Sunday 29 May 2016

TOP HACKING SOFTWARE TO START HACKING



In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground.

There is a longstanding controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that it refers simply to someone with an advanced understanding of computers and computer networks, and that cracker is the more appropriate term for those who break into computers, whether computer criminal (black hats) or computer security expert (white hats) - but a recent article concluded that: "...the black-hat meaning still prevails among the general public

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

The subculture around such hackers is termed network hacker subculture, hacker scene or computer underground. It initially developed in the context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated with 2600: The Hacker Quarterly and the alt.2600 newsgroup.

In 1980, an article in the August issue of Psychology Today (with commentary by Philip Zimbardo) used the term "hacker" in its title: "The Hacker Papers". It was an excerpt from a Stanford Bulletin Board discussion on the addictive nature of computer use. In the 1982 film Tron, Kevin Flynn (Jeff Bridges) describes his intentions to break into ENCOM's computer system, saying "I've been doing a little hacking here". CLU is the software he uses for this. By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon, but there was no public awareness about such activities. However, the release of the film WarGames that year, featuring a computer intrusion into NORAD, raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when, in the same year, a gang of teenage hackers in Milwaukee, Wisconsin, known as The 414s, broke into computer systems throughout the United States and Canada, including those of Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. The case quickly grew media attention, and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in Newsweek entitled "Beware: Hackers at play", with Patrick's photograph on the cover. The Newsweek article appears to be the first use of the word hacker by the mainstream media in the pejorative sense.

Everyone can not become programmer to Learn hacking.There are few ready made hacking software's in market to use and start your journey towards hacking.There are lot of hacking software's but we will discuss latest and free one's.Here we go

What to use :

Mostly people try to find hacking related software's for windows.There are couple of software which work on windows like n map,key loggers etc but they do not provide professionalism.To use free and full version software's we have to move towards Linux as it is more secure and provides you more functionalities.

Which Linux version to use :

You can start hacking with any Linux operating system but why not to choose a OS which has builtin functionalities you need.

Kali linux :

Yes it is the first thing and last thing you will need to start hacking.It has builtin programs so you do not need to download them manually.You can find tons of tutorials on youtube and kali.org for advance level hacking.

How to use :

Well linux is not that much simple as we think.If you are expert then you can make dual boot with windows but if you are new then please buy 4-8 GB usb device and make live usb of kali linux and avoid any mishap to ruin your whole data stored on your pc.

Live usb :

Download kali linux iso from kali.org and download lili linux creator a small program to make live usb.Then follow instructions to mae live usb and enjoy.

Master yourself in command line interface :

To hack in linux you need to learn few commands and here i provide you link.Give them a try

Click here

Like and share if you find it helping.
Load disqus comments

1 comments: