The Best Hacking Books

Most Power Full and Read Able Books which I personaly Read and All Books Very help full.

Intelligence Hacking Book

most intelligence hacking book with free downloadable links So read here and Download Thanks For coming.

Bitcoins Earning and Hack

Top Bitcoin Books How To Earn Bitcoin Free How to hack Bitcoins Fast Free How to Get Bitcoin

Hackers and Social Media Hacks

most importent books for every one like Faceook,Gmai,Whatsapp and instagram hacking books with free Download link All Questions with answer How to hack Facebook? How to hack Gmail? How to hack Whatsapp? How to hack Instagram?

Udemy Course

I am Upload Udemy Course list With Free Download and Easy to Download Please Share links with Your Friends.This Page Only for Educational Purpose Don't Missuse This Files.....

Showing posts with label "Hacking Methodology". Show all posts
Showing posts with label "Hacking Methodology". Show all posts

Wednesday, January 22, 2020

Introduction to Mobile Hacking

 Mobile Hacking 

Mobile hacking makes perfect sense because of the rise of smartphone and other mobile devices for online transactions and connecting with others. Since mobile devices are hubs of personal information that are easier to access compared to personal computers, they are among the most vulnerable devices for hackers.

Most Common Question (Why should you hack mobile devices?)


  • Know the location of a target through installed GPS service or cell ID tracking
  • Get Access emails and record phone conversations 
  • Know target’s internet browsing behavior 
  • To View all contents stored in the device, including photos 
  • Send remote instructions to the mobile device 
  • Use it to send spoofed messages or calls


Mobile app hacking is among the fastest ways to infiltrate a mobile device system since it is easy to upload a malicious app online and make it possible for people to download the hack, without even thinking if they should examine their download or not. Mobile apps are also considered as “low-hanging fruit.” Most mobile apps can be directly accessed through their binary codes, or the code that mobile devices need in order to execute the app. That means that that everyone who has their hands on to marketed hacking tools are able to exploit available mobile apps and turn them into hacking tools. Once hackers are able to compromise a mobile app, they will be able to perform the initial compromise within minutes.


How hackers exploit binary codes in mobile apps?
Here Same Ways......

  • Modify the code to modify behavior

When hackers modify the binary code, they do that to disable the app’s security controls, requirements for purchasing, or prompts for ads to display. 


  • Inject malicious code

When hackers are able to get their hands on a binary code, they can inject a malicious code in it and then distribute it as an app update or a patch. Doing this can confuse a user into thinking that he is merely updating the app in his mobile devise, but in reality, the hacker has engineered the user into installing an entirely different app.


  1.  Create a rogue app

Hackers can perform a drive-by attack, which is possible by doing an API/function hooking or swizzling. When this is done, the hacker will be able to successfully compromise the targeted application and make redirecting the traffic or stealing user credentials possible.




  • Do reverse engineering

A hacker that has access to a binary code can easily perform a reverse-engineering hack to expose further vulnerabilities, do similar counterfeit apps, or even resubmit it under new branding.













Friday, December 27, 2019

System Hacking


Before starting the system hacking phase, an ethical hacker, or pentester must
remember that you cannot gain access to the target system in a go. You must
have to wait for what you want, deeply observe and struggle Than you will success


======System Hacking ======


 System Hacking Methodology:
There same   system hacking methodology
Cracking passwords
Its mean first we crack the passwords of system
you should know about three types for crack passwrd 
onelike username and password.
 two like biometrics
three = like registered / allowed devices
Every one know that a good password contains: -

Case Sensitive letters

Special characters

Numbers

lengthy password (more than 8 letters)

Types of Password Attacks
Password Attacks are  the following types: -

Non-Electronic Attacks/physical attack (types)



Active Online Attacks (types)[
"Active Online Attack includes different techniques that directly interact
with the target for cracking the password."
]
=============================
most use full are
Dictionary Attack (D.A)
Brute Force Attack (B.F.A)
Hash Injection (H.I)
=============================
Passive Online Attacks (types)
[
"Passive online attacks are performed without interfering with the target.
Importance of these attacks is because of extraction of the password
without revealing the information as it obtains password without directly
probing the target."
]
=============================
Wire Sniffing
Man-in-the-Middle Attack
Replay Attack
=============================
Default Password (types)
["Every new equipment is configured with a default password by the
manufactures. It is recommended to change the default password to a
unique, secret set of characters."]

Offline Attack (types)["
An example of offline attacks is comparing the password using a
rainbow table. Every possible combination of character is computed for
the hash to create a rainbow table.
"]
=============================

Pre-Computed hashes and Rainbow Table
=============================




Escalating privileges


Executing applications

Hiding files


Covering tracks














If you have any problem so comment me
















Pease give me feedback

Hack Me Tech