Hack Track
Hack Track
Hack Track
----------------------------------------------------------------------------------
Reverse Engineering:
MOV(move): going to moove the data from sourcec to destination.
syntax: MOV dest,src
------------------------
Debug_Tools:
OllyDBG : DEbugger available
www.ollydbg.com
-----------------------------------------------------------------------------------
----
cracking software: Lena's Tutorials on Reverse Engineering ---- 20 videos. [20
wayes to debug a software]
-----------------------------------------------------------------------------------
------
Phishing Method:
Fb.html -- login.php--log.txt
rohith.000webhost.com/cpanel
after opening control panel --- goto file upload ----
in that go to public_html
create a folder and upload fb.html, login.php, log.txt and save
And change permission to 7 7 7
FUD-Fully Undetectable
obsidium software: this is software protection so that we can encript the trojan
file and antivirus cannot detect it.
browse:-
www.cypherx.org
-----------------------------------------------------------------------------------
--------------------------------------
Hacking using VM WARE(BlackTrack Or Kali Linux)
BlackTrack - Kali Linux : both are linux based os....\ By the hackers for the
hackers (used for only hacking)
Metasploit : 5 commands
- vulnerability : A weakness that allows an attacker to compromise the security
of system.
- Exploit: code/step by step method which allows an attacker to take an
adavantage of system
- Payload : Code which runson the system after exploitation
- Encoders : Safety
__________ steps
BT : IP : attacker : 132.168.140.132
WINXP: IP : Victim : 192.168.140.141
---------------------------------------------------------------------------
Process::
ANDROID HACKING
data_backup.
___________________________________________________________________________________
____________________________________