PIRATTING A COMPUTER - THE BASIC TECHNIQUES OF THE HACKERS
How to Hack a Computer:
How to hack a computer or how to hack a PC,
questions that often come to mind we, computer enthusiasts ...
Before we begin, let's make things clear, this article will aim for
educations and will not incite you to any case to commit crimes / crimes, if we publish this article,
it's only for prevention purposes so you can be aware of the techniques
basic hackers and to guard against them.
There are several tools / flaws so that hackers come to their goal, we will
explain the most common techniques ...
Before you start reading the full article, be sure to read our articles:
Hack a Wifi connection
Hack a webcam
Hack an email address
Hacking a VPS server
To hack a Facebook account
Hacking an internet site
Hacking security cameras
Hacking a Windows session
And hack a cell phone.
Techniques using Hacking software:
Remote Access Trojan - Remote Administration Tool:
RAT'S (not rodents), RATs (Remote Access Trojans), are tools widely used by
newbies (beginners) who only seek to penetrate a few victims, thanks to its Administration Tool
remotely, it will create a file SERVER.exe that will send to its victim (which will be previously detected
by the basic anti-virus, we will come for the undetection thereafter ...).
Thanks to the control panel (Client.exe), it will be able to take control of the targeted computer, on which
the victim has launched the application (server.exe), it will install on his computer, adding a
registry key that will allow it to start each time the computer will be launched.
The Pirate will be able to have fun with his victim, recover his passwords, consult his webcam, listen
his microphone and many other functions ...
An example of a tool that allows this use, which basically was not planned for this (DarkComet):
Darkcomet RAT
Look at the screenshots we put on our DarkCometRAT page.
Malekal will explain in more detail how the Administration Tools works at Distances:
What is a RAT or TROJAN?
Keyloggers:
It's a bit like Remote Administration Tool, except this time to hack a
targeted computer, the hacker will, create through his client.exe or by hand, a logger of
strikes that it will later also send to the victim, it will launch the keylogger and it will be added
a key in the registry to start later.
See on Kaspersky's website the exact definition:
Keylogger or keylogger what is it?
Botnets (network of zombie computers):
A formidable army of zombie PCs, which will allow the hacker to hack a computer,
but not just one, hundreds, even thousands, once the computers are in control like a
Remote Administration Tool, (except that a botnet runs rather on a dedicated server), it can put
K.O a website or a target for a long time thanks to the DDOS / SYN attacks that he will launch
thanks to infected computers!
Definition of Botnet
Exploits / Security breaches:
Unfortunately, security flaws are found in some software or applications,
of type Backdoor for example, it will be able to allow the Hacker to inject a file, an .exe by
example to send his Remote Administration Tool and take control of the target later,
that's why you have to constantly update your Windows / OS,
as well as its software and applications.
What is an Exploit?
With these few basic techniques, you know how to make a hacker to hack a computer,
be sure to update your applications, operating system, do not search for software
cracked, very often it's the open door so you can even be a victim!
We strongly recommend that you read our article to protect yourself as much as posibble
please read over articals part
How to Hack a Computer:
How to hack a computer or how to hack a PC,
questions that often come to mind we, computer enthusiasts ...
Before we begin, let's make things clear, this article will aim for
educations and will not incite you to any case to commit crimes / crimes, if we publish this article,
it's only for prevention purposes so you can be aware of the techniques
basic hackers and to guard against them.
There are several tools / flaws so that hackers come to their goal, we will
explain the most common techniques ...
Before you start reading the full article, be sure to read our articles:
Hack a Wifi connection
Hack a webcam
Hack an email address
Hacking a VPS server
To hack a Facebook account
Hacking an internet site
Hacking security cameras
Hacking a Windows session
And hack a cell phone.
Techniques using Hacking software:
Remote Access Trojan - Remote Administration Tool:
RAT'S (not rodents), RATs (Remote Access Trojans), are tools widely used by
newbies (beginners) who only seek to penetrate a few victims, thanks to its Administration Tool
remotely, it will create a file SERVER.exe that will send to its victim (which will be previously detected
by the basic anti-virus, we will come for the undetection thereafter ...).
Thanks to the control panel (Client.exe), it will be able to take control of the targeted computer, on which
the victim has launched the application (server.exe), it will install on his computer, adding a
registry key that will allow it to start each time the computer will be launched.
The Pirate will be able to have fun with his victim, recover his passwords, consult his webcam, listen
his microphone and many other functions ...
An example of a tool that allows this use, which basically was not planned for this (DarkComet):
Darkcomet RAT
Look at the screenshots we put on our DarkCometRAT page.
Malekal will explain in more detail how the Administration Tools works at Distances:
What is a RAT or TROJAN?
Keyloggers:
It's a bit like Remote Administration Tool, except this time to hack a
targeted computer, the hacker will, create through his client.exe or by hand, a logger of
strikes that it will later also send to the victim, it will launch the keylogger and it will be added
a key in the registry to start later.
See on Kaspersky's website the exact definition:
Keylogger or keylogger what is it?
Botnets (network of zombie computers):
A formidable army of zombie PCs, which will allow the hacker to hack a computer,
but not just one, hundreds, even thousands, once the computers are in control like a
Remote Administration Tool, (except that a botnet runs rather on a dedicated server), it can put
K.O a website or a target for a long time thanks to the DDOS / SYN attacks that he will launch
thanks to infected computers!
Definition of Botnet
Exploits / Security breaches:
Unfortunately, security flaws are found in some software or applications,
of type Backdoor for example, it will be able to allow the Hacker to inject a file, an .exe by
example to send his Remote Administration Tool and take control of the target later,
that's why you have to constantly update your Windows / OS,
as well as its software and applications.
What is an Exploit?
With these few basic techniques, you know how to make a hacker to hack a computer,
be sure to update your applications, operating system, do not search for software
cracked, very often it's the open door so you can even be a victim!
We strongly recommend that you read our article to protect yourself as much as posibble
please read over articals part
THE BASIC TECHNIQUES OF THE HACKERS
Reviewed by It will contain everything
on
September 20, 2019
Rating:
No comments: