Thursday, November 09, 2006

Welcome To Hacker's Longue....

This site is dedicated to all those who want to learn hacking.

Hacking is a term used to describe the act of penetrating a closed computer system for the knowledge and information that is contained within. As cyber crime has ensued, the term “hack” has taken on negative meaning and has lost association with the true principles that it was founded on.

In this Blog you will find almost each and everything required to become a good hacker.I will assist you at all steps.

This Blog is for those people, who want to learn some hacking stuff, and if they know , then they can also share there hacking ideas.

Can Emails Be Hacked?

Yes. As a matter of fact, almost anything can be hacked in the Internet. The problem is that email accounts are the repositories were people store their private information or even their business data. It is a quite serious condition and most of the mail providers have taken some measures for stopping it. Unfortunately, users don't take them seriously and they don't follow the precautions.

There are several methods for hacking yahoo, msn or AOL email accounts. One of these methods is social engineering. Considered a revolutionary art among the hacker community, it has proven to be an interesting tool that can be exploited by anyone.

Social engineering consists in the ability to trick someone in believing that he is giving information to someone who has the authority to ask for it. The most common way to do it is through the telephone or via the internet. Let's say that a user receives a call from someone who identifies himself as a system administrator of his company and that he requires some information that could be considered harmless.

It's quite probable that that bit of information is the final piece that the hacker required for finishing his work. Something as innocent as when was the last time that the system asked the user to change his password could be used by him in his advantage.

A quite ingenious method within social engineering was a webpage were users required to enter their mail and password for finding if someone had deleted or blocked them from their Instant Messenger (IM). Unfortunately, many fell under this scheme. Hacking yahoo messenger or any other messenger is quite easy if you find how to exploit the user's needs.

Methods of attack

Password cracking doesn't always involve sophisticated tools. It can be as simple as finding a sticky note with the password written on it stuck right to the monitor or hidden under a keyboard. Another crude technique is known as "dumpster diving," which basically involves an attacker going through your garbage to find discarded documentation that may contain passwords.

Of course attacks can involve far greater levels of sophistication. Here are some of the more common techniques used in password cracking:

  • Dictionary attack
    A simple dictionary attack is by far the fastest way to break into a machine. A dictionary file (a text file full of dictionary words) is loaded into a cracking application (such as L0phtCrack), which is run against user accounts located by the application. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job.
  • Hybrid attack
    Another well-known form of attack is the hybrid attack. A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password. The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on.
  • Brute force attack
    A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password. L0phtcrack can also be used in a brute force attack.


Methods of Cracking Email Passwords

As mentioned earlier, one of the most successful method is achieved with the used of keyloggers and spy software. There are lots of spyware, logging tools available today such as 007, RemoteSpy, Netvizor, Email Spy, Chat Spy, Spector Pro, eBlaster, Invisible Keylogger, to name a few. This software will create a self extracting or installation file, you can then run it in the computer for surveillance, or email it to your target. The only question is, how can you convinced the recipient to open it?

Most hackers does not really hacking passwords by penetrating Yahoo, Hotmail, Gmail, and AOL servers, instead they will go for the easy way - the end user, that's you. It's not what you see on the movies such like "Hackers," "SwordFish," and so on. Too good to be true! They don't actually hack, but logs every stroke on your keyboard including the passwords you have input.

Brute Force/Dictionary Attack:

This method isn’t hacking; it’s software that is ruled by chance in hope that the password is a simple, common word such as “tree” or “dog”. What’s worse, this method is limited to only English terms, whereas many account passwords are in another language. This method, at most, is 15% successful. On top of that it is highly noticeable and traceable; every failed attempt is recorded by the email provider and later analyzed, so if you are employing someone who uses this method, I would suggest you get out of the arrangement expediently.


THIS BLOG IS UNDER CONSTRUCTION....

Welcome To Hacker"s Longue....

This site is dedicated to all those who want to learn hacking.

In this Blog you will find almost each and everything required to become a good hacker. I will assist you at all steps.

"THIS BLOG IS ONLY FOR EDUCATIONAL PURPOSE"