What is a keylogger? Vocabulary for Hackers (Part 2)

https://youtu.be/7nF2BAfWUEg?t=30m8s

This is part two of the basic terms you will need to follow this course. Find part 1 here.

SQL injections which simply pass SQL inquiries to http requests if they are not properly formatted by the ttp code, this could present a serious problem this is always one of the primary considerations of all of the web developers out there. There are a large amounts of websites are vulnerable because the frameworks on which they are based are vulnerable as well.

Virtual private networks (VPNs) are ways of anonymizing yourselves if you have a VPN provider somewhere and if you want to anonymize yourself you will want to VPN  provider will be encrypted. Any other server that will be receiving information from you is actually receiving them from VPN. There is no real way of detecting you or finding your physical location unless the physical provider actually gives your VPN up which doesn’t happen unless you pick the right own.

Proxies are a less reliable way of staying anonymous but you should always make if your common practice to use proxies. I will explain this more when we discus proxy chains and how you can actually while conducting these activities.

You will realize that you can route your activities through several proxies, but very soon you will see as well that it doesn’t always work. In the movies, you see people going through several different proxies, in reality, that would be very difficult to implement because of internet speeds and bandwidth. Most of the free proxies out there are not very fast add routing your connection through several of them will make it very difficult for you to do anything in a reasonable amount of time. There are paid proxies, but when you pay a proxy somewhere so you can be traced.

Tor is much faster than proxies, but slower than VPNs. It gives you an opportunity to Torrify your applications which means routing traffic through certain routes and using certain routers on the internet for your packets for your connections to go through It can be slow from time to time, it’s not a 100% guarantee, but you will be are using Tor. There are ways of detecting you but they are not likely to happen. Like 99% of the time you will be anonymous which is a good way of functioning. You also have the tour browser or hidden web. They are hidden websites and not They cannot be accessed by a regular internet browsing perspective.

If you open Firefox and you don’t have your internet to connect to a network you will not be able to access any of the hidden webs or dark websites. I will also free some of them paid.

VPS (virtual private servers) it can on a physical machine. You can have a virtual machine within a physical machine which will serve as an SQL server for an Apache server. This is done so an SQL server cannot be from outside and so you cannot only devices and programs and users from that machine will be able to access the virtual machine where the SQL server is.

Keyloggers are tools that are used to steal credentials and also used to extract information. If you manage to record all key. Today Keyloggers have 100 options full list of and you can do whatever you want with them. They have the basic functionality there to record the key strokes, but not only did they record the keystrokes, they extract additional keystrokes as well. You can configure their behavior and how the stealth level of the keylogger. Where will it hide? What kind of information do you want to extract? Do you want to monitor for a particular activity? Do you want to record it? You can configure them to take screen shots. You can configure them to use the camera on the divide which you have deployed the camera to take a picture every 5 minutes. Later we will download the keylogger, install it, deploy it, and methods of deployment and how you can configure it as well. You should be careful on where you can download your tools. You never want to download an uncompelled binary file that is not open source because you have no way of knowing what’s in it and you never want to run it on your computer. Your computer might get infected with exactly the same keylogger or with exactly the same wrath that you intend to deploy somewhere. You should use verified sources of such tools I will share with you later on as I go over to the internet and download them, but I’m just making it very clear here that you should be careful with them.

Terminal is an interface for you that allows you to control your operating system. Linux terminal is very powerful, we will be using it extensively and you will need to familiarize yourself with it. I will familiarize you with it. I will teach you how to use it. It might seem a bit difficult at first sight. There a lot of command codes to check in and memorize them all but there is a logic to it and everything just flies. I know by heart about 30% of possible commands out there regarding commands by – A or –help. The system tells you everything you need to know. It helps you out to a great extent from just learning the basics of how it works. The reason to use terminal instead of GUI tools is because they are not nearly as powerful as the terminal tools are. Plus terminal tools have far less dependencies and most of the tools don’t have GUIs. A lot of them do have them these days but I might go over them briefly the terminal. You will automatically by default know how to use it.

Firewalls in Linux is configures to IP table commands. You can bump passing arguments in configuring these firewalls. This is the main reason why we will not be using any distribution of windows for this particular tutorial to follow this tutorial. You will need to install a Linux machine. Firewalls are one of the main reasons we can’t and it has ridiculous amount of options. I’m not kidding here. You can do with it whatever you want. You can close forward connections via ports or IP connections You can forbid certain protocols for certain IP addresses. This is all available for free. In windows you will have some of these options, but most of them you won’t unless you buy a certain package or something.

There is a way to circumvent this and the firewall rules in the firewall directly and thereby making the changes permanent. I don’t generally prefer it and it will configure a firewall and a default. This is primarily because you won’t have your tool set and a USB stick and you have these quick scripts that you generate and they perform these tasks for you in an automated fashion. I will show you how to make these scripts. You don’t need advanced programming language. These scripts are lists of Linux terminal commands which we will do anyway.

Reverse Shells – There are hundreds or thousands of reverse shells you can use I will pick a few we can use depending on the framework and the environment we use. In essence, reverse shells are programs with which you infect another device. That program then opens another connection from that device back to you. You can keep passing commands and controlling the system even though you are nowhere near it. With firewalls we do need to a lot of extra configuration and there are problems that need to be solved and addressed. You will see how when you are trying to break into a computer sometimes you need to break into the router first unless you’re performing these fishing tasks. Attacking a private device. One of the basic attacks would be to attack a home router, change the basic settings there and try to steal credentials in such a way so that the router is no longer effective for that device regardless. That can be some of the types of tax that you can do, but reverse shells can depend on the environment you are trying to infect and will depend on the choice of your attack route as well.

I hope you enjoyed this introduction to technical language and we will dive deeper examples and if you can stick in until the end of this course I guarantee you will understand it.

Get the full course for 87% off here