Beruflich Dokumente
Kultur Dokumente
Preface
Assalamu'alaikum wr. Wb
Praise to Allah SWT turning author, who has mercy, Taufik, as well as his
Sholawat and hopefully always gushing greetings to the Prophet Muhammad who
resource - other sources. Thus, all parties are actively developing an idea - the idea of the
2. Mom and Dad loved one at home who always gave support and prayers so that the
However, the authors recognize that scientific work is still far from perfection, the
criticism and constructive suggestions for improvement so the authors expect this
scientific paper.
The authors hope that this paper can be useful for particular authors and readers in
general.
Wassalamu'alaikum wr.wb
Table of Contents
Title....................................................................................................................................1
Preface...............................................................................................................................2
Chapter 1............................................................................................................................4
Introduction........................................................................................................................4
1.1 Background and Issues.......................................................................................4
1.2 Purpose and Objective........................................................................................5
1.2.1. Purpose.............................................................................................................5
1.2.2 . Aim..................................................................................................................5
1.2.3. Subject..............................................................................................................6
Chapter 2............................................................................................................................7
Theorical Basic..................................................................................................................7
Chapter 3............................................................................................................................8
Discussion..........................................................................................................................8
3.1 General.....................................................................................................................8
3.2 Step by Step hack Website........................................................................................8
3.2.1. Step 1: Identify your target...............................................................................8
3.2.2. Step 2: Check for vulnerabilities...................................................................10
3.2.3. Step 3: Attack the website..............................................................................11
3.2.4. Step 4: If all else fails, DDoS.........................................................................12
Charper 4.........................................................................................................................13
Conclusion........................................................................................................................13
Suggestion........................................................................................................................13
Bibliography.....................................................................................................................14
Chapter 1
Introduction
The need and use of information technology applied to the Internet in all areas such as
commonplace. Even if the people especially those living in big cities do not untouchability
with issues of information technology can be considered retarded or "clueless". The Internet
has created a new world called cyberspace is a computer-based communications world that
The development of the Internet is constantly increasing both the technology and its
use, bringing a lot of both positive and negative impacts. Of course they are positive we
should be grateful because a lot of benefits and convenience gained from this technology, for
example, we can perform banking transactions at any time by e-banking, e-commerce also
makes us easy to make a purchase or sale of goods without knowing the place.
Searching for references or information about science is not a difficult thing with the e-
library and many more convenience gained with the development of the Internet. Of course, it
is undeniable that the Internet technology brings negative impacts that did not lose much with
Internet makes the original crime as is conventional or threats, theft and fraud can now
be done using computer media online with a risk of getting caught is very small by
individuals or groups with the consequent greater loss for both people and the State in
addition to causing the evils new. Many negative impacts that arise and grow, making a
paradigm that no computer is safe except buried in the ground 100 meters and did not have
any relationship
In the virtual world (internet), the security issue is one thing that is needed. Because
without security could have the data and systems that exist on the internet could be stolen by
others. Often an Internet-based network system has flaws or often called a security hole
(hole). Well, if the hole is not closed, a thief can enter from the hole. Theft of data and
systems from the internet is now often the case. The case was entered in the case of computer
1.2.1. Purpose
Knowing how to hack the website and use it wisely . So that later can be developed for
Not abusing hack science for its own sake . And makes us more knowledgeable in the
1.2.2 . Aim
1.2.3. Subject
In this article we will explain how to hack websites, and use them wisely.
Provides insight to the reader to understand more about the world of informatics, because
Chapter 2
Theorical Basic
The term Hacker emerged in the early 1960s among members of student organizations
Tech Model Railroad Club at the Artificial Intelligence Laboratory of the Massachusetts Institute
of Technology (MIT). The student group is one of the pioneering development of computer
The word hacker first appeared with a positive sense to refer to a member who has
expertise in the field of computers and computer programs which are able to make better than that
has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an
obsession to understand and master the computer system. Because, in the year for the first time the
FBI arrested a group of computer criminals 414s based in Milwaukee USA. 414 is their local area
code.
The group then called hackers are convicted of burglary 60 computers, from computers
owned by Cancer Center Memorial Sloan-Kettering to a computer owned by Los Alamos National
Laboratory. One of the perpetrators enjoy immunity because TESTIMONIALS, while five other
Chapter 3
Discussion
3.1 General
In the general public , the term hacker is widely used by mistake or confused by the
term cracker . Especially when the discussion leads to evil . Where the term for criminals that they
really mean is Cracker . Hacker is regarded as the person most responsible for the crimes that
computer.
Yet if we look at what exactly the term and what is being done by hackers , the
assumption is not always true . There are several types of computer technology enthusiast like this
The activists have held frequent meetings Event World Hacker ie Def Con . Def Con
event to event is more exchange of information and technology related to hacking activities which
In this scope we try to learn how to hack a website using tool wizard. And make it easy to
try this at home. But not to be rude, don’t forget the cyber law.
While Anonymous and other online hacktivists may choose their targets in order to
protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their
first hack, the best thing to do is to identify a any website which has a vulnerability.
Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack.
How did he/she identify these websites? Well, the key to creating a list of websites which are
likely to be more open to attack, is to carry out a search for what is called a Google Dork.
Google Dorking, also known as Google Hacking, enables you find sensitive data or
evidence of vulnerabilities by querying a search engine like Google or Bing. It basically allows
you to enter a search term into Google and find websites which may have these vulnerabilities
Don't worry about needing technical expertise to know what to look for. Kind-hearted hackers
have produced lists of these Google Dorks, neatly categorised into the type of vulnerability you are
looking for. Looking for files containing passwords? There's got a Dork for that. Login
For example, if you are looking for files stored on websites containing passwords, then a
sample search query we found openly listed on one indexing site was: intitle:"Index of"
So now you have a list of potential victims. Next you need to narrow this down even further.
Having a huge number of sites which may or may not be vulnerable is not much use
unless you can pinpoint one which is actually open to attack. This is when a programme called a
vulnerability scanner comes into its own and the most popular is called Acunetix.
Acunetix, developed by a UK-based company, was designed, and is still used, as a tool
for web developers to test sites they are building. However the hacking community has
You can download a trial version of the software for free from the official Acunetix
website or if you venture into the murky depths of a hacker forum and search for Acunetix, you
Acunetix, as you can see from the screen shots above, is a simple, straight-forward
Windows application and all you need to do is enter the URL of the site you want to target, and
press Process. Acunetix will scan the entire website, including all pages associated with it, and
return a list of vulnerabilities it finds. If you find the type you are looking for, you will need to
move onto Step 3, as Acunetix does not perform any website penetration.
Attacking a website is done by two main methods. The first is by carrying out a
Distributed Denial of Service (DDoS) attack which overwhelms a website's servers and forces it to
shut down. We will deal with this type of attack later, but first we will look at how you can hack
into an account and steal some information contained within databases on the site.
Injection attack aims to capture information stored in a database on the particular website by
introducing some SQL code. SQL is a programming language designed for managing data in a
database.
But fear not, you won't need to understand a single line of SQL to carry out this attack.
Thankfully another freely-available and easy-to-use application, originally developed in Iran, can
be downloaded from the web saving you the trouble of dealing with any complex code.
The program is called Havij, the Farsi word for carrot, which is also a slang word for
penis and so, unsurprisingly, this is the piece of software required to penetrate a website.
Again there are free and paid-for versions of Havij available with the paid-for version
having more powerful capabilities. Again the world of hacker forums is your friend here and
cracked versions of the full Havij application are available if you look for them.
The Havij interface is once again like any other Windows program and all a virgin hacker
needs to do is simply copy-and-paste the address of their target website and press a button.
Havij allows you to perform a number of different types of operation including one called
a Get, which unsurprisingly gets all the information stored on databases on that particular site
which can be usernames, passwords, addresses, email addresses, phone numbers and bank details.
And that's it, within minutes you can search for, download and use a couple of automated
tools which will allow you to access websites which are vulnerable to this type of attack. While
most high profile companies' websites will be protected from this type of attack, the fact that
Sony's website and the personal information of its customers was stolen in a manner similar to
Hacktivist collective Anonymous changed their tactics in the last 12 months moving away
from DDoS as their primary tool for attacking websites, preferring if possible to use SQL Injection
instead. However, when this is not possible, they will revert to DDoS attacks, and you can to, with
And it turns out that DDoSing a website is no more difficult than carrying out a SQL
Injection. The programme used is called Low-Orbit Ion Canon (LOIC) which was developed for
web designers to stress test websites, but has been high-jacked by hackers in order to attack
websites.
Charper 4
Conclusion
learn and continue to explore new knowledge . Hack a website is just a small
part of hacking techniques in the world of informatics . And there are many
other techniques.
this knowledge for the benefit of wise and do not misuse because cyber law
Keep learning and looking for a new science . Never give up. For who earnestly
thanks.
Suggestion
Bibliography