------------------------------- HACK IN: EPISODE ONE #Brought to you by X-N2O #ledio777 at gmail dot com #http://x-n2o.blogspot.com ### #Description: This article explains how to hack properly, and not getting caught. ##Requirements: *Average knowledge of C *Average knowledge of WINAPI ##Disclaimer: I do not hold responsibility how the code included in the article is used or what are the methods explained here used for. ------------------------------- Hi everyone. I'm known on the internet as X-N2O. The goal of this article is to explain the reader how to successfuly Social Engineer, penetrate in the victim's computer, and complete your objective. The target and objective is up to you. Of course this article will include examples. Let's start with the target. Once you pick your target, the first step is ALWAYS analyzing. Target will be John, and the objective will be to copy an important file from his PC to yours. First of all, you need to find a way to contact him, so you google for "John Smith @". It'll maybe give you the email address in an instant, or you've got to search for it. Here are some ways to get information on the target: 1. Reverse lookup Reverse lookup gets you amazing results if used correctly. For example, say you got his email address from google. Now you google the email address you found. This is reverse lookup. Open up your favorite editor and start writing the info you find eventually. 2. Ask his friends If you cannot find ANY information on the net, the solution would probably be to ask one of his friends. Of course you don't reveal your real identity, but you got to think of every possible scenario. You should think how to get out of the situation if things go wrong, or how to change the topic if he asks you what do you need the information for. 3. Final solution If you cannot find anything about him from the friends or on the net, then there are two possibilities: The first one, and the one I recommend you to think, is that the target is very paranoid, and doesn't have his information on the net. The second one, is that the target does not frequent internet much, so you probably can't hack in through the internet. The solution to this would be to go at his place and SE. For example, tell him you are the ISP's workers, or something, and just download your ready made trojan/botnet (will discuss this later on). This would get you in real trouble if the target has a fair amount of how hackers operate, so you would need to be a group, to get out of the situation. For example, you cut his DSL line before 30 minutes, and then you go after 30 minutes and SE. Once you are in front of the PC, you send an SMS to your friend, and he fixes the line. You get internet access, download the trojan/botnet, and you tell him everything is alright. If you are not willing to go there physically, then completing the objective is not a high priority of yours. *NEVER* hack for fun. The final solution is the best, and most dangerous of all three, because one would trust somebody that is in front of him, rather than someone in the internet. Now, let's say you got the information, make a list, encrypt it (make an application in C to do so), and save it in the internet. Email a copy to your friend, who you trust, which is of course involved in this, while save the other copy in something like google docs. NOTE: It's not good to operate alone when it comes to hacking, it works sometimes, but there are situations, where you need your friend to help you. Here is an example of the list: //John's info.txt #Name: John Smith #Email: jsmith@gmail.com ##PW: - #MSN: jsmith@live.com ##PW: - #State: US, New York #OBJECTIVE STATUS: 01.12.2008: SE'd successfuly. 03.02.2009: Put trojan in victim's PC. 04.05.2009: File gotten, log file will be deleted COMPLETELY from the internet and the computer. (I keep logs encrypted in a CD or USB.) //END For now you have a small list, but eventually you will see how it will grow. REMEMBER: Never stop gathering information, until the objective is achieved. The second step is to put the trojan/keylogger in his PC. Here your tools get useful. You need to have: 1. A mailer with 'FROM: ' header manipulation which works with attachments. (Needs SMTP Protocol knowledge. You need to make your own, as I did: http://img220.imageshack.us/img220/5976/98863823zr7.png Do NOT use others tools for this, or you will not be considered a hacker, but a script kiddie, a stealer, a noob. 2. A binder, binding two files or more, preferably binding any file ext. Again you need to make your own, like this: http://bp3.blogger.com/_R2zb0CI8X2o/SCxrCkunthI/AAAAAAAAAA8/0Kc9OXa9hO8/s320/screenshot2.jpg If you don't know how to make them, go learn more C and winapi. There's not just the respect thingy for not using other's stuff. Most of the tools online aren't free and are detected. 3. A keylogger/trojan/specific app/remote shell Here you can choose one of the four (you must do EVERYTHING yourself), let's analyze them one by one: If you decide making a keylogger, it's one of the most basic things, just use GetAsyncKeyState() properly. But a keylogger isn't of use in a hacking operation like this, you can get the passwords, and there's a high chance that the file you are looking for is on the net, or that the victim has a ssh port opened. A trojan is what you are looking for here. Preferably one operating in a botnet, on irc. You get double advantage, because you get both the file and one more bot in your botnet. People are paying lots of money for botnets these days. With 'Specific app' I mean make a program that searches for the file (based on an algorithm or a name), upload the file to your FTP, and delete itself silently. THIS is both the easiest and the best solution for the current objective. But the trojan would be a wiser solution, in case the victim updates the file. And you also have him in control. The remote shell is just a basic thing, it can be easy made, but it has disadvantages, it needs a public IP, and it's detected by most antiviruses. That's enough for an easy operation like this (compared to other objectives that you may have). Now comes the procedure. If you want to act physically it is explained in Getting information: 3.Final solution. Now, say you got a lot of info about him. Analyze the list, if you got the email of someone of his family, like for example his fathers email, do the following: Get the keylogger/trojan/SA/remote shell, and bind it with a picture, for example named Summer Camp 2009.jpg with the binder. If your binder has icon changing abilities, change the icon to the JPG's default one. Next, compile an email saying: "Hey John, can you please check this Summer Camp and tell me if you are interested about it when I come home?" Paste the email test in the mailer, set the 'FROM: ' header the same as his father's email, and attach the binded file. Maybe put it in a .zip before attaching. Send the email, and wait for the result in IRC, or your trojan's client. Of course you could make another story based on the victim's age. When you make the mailer, make it use a proxy. Well, this is all for now. I'll make sure to add more in Episode two. Thank you for reading. X-N2O Visit X-N2O Productions: http://x-n2o.blogspot.com