How to Attack an Hacker who compromised your system ?
This topic is a little bit different in the last 96 posts I taught you how to hack and today I will teach you how to hack a Hacker.
In this post I will teach you how can you reversely hack a hacker who executed a backdoor/torjan virus in your system.
Before you go any further you should be familiar with what wireshark does and how to use it just basics can help you alot and still if you don't know the (Hello Dear No Fear Zakir is Here :P Just Email me and I will tell you How to use and what it does). And for all those who know Hurrah !!Continue
Requirement:
WireShark (Its Download Link is Included in one of my post)-(Already Installed in Kali Linux)
Well for a torjan virus you need a email or an ftp server to have the credential data (login info) or keystrokes or screenshots Sent so the first step is to know the ftp server address or email and one important thing is that when a hacker creates a torjan virus he need to input both email/ftp address and password now how do we get these information.
Here's How
1. Run WireShark and start capturing packets for atleast 30mins for best results
2. Now after capturing data. Filter them by FTP(ftp server) once and SMTP(email server) once if you find any ftp server username and password then you caught him you can take any action you want against him if you know basic hacking and if you dont know simply be a hacker :P (Being a hacker is the best thing for keeping hackers from your system) Just Kidding well if you find an email with its password you can simply open his email and explore more social networks with his email and password.
Okay One more thing professional hackers will never leave trace of them behind these hacking used email or ftp servers. So once you make sure that there is no traces of a real person make sure you be careful next time while downloading files and installing them.
Have a Good Day :)
-Admin (Zakir)
In this post I will teach you how can you reversely hack a hacker who executed a backdoor/torjan virus in your system.
Before you go any further you should be familiar with what wireshark does and how to use it just basics can help you alot and still if you don't know the (Hello Dear No Fear Zakir is Here :P Just Email me and I will tell you How to use and what it does). And for all those who know Hurrah !!Continue
Requirement:
WireShark (Its Download Link is Included in one of my post)-(Already Installed in Kali Linux)
Well for a torjan virus you need a email or an ftp server to have the credential data (login info) or keystrokes or screenshots Sent so the first step is to know the ftp server address or email and one important thing is that when a hacker creates a torjan virus he need to input both email/ftp address and password now how do we get these information.
Here's How
1. Run WireShark and start capturing packets for atleast 30mins for best results
2. Now after capturing data. Filter them by FTP(ftp server) once and SMTP(email server) once if you find any ftp server username and password then you caught him you can take any action you want against him if you know basic hacking and if you dont know simply be a hacker :P (Being a hacker is the best thing for keeping hackers from your system) Just Kidding well if you find an email with its password you can simply open his email and explore more social networks with his email and password.
Okay One more thing professional hackers will never leave trace of them behind these hacking used email or ftp servers. So once you make sure that there is no traces of a real person make sure you be careful next time while downloading files and installing them.
Have a Good Day :)
-Admin (Zakir)