Sie sind auf Seite 1von 14

English Task | Mrs.

Linia Albaiti Magister of English

How To Hack A Website

Created by : Arief Aldika

How To Hack A Website 1


English Task | Mrs. Linia Albaiti Magister of English

Preface

Assalamu'alaikum wr. Wb

Praise to Allah SWT turning author, who has mercy, Taufik, as well as his

guidance, so I can complete your scientific work without a hitch.

Sholawat and hopefully always gushing greetings to the Prophet Muhammad who

we later - waiting for intercession in this world and in the hereafter.

Scientific paper is structured methods and literature on environmental and

resource - other sources. Thus, all parties are actively developing an idea - the idea of the

results of the study.

The author would like to thank:

1. Mrs. Linia Albaiti M.English as lecture of MK Bahasa Inggris at Poltek Harber.

2. Mom and Dad loved one at home who always gave support and prayers so that the

paper can be resolved.

3. All those who have helped in the preparation of this paper.

However, the authors recognize that scientific work is still far from perfection, the

criticism and constructive suggestions for improvement so the authors expect this

scientific paper.

The authors hope that this paper can be useful for particular authors and readers in

general.

Wassalamu'alaikum wr.wb

How To Hack A Website 2


English Task | Mrs. Linia Albaiti Magister of English

Table of Contents

Title....................................................................................................................................1
Preface...............................................................................................................................2
Chapter 1............................................................................................................................4
Introduction........................................................................................................................4
1.1 Background and Issues.......................................................................................4
1.2 Purpose and Objective........................................................................................5
1.2.1. Purpose.............................................................................................................5
1.2.2 . Aim..................................................................................................................5
1.2.3. Subject..............................................................................................................6
Chapter 2............................................................................................................................7
Theorical Basic..................................................................................................................7
Chapter 3............................................................................................................................8
Discussion..........................................................................................................................8
3.1 General.....................................................................................................................8
3.2 Step by Step hack Website........................................................................................8
3.2.1. Step 1: Identify your target...............................................................................8
3.2.2. Step 2: Check for vulnerabilities...................................................................10
3.2.3. Step 3: Attack the website..............................................................................11
3.2.4. Step 4: If all else fails, DDoS.........................................................................12
Charper 4.........................................................................................................................13
Conclusion........................................................................................................................13
Suggestion........................................................................................................................13
Bibliography.....................................................................................................................14

How To Hack A Website 3


English Task | Mrs. Linia Albaiti Magister of English

Chapter 1

Introduction

1.1 Background and Issues

The need and use of information technology applied to the Internet in all areas such as

e-banking, e-commerce, e-government, e-education and many more have become

commonplace. Even if the people especially those living in big cities do not untouchability

with issues of information technology can be considered retarded or "clueless". The Internet

has created a new world called cyberspace is a computer-based communications world that

offers a new form of virtual reality (indirect and not real).

The development of the Internet is constantly increasing both the technology and its

use, bringing a lot of both positive and negative impacts. Of course they are positive we

should be grateful because a lot of benefits and convenience gained from this technology, for

example, we can perform banking transactions at any time by e-banking, e-commerce also

makes us easy to make a purchase or sale of goods without knowing the place.

Searching for references or information about science is not a difficult thing with the e-

library and many more convenience gained with the development of the Internet. Of course, it

is undeniable that the Internet technology brings negative impacts that did not lose much with

the existing benefits.

Internet makes the original crime as is conventional or threats, theft and fraud can now

be done using computer media online with a risk of getting caught is very small by

How To Hack A Website 4


English Task | Mrs. Linia Albaiti Magister of English

individuals or groups with the consequent greater loss for both people and the State in

addition to causing the evils new. Many negative impacts that arise and grow, making a

paradigm that no computer is safe except buried in the ground 100 meters and did not have

any relationship

In the virtual world (internet), the security issue is one thing that is needed. Because

without security could have the data and systems that exist on the internet could be stolen by

others. Often an Internet-based network system has flaws or often called a security hole

(hole). Well, if the hole is not closed, a thief can enter from the hole. Theft of data and

systems from the internet is now often the case. The case was entered in the case of computer

crime. The term in the English language : Cybercrime.

1.2 Purpose and Objective

1.2.1. Purpose

Knowing how to hack the website and use it wisely . So that later can be developed for

the needs of a positive and beneficial .

Not abusing hack science for its own sake . And makes us more knowledgeable in the

science of information technology.

1.2.2 . Aim

The purpose of this paper is made including :

Meet one task subjects English Lesson to Make Scientific Write.

Explain how to hack some website.

How does it affect that will arise and how we resolved.

How To Hack A Website 5


English Task | Mrs. Linia Albaiti Magister of English

1.2.3. Subject

In this article we will explain how to hack websites, and use them wisely.

Provides insight to the reader to understand more about the world of informatics, because

not all people know about it.

How To Hack A Website 6


English Task | Mrs. Linia Albaiti Magister of English

Chapter 2

Theorical Basic

The term Hacker emerged in the early 1960s among members of student organizations

Tech Model Railroad Club at the Artificial Intelligence Laboratory of the Massachusetts Institute

of Technology (MIT). The student group is one of the pioneering development of computer

technology and they operate with a number of mainframe computers.

The word hacker first appeared with a positive sense to refer to a member who has

expertise in the field of computers and computer programs which are able to make better than that

has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an

obsession to understand and master the computer system. Because, in the year for the first time the

FBI arrested a group of computer criminals 414s based in Milwaukee USA. 414 is their local area

code.

The group then called hackers are convicted of burglary 60 computers, from computers

owned by Cancer Center Memorial Sloan-Kettering to a computer owned by Los Alamos National

Laboratory. One of the perpetrators enjoy immunity because TESTIMONIALS, while five other

players get probation.

How To Hack A Website 7


English Task | Mrs. Linia Albaiti Magister of English

Chapter 3

Discussion

3.1 General

In the general public , the term hacker is widely used by mistake or confused by the

term cracker . Especially when the discussion leads to evil . Where the term for criminals that they

really mean is Cracker . Hacker is regarded as the person most responsible for the crimes that

computer.

Yet if we look at what exactly the term and what is being done by hackers , the

assumption is not always true . There are several types of computer technology enthusiast like this

are as follows: ( Hacker , Cracker , Defacer , Carder , frauder , spammers ) .

The activists have held frequent meetings Event World Hacker ie Def Con . Def Con

event to event is more exchange of information and technology related to hacking activities which

become widespread in many countries united in a community that is called by ANONYMOUS

3.2 Step by Step hack Website

In this scope we try to learn how to hack a website using tool wizard. And make it easy to

try this at home. But not to be rude, don’t forget the cyber law.

3.2.1. Step 1: Identify your target

While Anonymous and other online hacktivists may choose their targets in order to

protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their

first hack, the best thing to do is to identify a any website which has a vulnerability.

How To Hack A Website 8


English Task | Mrs. Linia Albaiti Magister of English

Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack.

How did he/she identify these websites? Well, the key to creating a list of websites which are

likely to be more open to attack, is to carry out a search for what is called a Google Dork.

Google Dorking, also known as Google Hacking, enables you find sensitive data or

evidence of vulnerabilities by querying a search engine like Google or Bing. It basically allows

you to enter a search term into Google and find websites which may have these vulnerabilities

somewhere on the site.

Don't worry about needing technical expertise to know what to look for. Kind-hearted hackers

have produced lists of these Google Dorks, neatly categorised into the type of vulnerability you are

looking for. Looking for files containing passwords? There's got a Dork for that. Login

credentials? There's a Dork for that.

For example, if you are looking for files stored on websites containing passwords, then a

sample search query we found openly listed on one indexing site was: intitle:"Index of"

master.passwd. This returns the results shown in the screengrab above.

So now you have a list of potential victims. Next you need to narrow this down even further.

How To Hack A Website 9


English Task | Mrs. Linia Albaiti Magister of English

3.2.2. Step 2: Check for vulnerabilities

Having a huge number of sites which may or may not be vulnerable is not much use

unless you can pinpoint one which is actually open to attack. This is when a programme called a

vulnerability scanner comes into its own and the most popular is called Acunetix.

Acunetix, developed by a UK-based company, was designed, and is still used, as a tool

for web developers to test sites they are building. However the hacking community has

commandeered the tool and uses it to identify existing vulnerable sites.

You can download a trial version of the software for free from the official Acunetix

website or if you venture into the murky depths of a hacker forum and search for Acunetix, you

can find cracked versions of the full application freely available.

Acunetix, as you can see from the screen shots above, is a simple, straight-forward

Windows application and all you need to do is enter the URL of the site you want to target, and

press Process. Acunetix will scan the entire website, including all pages associated with it, and

return a list of vulnerabilities it finds. If you find the type you are looking for, you will need to

move onto Step 3, as Acunetix does not perform any website penetration.

How To Hack A Website 10


English Task | Mrs. Linia Albaiti Magister of English

3.2.3. Step 3: Attack the website

Attacking a website is done by two main methods. The first is by carrying out a

Distributed Denial of Service (DDoS) attack which overwhelms a website's servers and forces it to

shut down. We will deal with this type of attack later, but first we will look at how you can hack

into an account and steal some information contained within databases on the site.

This type of attack is known as a SQL (pronounced sequel) Injection. A SQL

Injection attack aims to capture information stored in a database on the particular website by

introducing some SQL code. SQL is a programming language designed for managing data in a

database.

But fear not, you won't need to understand a single line of SQL to carry out this attack.

Thankfully another freely-available and easy-to-use application, originally developed in Iran, can

be downloaded from the web saving you the trouble of dealing with any complex code.

The program is called Havij, the Farsi word for carrot, which is also a slang word for

penis and so, unsurprisingly, this is the piece of software required to penetrate a website.

How To Hack A Website 11


English Task | Mrs. Linia Albaiti Magister of English

Again there are free and paid-for versions of Havij available with the paid-for version

having more powerful capabilities. Again the world of hacker forums is your friend here and

cracked versions of the full Havij application are available if you look for them.

The Havij interface is once again like any other Windows program and all a virgin hacker

needs to do is simply copy-and-paste the address of their target website and press a button.

Havij allows you to perform a number of different types of operation including one called

a Get, which unsurprisingly gets all the information stored on databases on that particular site

which can be usernames, passwords, addresses, email addresses, phone numbers and bank details.

And that's it, within minutes you can search for, download and use a couple of automated

tools which will allow you to access websites which are vulnerable to this type of attack. While

most high profile companies' websites will be protected from this type of attack, the fact that

Sony's website and the personal information of its customers was stolen in a manner similar to

this, shows just how vulnerable the web is.

3.2.4. Step 4: If all else fails, DDoS

Hacktivist collective Anonymous changed their tactics in the last 12 months moving away

from DDoS as their primary tool for attacking websites, preferring if possible to use SQL Injection

instead. However, when this is not possible, they will revert to DDoS attacks, and you can to, with

the help of another freely available tool.

And it turns out that DDoSing a website is no more difficult than carrying out a SQL

Injection. The programme used is called Low-Orbit Ion Canon (LOIC) which was developed for

web designers to stress test websites, but has been high-jacked by hackers in order to attack

websites.

How To Hack A Website 12


English Task | Mrs. Linia Albaiti Magister of English

Charper 4

Conclusion

The world of internet is very broad , and therefore we have much to

learn and continue to explore new knowledge . Hack a website is just a small

part of hacking techniques in the world of informatics . And there are many

other techniques.

As we understand hacking techniques on the website, we can use

this knowledge for the benefit of wise and do not misuse because cyber law

still applies to the world of informatics .

Keep learning and looking for a new science . Never give up. For who earnestly

then he succeeded . Hopefully this article useful to the reader . A few of us ,

sorry if there is any writing or words.

thanks.

Suggestion

The paper is still far from perfection , so criticism and suggestions

from readers are we expected , so I can be better.

How To Hack A Website 13


English Task | Mrs. Linia Albaiti Magister of English

Bibliography

http://majid36.blogspot.co.id/ hacking the website


http://www.ibtimes.co.uk/ hacking for fun
http://irkham.web.ugm.ac.id/ Sejarah hacker

How To Hack A Website 14

Das könnte Ihnen auch gefallen