Shack – not because he loved cleaning, but because he loved using their computers at night to hone his cracking skills. Before long, he’d developed a habit of unraveling computer code in order to see how an operating system worked or (later) how a cell phone connected to a network. Combine that kind of know-how and enthusiasm with a gregarious personality, and you’ve got a problem. Mitnick once called Motorola and charmed them into sharing their source code for free – information he promptly used to break into the computer systems at Motorola, Nokia, Sun Microsystem, and Fujitsu.
The New York Times broke the story about Mitnick’s activities that ultimately led to his 1995 arrest and a five-and-a-half-year prison term. However, there remains widespread misunderstanding (and controversy) about the case. Mitnick denies causing any serious damage to the computer systems he hacked, though he admits sneaking into private networks was wrong. Regardless, the government – still uncertain of what hackers were capable of – treated him as a seriously dangerous man. Authorities were bombarded with claims that Mitnick had done everything from wiretapping the FBI to hacking his way ito NORAD. (He denies those allegations, as well.) They assumed he could crack anything, even fearing he could launch nuclear bombs or shut down the Internet by whistling into a phone. In fact, after he was released from prison, Mitnick was barred from owning or using any electronic communications devices. When he played the role of a computer whiz on a 2001 episode of "Alias," the producers would only allow him access to a dummy computer.
Mitnick has influenced an entire generation of hackers with his innovative and stealthy cracking tactics, such as using IRC (Internet Relay Chat) [wiki] technology, an Internet conferencing system. He’s also written treatises stating his belief that the future of hacking lies in "social engineering," in which sensitive computer and coding information is not obtained through people’s computers, but from the persons themselves, via false emails and the like. But Mitnick’s greatest legacy might be in setting a good example. Today, he’s on the straight-and-narrow. The master hacker now spends about 25 percent of his time earning primo consulting fees helping fellow specialists break into "secure" systems in order to show companies how their networks are vulnerable.

This were the some Hacker of the history
Source of Information is from: Google,Wikipidia-The free Encycropidia,neatorama.com
                                         
                                          




Friday, November 5, 2010

Hacker - Meaning & Types of Hacker

HACKER
 
¢The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field. The other commonly known meaning of the word is someone who breaks into computer security networks for his own purpose. 
Classification of Hacker :  
                   Hacker are Classified into two types that are as follows:


First Type:
                 TYPES OF HACKER BY THERE LEVELS OF KNOWLEDGE
  1. ¢Coder/Programmer - These guys only code and program, test it, and then release it for the script kiddies.  
  2. Admins - Admins are far more common than Coders and may have experience with several operating systems, understand TCP/IP, and know how to exploit several vulnerabilities. They generally have less depth of knowledge but possibly greater breadth than Coders. This level of hacker would be part of a security team in a large organization. Some level of programming or scripting ability is required. For example, they should be able to port a tool form on flavor of Unix to another 
  3.  Script kiddie – Script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature)
    ¢Note:
            From the above classification the most dangerous type of hacker is Script kiddie
    ¢
    ¢      Script kiddies can have a much greater capability to cause problems then their skills alone would indicate.
    ¢
    ¢      Because they are not expert so that don’t know how much a program came be harmful to the system
    ¢
    ¢     I.T. Industry suffer most of the damage due to Script kiddie than other two 

    Second Type:
    TYPE OF HACKER BY THERE COLOUR OF CAP OR BY THERE CHARACTERISTIC
      1. ¢White Hat /Ethical Hacker- A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system. This classification also includes individuals who perform penetration tests and vulnerability assessmentswithin a contractual agreement. Often, this type of 'white hat' hacker is called an ethical hacker. 
      2.   Black Hat / Malicious Hacker - A black hat hacker, sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity 
      3.  Gray Hat Hacker - A gray hat hacker is a combination of a Black Hat Hacker and a White Hat Hacker. A Grey Hat Hacker will surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. Then they will offer to repair their system for a small fee
        ¢
        ¢

        History of Internet

        Before I Start with Hacking Tutorials I want to Show you the History of Internet That in a animated movie
        so enjoy it


        Thursday, November 4, 2010

        As this is my first blog and this is my first Post so I am Starting my first post with a holy mantra for me
             
        णमो अरिहंताणं
        णमो सिद्धाणं
        णमो आयरियाणं
        णमो उवज्झायाणं
        णमो लोए सव्व साहूणं
        एसो पंच णमोक्कारो, सव्व पावप्प णासणो
        मंगलाणं च सव्वेसिं, पडमम हवई मंगलं
        It means in English
                   

                   I bow down to Arihanta,
         I bow down to Siddha,
        I bow down to Acharya,
        I bow down to Upadhyaya,
         I bow down to Sadhu and Sadhvi.
         These five bowings downs,
         Destroy all the sins,
         Amongst all that is auspicious,
         This Navkar Mantra is the foremost.