Notes
![]() ![]() Notes - notes.io |
Chapter One:
The Basics
Reading vs. Doing
There are two ways to write a book about computer hacking.
The first is to write an encyclopedic account of every known system and its dialup numbers, passwords, loopholes, and how to increase one's access once inside.
There is nothing particularly wrong with this approach except that by publica-tion time much of the contents will likely be out-dated. And surely, after word leaks to the computer sites of the world the remaining information will be rendered nonfunctional.
Such a specific approach, while exciting, is best left to periodicals, which can keep readers updated on the constantly changing security frontier. Indeed, there are both print and on-line publications which attempt to do just that.
The second way to write a book about com-puter hacking is to write an encyclopedic account of the methods by which security is breached and systems penetrated. This is a much more agreeable solution to the problem of how to distribute changing information. The readers of such a book can then follow those methods, those algorithms, add some of their own creativity, and will never end up facing a situation drastically different from the ones the text has prepared the hacker to encounter.
Naturally, way-to-write-a-book Number Two is the way this book has been written.
At some points during the course of writing this book I've found that to talk about certain informa-tion requires knowledge of another aspect of hacking entirely. I tried to keep this book flowing in a logical order, conducive to understanding, but occasionally you will find ripples in the flow.
If you come across a term or situation that the book hasn't yet prepared you for, forget about it. You'll learn soon enough. Or look in the glossary you might find the answer you seek there. Com-puter hacking is a subject which contains a voluminous
amount of information. Repeatedly, as I prepared the manuscript, I had to decide whether or not to go into great detail in a particular area, or allow you to discover certain inside tricks on your own. Sometimes I compromised, sometimes I did-n't. Some things I left out because they were too scary. When all is said and done, the important part isn't the writing of the book, it's the reading of it, and the
actions that result from the reading. Hacking is about doing something, for yourself and on your own. It's not about reading about doing something. I will gladly point you in the right direction, but I won't be your guide once you're on your way.
Speaking of books being read, it is often a wonder that they ever do get to that readable finished state at all. Thank you R.S. and j for critiquing selections from this book; thanks to the people at Loompanics for recognizing that the Constitution does, after all, allow freedom of the press; and to the many hackers and crackers who offered sug-gestions: Morris, Janet, Sex Pack, Carl Fox and the happy Gang Of Demon Street.
Opening Remarks
This book will show you various methods you can use to break into computer systems.
In some ways this is harder to do than it used to be. Nowadays people are more strict, more cau-tious about security. That's how it seems, anyway. But there are plenty of holes still left in any sys-tem's armor. System managers can tighten up com-puter security as much as they want but there will always be ways to get around their efforts. Re-member the first rule of hacking: Whatever a . hu-man mind can achieve, another can also achieve. Whatever one mind can hide, another can discover. People tend to think and act alike, and it is this sameness of thought that you, the hacker, will exploit.
What is a hacker? I'm going to give a definition now, and if you don't fit the description I give, you can just close this book and throw it away: A hacker is a person with an intense love of something, be it computers, writing, nature or sports. A hacker is a person who, because he or she has this love, also has a deep curiosity about the subject in question. If a hacker loves computers, then he or she is curious about every aspect of computers. That curiosity extends also to the ways other people use their computers. Hackers have re-spect for their subject. For a computer hacker that means he respects the ability of computers to put him in contact with a universe of information and other people, and it means he respects those other people and does not intentionally use this knowl-edge of computers to be mischievous or destruc-tive. That sort of thing is for social-outcast junior high school kids. The serious computer hacker simply wants to know everything there is about the world, and the world of computers. The True Computer Hacker is a computer enthusiast and more importantly, a Universe enthusiast.
You should already be enthused. Are you ready to learn?
Equipment
There is only one piece of equipment you need to be a successful computer hacker... a brain. That's right - you don't even need a computer. In fact, you might be better off not having one as you will see later on. However, to start out you will want to have a computer, a modem, and a tele-phone line close by so you can connect to the out-side.
It's inconsequential what kind of computer it is. What's more important are the modem and the communications software you use with it.
Modems And Speed
Remember the old puzzler, "Which weighs more: a pound of feathers or a pound of lead?" Well, here's the same puzzler with a modern twist: "Which transmits data faster: a 600 baud modem, or a 600 bits-per-second modem?" The answer, of course, is "Both transmit data at the same rate!" But the real answer gets a little more omplicated. Let me explain.
C IlBaud" is the measure of the rate at which a modem sends and receives information. Below speeds of 600 baud, the baud rate is equal to bits-per-second. Due to the restrictions of telephone equipment, high speed modems may transmit far fewer bits-per-second than their baud rate. For example, a 2400 baud modem may only be sending 1200 bits-per-second.
For traditional reasons, modem speed is still stated in baud. While a hacker should be aware of the difference between baud rate and bits-per-second, the important thing to remember about modem speed is: the faster, the better. Just don't expect a 9600 baud modem to be four times as fast as a 2400 baud modem.
Five years ago, 300 baud moderns were quite popular. Today, 9600 baud modems are fairly common. Higher speed modems, such as 14,400 baud and 19,900 baud, are now available in fairly inexpensive models. Many of the services you connect to will not be able to accomodate these higher speeds; however, a high-speed modem can always "step down" and connect at a slower speed when necessary.
Hacking is a hobby that requires little equipment; when it is necessary to buy something, you should try to buy the best available. This doesn't mean you should get what the salesperson or a magazine review says is best. It means, get what is best suited to your needs. You will want your mo-dem to be fast. When I got my first modem, I thought of 140 baud as being the slowpoke. Now I look at the 300 baud crawler I used to use and wonder how I ever managed to stay interested when the words dribble across the screen at such an agonizingly slow pace.
Realize that whatever speed modem you get, it will usually run even slower than advertised. When there is static on the line, the modem is forced to resend data over and over until it has been sent or received correctly. Modems may run at half their listed speed, or even slower if they're in a particularly bad mood. They get even more snailish when you're calling long distance, or you're calling me computer through another through another (to make your call harder to trace back to its source), or if the remote computers are getting heavy usage.
For all of these reasons it's crazy not to get a fast modern. It will make every bit of electronic communication much more enjoyable.
Communications Software
It's hard to find truly splendid communications software, and yet it is the software (in conjunction with a fast, high-quality modem) which will de-termine how much enjoyment or frustration you get from your on-line interactions. There are lots of communications software ("terminal emulators" or "term programs") out there.
Just because a particular package comes with your modem doesn't mean you should feel obli-gated to use it. A good piece of telecommunications software will have many of the following features. For the hacker, it is necessary to have all these features. Well, maybe it's not necessary, but it will sure make your hacking experience more pleasurable.
Handy Features
The monitor on your computer was probably specially designed for your computer. When you dial who-knows-where over the phone, you can easily be talking to some computer with a com-pletely different screen design than your own. Con-sequently, certain standards (rules of behavior for monitors to follow) have been devised. If you call up a hundred different computers, there will be many differences between the characters each can display, the control codes used to perform various screen functions, and so on. Your communications program, or "comm program," should be able to adjust to a wide range of these codes and charac-ters. This feature is known as terminal emulation. Software that can't do that will often represent data from the remote computer in peculiar ways, or as garbage characters. Your comm program must be able to emulate a good number of terminals, such as ANSI, VT52 and VTIOO. It is also handy for the software to have a translation table - the ability to translate incoming and outgoing characters to other characters.
The terminal program you choose should be able to send and receive files using the Xmodern, Ymodem, Zmodern, and Kermit protocols. A proto-col is a set of rules. You see, if you're "ing to move files between two completely dissimilar computers, those machines need to know how to talk to each other. These file transfer protocols set up specific guidelines for the two computers to follow regard-ing how the file should be sent and received. Each protocol has its own set of advantage
and applica-tions. The Zmodem protocol transfers files fast, and with good error recovery, but it isn't as prevalent as the original Xmodem. Ymodem is another improvement on Xmodern, but its error detection isn't as keen - only use it on clean phone lines. Kermit is used on many university mainframes for speedy, efficient file transfer. Make sure your terminal software has at least these four protocols. Choose software that allows you to enter "AT" commands. ATtention commands were developed by Hayes to allow the user to control the modem. They have been adopted for most makes of modern. AT commands allow you to program the modem to dial, go on line, go off line, and perform various other functions. You should also be able to shell to your computer's operating system while maintaining the connection - sometimes you will want to run another program while on-line. The software should allow you to be able to store many phone numbers, names, and comments for a large number of dialups. You should be able to store more than just the ten digit phone number extensions and special codes should be pro-grammable, as well as sign-on macros for faster connections. It is also helpful to have auto-dial capacity, which repeatedly calls a busy phone num-ber until the line is free. Overall, the program you use must be pleasant and easy to use. If one program doesn't suit all your needs keep several on hand and use whichever you need when you need its special services. Generally I tend to stick with the PC Tools Desktop comm program. It doesn't have too many advanced features, but its ease of use more than makes up for that. ProComm Plus for the IBM and Macintosh is the Lotus 1-2- 3 of communications, software. It's a huge package that includes every conceivable feature you'll ever need. There are also many low price (free) alternatives in the world of shareware and public domain software. QModem is one good shareware communication program for IBM computers.
There is one final necessity for the hacker:
Data Capture
Your terminal program should have a data cap-ture feature. This means that as information gets sent through your modem and put onto the screen, you should be able to capture it in a disk file.
It's important for you to keep the data capture feature on whenever you're using your modem. You do this for several reasons. When I'm logged in somewhere, I like to poke into all the text files I can find, but I don't like to waste my time on the sys-tem by actually reading them while on-line. In-stead, I turn on my data capture, store what can be hundreds of pages of text in separate files, then sort through the data later, offline, at my leisure. (At other times it is more appropriate to simply transfer the files; what one does depends on circum-stances.) Data capture is also handy to pick up control codes and text that scrolls off the screen too fast for you to read. And sometimes text is immediately erased after it's put on the screen, either for security reasons or due to faulty software. With data cap-ture you retain a permanent record of that text. In any event, it's nice to have an official record of your hacking activities that you can use for reference and research. One time I called up a bulletin board (BBS) that was run by a local company, mostly for the pur-pose of advertising its products. The modems con-nected, I pressed Enter a couple times, and I got the usual random characters on the screen, then the login prompt came on. It took a little longer than usual to get to the login
Idea link book
Idea hacking 2012 june
Idea 3g speed on 2g 2012
gprs on idea
mobile internet settings
Airtel link book
Airtel highspeed free proxy 2012 june
Airtel 3G Dot Proxy Trick-June 2012 Airtel 3G Dot Proxy Trick-June 2012
Airtel proxy hack 2012 june
Airtel tricks 2012 may
hack airtel 3g 2012 may
Airtel 3g hack 2012 april
Airtel 3g hack 2012 may
latest-working-airtel-3g-gprs-vpn-hack 2012 may june
airtel hacking 2012 april
Airtel 3g hack working in 2012 may
opera mini airtel 3g hack 2012l
Airtel hello tune, call me tune, my tune hack 2012 may
free internet both browsing and downloading on indian operators
AIRTEL 3g hack for pc
Airtel Nop Hack Working In 2011
Hack For Airtel 3G Browsing Speed on 2G sim
No deeduction in airtel 3g
Free Airtel 3g Hack Or Airtel GPRS Hacking Trick For Free.
airtel gprs free in all india
ATrick To Download Hungama Content free
Irritate any person you like!
Airtel balance deduction (cut) trick.
Airtel free game download trick.
Download free game+airtel3g+hack+2012
Airtel livehack!Download all content free from airtel live.
Free airtel hellotune trick.
Free Airtel Call Divert Trick
Free Airtel Hellotune Code.
Free airtel aajtak mobile tv trick. 2012
Xclusive 57 Airtel Free LiveTv Hacked for Airtel MobileOffice !!!
Free airtel CNBC mobile tv trick.
Free Airtel live cricket score trick.
Free airtel hellotune for one month!
Free airtel browsing (surfing) trick.
Solution to call Call Customer Care if you are unable.
free internet both browsing and downloading on indian operators
AIRTEL 3g hack for pc
Airtel Nop Hack Working In 2011
Hack For Airtel 3G Browsing Speed on 2G sim
No deeduction in airtel 3g
Aircel link book
Aircel sms pack hacking 2012 may
Aircel 3g hack 2012 april
Aircel 3g hack 2012 may
Free Recharge Hacking Trick For All Network may 2012 - Airtel - Aircel - Docomo - BSNL - Reliance - Vodafone - Latest Recharge Tricks and Tips
Reliance link book
reliance free gprs trick/hack
Free GPRS Tricks on Reliance GSM Mobile for Unlimited Surfing & Downloading 2012
Reliance 3G Free Gprs Trick and Hack with Super Fast 2012
Reliance 3G Hack 2012
reliance 3g hack 2012 june
Free GPRS Hack For Reliance Mobile 2012 april
reliance 3g hack+trick 2012 june
Reliance Free GPRS Trick/Hack (Free Internet With Rs. 99 Plan!) 2012 june
Free GPRS Tricks on Reliance GSM Mobile for Unlimited Surfing & Downloading. 2012
Reliance 3G Free Gprs Trick and Hack with Super FastReliance 3G Free Gprs Trick and Hack with Super Fast 2012
Reliance 3G Hack 2012 latest
Docomo link book
Tata Docomo Free 3G Internet Gprs Trick Hack-June,July 2012
Docomo hack 2012-2013
Docomo 3g hack 2012-2013
Hackmaster link book
Hackmaster index page
Web application hacking
Hacking through google
Windows hacking
Come became a professional hacker
HACKING TOOLS 2012
password hacking new ideas
Special hacking tools
The 15 second password hack (and how to protect yourself from it)
The Evolution of Web Applications
Common Web Application Functions
Benefits of Web Applications
Web Application Security
web-application-hacking-this-site-is-secure-means
web-application-hacking-the-core-security-problem
Write a note in this area. It's really easy to share with others. Click here ...
![]() |
Notes is a web-based application for online taking notes. You can take your notes and share with others people. If you like taking long notes, notes.io is designed for you. To date, over 8,000,000,000+ notes created and continuing...
With notes.io;
- * You can take a note from anywhere and any device with internet connection.
- * You can share the notes in social platforms (YouTube, Facebook, Twitter, instagram etc.).
- * You can quickly share your contents without website, blog and e-mail.
- * You don't need to create any Account to share a note. As you wish you can use quick, easy and best shortened notes with sms, websites, e-mail, or messaging services (WhatsApp, iMessage, Telegram, Signal).
- * Notes.io has fabulous infrastructure design for a short link and allows you to share the note as an easy and understandable link.
Fast: Notes.io is built for speed and performance. You can take a notes quickly and browse your archive.
Easy: Notes.io doesn’t require installation. Just write and share note!
Short: Notes.io’s url just 8 character. You’ll get shorten link of your note when you want to share. (Ex: notes.io/q )
Free: Notes.io works for 14 years and has been free since the day it was started.
You immediately create your first note and start sharing with the ones you wish. If you want to contact us, you can use the following communication channels;
Email: [email protected]
Twitter: http://twitter.com/notesio
Instagram: http://instagram.com/notes.io
Facebook: http://facebook.com/notesio
Regards;
Notes.io Team