Spoonfed Hacking
Preface:
This guide, written by glj12, is a fairly comprehensive tutorial that covers various methods that involve hacking particular types of “victims.” I do not take any responsibility whatsoever if you choose to follow through the provided methods on non-accepting candidates. The following methods display acts of security cracking. Enjoy, and please remember the prior agreement in terms of usage of the provided knowledge below.
Anyway, let us continue, shall we?
Local Hacking
This method normally consists gaining access some way or another via the intranet. Let us test the following method. (Note, everything highlighted in yellow is code, what you type in the terminal)
-Wireless Hacking
Let us set up a scenario here. You are eager to gain access to a non-specific, (or specific, if you have an apparent grudge with a mean neighbor) to a local computer. Here are the tools needed to gain access before we go on our mission.
- Laptop with dual boot, (preferably BackTrack 2 for Linux, and the second boot being Windows XP Pro)
- A CD
- Deepburner, so you can burn your .ISO image to your CD.
- Supported wireless card for injection to work properly (please see the list found here: http://www.aircrack-ng.org/doku.php?id=compatibility_drivers#which_is_the_best_card_to_buy)
- Enough battery life to serve you well
- Kismet or netstumbler, (to each his own, preferably Kismet for Linux so you do not have to reboot back and forth so often; this comes complete in BackTrack 2)
0 Comments:
Post a Comment