Cyber Defender e Book
Cyber Defender e Book
Cyber Defender e Book
Alexis Lingad
i
Cyber Defender. Copyright 2016 by Alexis Lingad.
All rights reserved. No part of this work may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying, recording,
or by any information storage or retrieval system, without the prior written
permission of the copyright owner and the publisher.
Printed in Philippines
First printing
Cryptors, Inc.
B8 L8 San Marino Classic, Salawag, Dasmarinas, Cavite
Links: www.fb.com/cryptors; cryptors.officia@gmail.com; www.cryptors.org
Cryptors and the Cryptors logo are registered trademarks of Cryptors, Inc. Other
product and company names mentioned herein may be the trademarks of their
respective owners. Rather than use a trademark symbol with every occurrence of a
trademarked name, we are using the names only in an editorial fashion and to
the benefit of the trademark owner, with no intention of infringement of the
trademark.
ii
About the Author
iii
Warning!
The search for the TRUTH is not for the faint-hearted!
This book may destroy your traditional beliefs..
Review
-Mars Cacacho
Founder of HackTheNorth.PH
iv
Table of Contents
Foreword ix
Acknowledgments . xi
v
PART 4: Be-Do-Re Hacking 51
4.1 The Be-Do-Re Hacker 52
4.2 Be, the 80% of a Hacker 57
4.3 Do, the 15% of a Hacker 60
4.4 Re, the 5% of a Hacker 62
4.5 Finally 63
vi
7.4 Countermeasures 124
vii
viii
Foreword
-Meric Mara
CEO and CTO of 8layers Technologies, Director of Maralabs, The man
behind the KahelOS (The First Linux Distro in the Philippines)
_____________________________________________________________
ix
x
Acknowledgments
First of all, I would like to thank Jesus who gave me all of the
things I have now. I am very grateful that he gave me a chance to
spread the good news about cyber security and to make our cyber
world a more secure place.
xi
xii
001
Start the Revolution
________________________________________________________________
1
1.1 What is this Book?
2
How to think like a hacker?
This book will give you all the answers to those questions. Don't
worry if you don't know anything about technology because this
book is created for everyone. If you are already a professional
hacker then this book might be for you too. Why? Because
many of our professional hackers these days are not really a
true hacker. Many of them didn't think like a true hacker. They
depend too much in hacking tools which is not a way of a real
hacker. Fortunately, this is your chance to see if you are one of
those real hackers or not.
This book will train you to become one of the finest superhero
in the history. You will become a real hero, not like Superman,
Batman, Wonderwoman, or any superhero you know in your
childhood which is only fiction. You are reading this book for a
reason and it is not an accident. You are destined to become a
real cool hero of this society that can help many people.
This book will let you know the misconceptions that the
traditional arena gives about the hackers. This is for you to
know the truth about hackers. They say that the hackers are
evil, geniuses, and only for geeks, but they don't know that
there is a bigger revelation than that. A hacker can be
mysterious, sometimes but we will reveal the secrets that most
of them didn't want you to know.
3
This book will also tell you the step by step process of how real
hacking occurs. This is for you to be on the right path because
many of the professionals today want you to rely on the hacking
tools and any technical details but not with the thinking details:
the hacker's mindset which is a better computer and tool for
hacking. Many of our hackers today were misled and end up
being a script kiddie professionals. But no more worries, this
book will help you hack the way out of that wrong path.
This book will also teach you how to think exactly like a true
hacker. Knowing what's inside their mind can be a great
weapon to counter them. Additionally, it can be also a great
advantage for you to become a real hacker. This book will tell
you the exact phrases that a hacker always thinks.
Lastly, this book will tell you all of the things you need to start
your journey in ethical hacking right away. With the knowledge
you will gain in this book, you can activate the 80% hacker in
yourself. This book is very important, but this is just a major
start to begin your journey as a real hacker.
4
1.2 Why Teach Hacking?
5
that, they expect that the students will just build the huge
foundation of being ethical in hacking in just a snap of saying
those things which is not true. It takes time and a lot of effort to
train a student to think ethically in the certain field and that
type of training is included in what we are teaching interactively
in this book and in our seminars.
By teaching them hacking, they will learn how the digital world
6
works. The student will learn how to defend themselves in
cyberspace because depending too much on the ready-made
software like anti-viruses or firewalls are not enough. To make
this possible, they need to learn how bad hackers victimized
people and become smarter than the bad hackers by
developing the best countermeasures.
~ Things to Remember
7
002
Becoming a Superhero
_____________________________________________________
When I was 13 years old, I found out about this kind of power
(hacking), I explored it. I want to have that and use it to save
the world. I want to save the innocent people from the invisible
hand that controls us without us knowing. I want to start a
revolution that all of the people can have this kind of power to
defeat evil. But who am I? I am nothing. I cannot save the
people if the people themselves don't want to be saved.
___________________________________________________________
8
2.1 HACKING is the Modern-Day Super
Powers
9
There is one organization for profit (let's hide it in the name of
Evil Org) who stealthily controlling and changing the Facebook
page, Mapuan Files, to an advertiser page. You can still see
some stories and rants (some of them are scripted related to
their products) but most of the time there will be some post
about their products and some advertisements alone. Here it is
again, the invisible hand that controls the joy of the viewers of
this page. Taking an advantage to the people by this kind of
trick, the Mapuan Files from the freedom page is turning into a
profitable and corrupt page.
10
The modern-day generation doesn't seem to realize that a
hacker can do bigger things. They don't realize that hacking is
not just a skill, but a power. Imagine yourself being in control of
the digital world like adding zeros in your money in your online
bank account, changing your grades in your school server,
knowing what your partner say in their private messages in any
social media, taking some pictures of your crush using her web
cam all of it without the victim's consent. Of course, all of those
big attacks can be countered by hackers also. That's how
powerful a hacker is. They're playing like a demigod in the world
of cyberspace by being in control of any other devices. And like
the other heroes we know, they chose to use these powers to
help others. The saying about the Spider-Man movie comes into
this picture, With great power comes great responsibility.
11
Mapuan Files who humiliate someone like professors, students
or anyone that can come against them. They made it a trend by
not just using the 20,000+ audiences in Mapuan Files but also
on their Facebook pages, personal Facebook accounts and
websites just to make that person feel that they are fighting a
godlike organization. So I conducted my research and talked to
each victim, then I came up with a single conclusion. All of the
victims had a bad relationship with this Evil Org so in my point
of view, there is something fishy going on and I have to prove it
and make my best move.
12
2.2 Using the Power to Protect
A hacker can hack your pacemaker in your heart (if you have)
and kill you. They can hack the airplane you are riding, enabling
them to destroy it. They can break the electric grid to cause
power outages that can cause deaths of many patients in some
hospitals and much more. They can hack your car and fully
control it. Worse, they can control drones that can go to your
house and shoot you to death.
13
These things can be done by a Black Hat (bad hackers) and we
should know how to stop them. Why? You are not responsible to
save all of the people in this world, but I bet you won't take it to
see your loved ones suffer from these kinds of hacker attacks.
Therefore, make a move and do what you have to do. Go wash
your face, make sure you won't be sleepy and finish this book
because this book won't tell you how to use tools yet but will
focus on molding you to think like a hacker which is more
important. If you are a normal person who uses a tool you
cannot hack without tools, but if you think like a true smart
hacker, even if you don't have tools, you can hack like a pro.
14
In my college days at Mapua Institute of Technology, I created
an underground organization called Cryptors (a start-up
company now started in 2015). That organization, they say, is a
mysterious one. The members are hidden to the public; no one
knows who the mastermind is and who the officers are. The
only certainty in this group is that the masterminds are having a
gathering to train officers in the field of hacking. Those are
the things the campus only know about that organization so
many of them says that we're just an urban legend but here we
go, talking to you in this book to prove that I exist and Cryptors
existed in that campus as an underground organization.
15
Black Hats and also, to raise awareness regarding cyber
security starting at my school, next is this nation and then the
world, one step at a time. However, traditional people
misunderstood me; they say that I am creating monsters. That's
why they want to find my real identity to teach me some hard
lessons and that is to punish me. The reason? First, my
underground organization is literally underground. We meet like
an organized syndicate, we have a secret handshake, secret
hideouts, code names, and lastly, we are not an accredited
organization because I want to keep the darkness and
mysteriousness of the organization which makes it unique to all
of the other organizations in the campus. Lastly, they found my
cause as extremely evil, teaching the students to become
criminals they say.
They say that I create monsters. They don't know that all of us
have a monster within us. Someone who is ready to eat people
alive just to profit from their business selfishly, lie publicly to
steal money from the people, make a device that can kill a lot
of people just to make money, make a food that can slowly kill
people just to make a living, all of us have their own monsters,
own selfish interests, own secret dark sides and no one have
the rights to say that they don't have monsters inside them.
And what I'm doing that day is training them to become good
monsters before anyone like me turn them into an evil one. I
made them a monster that has a power to destroy everything
but will choose to become good for the betterment of humanity.
They will be monsters that can have a greater power and
strength to defeat those evil monsters.
Do you know Hulk? Hes a human that can change into a huge
green monster with great strength to smash all, even you in just
one hit. He is a monster, but trained to become a hero of
humanity. At first, people try to kill him because he is a
monster, but there are some people who believe in him that he
16
can be a good monster and become a benefit to humanity.
17
people and no more people who will play god. That will be the
rule in the new world I'll create inside the most popular
entertainment platform in our college where freedom reigns.
However, Irous, Carmelo and I plan this very well that it takes
months for us to finalize and execute the plan.
18
Irous, Carmelo and I talked about this event. Adrian Once and
Neyo Ibarra, the other co-founders of Cryptors also joined me in
thinking a plan. The other 9 officers of Cryptors (Emman,
Reggie, Gilbert, Kent, Claudette, Alyssa, Rufter, Karl, and Ace)
cheered me up in what's happening. I am so blessed that I
created this organization for I have this wonderful friend of
mine who will support me in times like this. Now, I can think of
a plan clearly.
They just used the Mapuan Files Facebook page's power for
personal gain. It's getting worse and I have to stop them as
soon as possible. However, something unexpected happened.
The Mapuan Files Facebook page acting as Anti-Cryptors just
posted a status about the plan of the Evil Org to make a new
19
world order like system in the campus where they are in control
of everything and one step of that is to buy the Mapuan Files
Facebook page. Another post is a picture about the Evil Org
founder's conversation with Anti-Cryptors Facebook page saying
like this, Hey, I have evidence that Lingad is the founder of
Cryptors but please don't put my org's name on Mapuan Files
page. Then the Anti-Cryptors answered, Show me that you
are not in the side of Lingad and the founder of Evil Org
replied, He is a liar and a loser. The founder of Evil Org is
acting as my friend in the campus since I was in 1 st year, but he
just showed you his true color in this thing.
20
2.5 Using the Power out of Curiosity
21
answers. Maybe this mystery man who controls these things is
leading me into something.
I can feel that Irous and Carmelo are very afraid of what will
happen to me if I hack back the Mapuan Files. I understand
them, since the very beginning of this organization they are
with me, together with Neyo and Adrian, to build something
that can make a difference in this world. Just one wrong move in
this situation, those things we've built so far will be useless.
Neyo called me to be careful and Adrian joined me to eat dinner
and talk about my plans. I am starting to feel uncomfortable
because they all treating me like this is my last day with them.
The third day, I started to hack the dummy account who claims
to be the Anti-Cryptors. I know this is kinda scary because I
don't know who is playing with me, but I started a brute-force
dictionary attack (A password attack that can find every
combination of words, numbers and symbols in your word list of
possible passwords). I was shocked, that in just a minute,
because of the simplicity of his password I gained access to his
account and the password is kinda scary, boobytrap (To those
who don't know what a booby trap is, it is a hidden bomb that
explodes when the object connected to it is touched or moved).
And it is true, he is the admin and the only administrator of the
hacked Mapuan Files Facebook page, no Evil Org.
22
said that the possible way that they will show that punishment
is through their social media accounts and pages and to their
website.
After that, I proceed with the plan we made for months. I won't
show you the whole idea of the plan yet, but I will reveal it,
soon in this chapter. The Mapuan Files community is asking the
Cryptors to hack it back already. Well, I just did it, but I will let
them know soon.
23
(The picture used in the operation with a great speech)
When the signal came from Irous, I posted the picture of mine
with a great speech in Mapuan Files Facebook page. We entitled
the post as Mapuan Files Retrieval Operation. The people of
Mapuan Files community were shocked because they thought
that hacking Facebook is impossible. The people thought they
were watching a real life hacking movie and they were so
amazed.
24
know called Anti-Cryptors.
However, I'm thinking on that day, How Evil Org will kick me
out in the picture?. Yes, we are expecting that Evil Org will
make a move to humiliate me and punish me like a god. That's
we are waiting for, we want to show it to the people how evil
they are. And as usual, they think that I took their bait, well,
yes, I took their bait to make my best move possible.
25
The plan is not yet over, we called Geff and asked him if he's
still an administrator of the page and he replied, Not anymore,
Evil Org just owned it, but he will make me an admin soon as a
show of respect of being the founder of this page. Then I told
him these things, Geff, we want to have screenshots of the
administrators on the page. We want to know who used the
Facebook page on humiliating people. We also want to remove
them as the administrator of that freedom page for it will not be
longer a freedom page if they are the admins. And by doing
that, you just made a difference, you made history. and Geff
replied, It's the founder of the Evil Org who posted things like
that to you. I'll make you an admin once I get access to it, but I
have nothing to do with these. Just act that you hack the page
again and I'm done. Gotcha! I didn't have to hack Geff's
Facebook account technically to have access to the page. That's
what you called reward social engineering. By telling him the
reward and by tickling his emotions, there is a huge possibility
that they will let you control them and you have to know that if
you are a hacker, you have to hack also a mind, not just
computers.
26
I know some of you is asking, Why you didn't just owned
Mapuan Files and never give it back to them?. When we
retrieved the Mapuan Files Facebook page, we gained
thousands of solid supporters in our goal. When Evil Org
humiliated me, those solid supporters saw how evil the org is.
Thousands of people were awakened to what is really going on
about the Evil Org. They start to spread the idea about that org.
They can destroy me, but not the idea.
The master plan is not finished. After I leave, Evil Org will be
comfortable and at ease in using the Mapuan Files Facebook
page. They didn't know that the real trick in our plan is to let
them use the page. Why? The idea is like a virus and it is
spreading around the campus- the idea that Evil Org is using
the power of that page to play like a god in the campus. After
this event, the humiliation and advertisement in the page
continues. We are just waiting now if who will push the button
to explode the bomb in the face of Evil Org.
27
in good terms, just use that power to help people who are in
need. Use the power for the benefit of the many. Use that
power to make a difference.
28
~ Things to Remember
29
003
Misconceptions About
Hackers
___________________________________________________________
30
3.1 All Hackers are Evil?
When the lunch came, we ate with the other soldiers and Sir
Joey introduced me as a hacker. When the soldiers heard the
word hacker they started staring at me for a second with
scary eyes. However, they started smiling after more or less 3
seconds and started asking me questions like, Do you hack
bank accounts? Deface websites of the government like
Anonymous? Are you an activist who hack for political
reasons?. That was one of the scariest time of my life being a
hacker- soldiers, who think hackers are mostly bad guys, asking
me about sensitive topics. Just one wrong move will get me
31
imprisoned.
Therefore, not all of the hackers are evil. Just to give you an
example, let's talk about Barnaby Jack. In Black Hat 2010
hacking conference, he showed how to reprogram some ATMs
to spit out cash by just using his laptop. By discovering this kind
of vulnerability, he worked with some ATM manufacturers to
make a software update and stronger safeguard to counter this
kind of hacks.
32
3.2 All Hackers Know Everything About
Technology
33
very high to the point that they thought I will become the
champion. Well, I was just starting in my career as a hacker
back then so don't expect me to become genius already who
knows everything.
34
3.3 All Hackers are Magicians?
35
Many of them think that hacking is in just a click of a button you
can hack credit card credentials, power grids, Facebook,
Instagram, Twitter and so on. Not in this world my friend, not in
the hacker world.
As you can see, there is the word called work. In order for you
to hack a certain system you must apply work in it, therefore
you will exert force. Maybe that force is the thinking process. As
usual, during the Hacker Games some of you will imagine us
that we are typing so fast to hack, but the reality is most of the
time, we are thinking of the smartest and the easiest way.
Another word that you can see in the formula is time. Some of
you who frequently watch Hollywood hacker movies tend to
think that in just a matter of seconds, the hacker in the movie
can hack the nuclear weapon of other countries, or shut down
the power grid of the whole nation. All of it happened in the
movies by just typing fast on the computer with black terminal
and green fonts. This kind of hacks is possible, but it takes time
to do this attack, depends on the work needed in the fulfillment
of the hack.
36
some similarities like in the art of deception. Hackers and
magicians tend to use this art to gain something. That
something for hackers can be to attain valuable information
and while for magicians, maybe to amaze the audience.
Anyways, I am not a magician so let's go back to the hacker
topic.
37
3.4 All Hacker Groups are Well-Organized?
Have you heard about the popular hacker group that has a
mask? They are one of the well-known hacker groups
internationally. They tend to play god and justice by hacking the
people who commit criminal act or just a terrible act. Well, they
hack illegally so they also commit crime so why not hack
themselves?
38
corruption. Anyways, this kind of attack was ridiculed by the
hacker group members in other countries, telling that what they
did has nothing to do with the International community of that
hacker group. Also, millions of supporters of Yaya Dub enrage
their feelings to that hacker group telling that what they did has
nothing to do with the government and it's too much personal.
As a result, the NBI helps the Maine Mendoza's side to catch the
hackers because that hacker group just broke a law. Based on
the law of the Philippines, in Republic Act No. 10175 /
Cybercrime Prevention Act of 2012, it aims to address legal
issues concerning online interactions and the Internet in
the Philippines including the cyber offenses like illegal
access to data . However, good luck to NBI if they will catch
those culprits with their technology right now.
Aside from this masked hacker group, there are a lot of hacker
groups arise in the cyberspace. Most of the time, to keep their
safety from one another, they won't show their identity to the
other members. This kind of arrangement is hard to manage
because what if that 10 person is just one man or some of the
members are police who wants to catch the group. I hope this
39
will make sense now to you that it's hard to manage this kind of
group who you don't trust or don't know if they really exist.
40
3.5 Having Hacking Tools Can Make You a
Hacker?
That is the same story with hacking tools. When I was a kid, I
have the hacking tool called Dark Comet. It is a remote
access Trojan that can give you a power to control other
computers remotely, take pictures via their webcams, or listen
to their conversations via their microphones connected to their
computer even if you are just sitting in your home. What you
need is just an internet connection and a laptop. This tool can
help you to make a Trojan; this Trojan is a malware that if you
put in the target's computer, you can now have access to the
target's computer in just a matter of seconds via your laptop.
41
flash drive to make my job easier. What my USB flash drive will
do is that once I plug it into the computer, it will automatically
open and execute the Trojan there. How? Let me show you the
simple trick.
On your laptop, open a notepad and copy paste this lines in it.
[autorun] open=trojan.exe
ACTION=Perform a Virus Scan
Then the story circulated in our school. One of the things that
circulated was the tool that I used. When they found out what
tool I was using, a lot of hacker wannabes in our school
suddenly popped up and used it in the computer laboratory.
42
One of those wannabes was (let's hide him in this name) Adam.
During our class, he plugged in his USB flash drive in my
computer and tried to lure me by talking with me gracefully and
interestingly. When I look at my computer, it was blocked by
Windows Defender (Fail!:D). I forgot to tell them that you should
encrypt your Trojan files because the more you encrypt it, the
more it will be harder for any antivirus to detect it. Well, his
face showed that hes in trouble that time and just walked out
due to embarrassment. He probably thought that I am not the
only one having that kind of power in our school. However,
most of them really think that I am a crazy weird person so
thats good for me because they won't dig too much in my
hacker life.
43
3.6 All Hackers are in the Same Age
Group?
Do you know the kid named Reuben Paul? He is the CEO of the
Prudent Games and one of the youngest ethical hacker in the
world, having an age of 9 by the time I wrote this book. He
created iPhone applications that will teach people about math,
science and cyber security in the form of a simple game. He
also speaks and demonstrates hacking in some hacking
conference like DerbyCon and 2014 Houston Security
Conference. Some of you might think it is too much for a kid,
but the truth is, anyone can be a hacker once he fully
understands the things he must learn.
44
learning materials and advice his dad has given to him. For
now, he is developing another application that will help the
world learn while playing. By knowing his story, we can pick up
a lot of lessons that can and will destroy the limitations we are
giving to ourselves.
The input of humans is the five senses, which are the sight,
hearing, taste, smell and touch. Let us have an example: If Roy
frequently watches a lot of Dragon Ball Z and any other violent
cartoons, then he is seeing and inputting the violent movement
of the characters in his mind (he is also inputting what he hear).
The process of humans is no other than the brain. All of what he
senses is processed in the brain. Lastly, the output is the result
of what he inputted in his mind. If he inputted the violent
movement of the characters in the Dragon Ball Z in his brain
frequently then you'll see a lot of Roy who has a violent
characteristic like punching and kicking.
45
So if I inputted in my brain things like the hacker's mindset,
coding, networks, Linux, social engineering, ethical hacking
then what will you expect? The technique is, input only what
you understand so that your mind can process it and can make
a result. Input first the things you understand and level up little
by little. Therefore, it is very important for you to know where to
start but don't worry, this book will tell you all the things you
need to start in your journey of becoming a hacker.
46
3.7 The Real Definition of Hacking
47
the moment of being in this competition. Lastly, the judge
came to us and asked us if we will still continue because he is
worried for us. I managed to say, Yes, we will.
The game is not just about exploitation of the system, but also
about the documentation of the whole process. We assumed
that most of our competitors will focus in hacking the system.
However, our team is focused on hacking the whole game. So
how do we hack the whole game? Here it is.
48
resort weapon, the automated tools I have. These tools can
make my manual methods faster than anyone in the
competition.
49
~ Things to Remember
Not all hackers are evil. Some of them are making our
cyberspace more secure.
Hackers don't know everything about technology. They
have expertise maybe one or two, but not all.
Hackers are not magicians. You can't ask hackers to do
an illogical or impossible thing in just a snap of a finger. It
needs time and work.
If you have hacking tools, it doesn't mean that you are a
hacker. You must have a hacker's mindset to be a real
hacker.
Hackers can be anyone, no age limit.
Hacking is about finding the smartest and easiest
strategy in exploiting the system, not just to exploit the
system.
50
.
004
Be-Do-Re Hacking
_____________________________________________________
51
4.1 The Be-Do-Re Hacker
52
I met him in Mapua, the college where I studied computer
engineering until the Mapuan Files came into the story. This
happening is one of my unforgettable moments that made the
Alexis, who is writing this book, a white hat hacker.
Until one day, I've got to talk with some of the second year
students and they told me that there is one professor who
teach about hacking in his classes if there's an excess time.
They named it Mr. K and they say that he is in programming
classes. Then I said in my mind, I want to meet that person
and know what he is capable of doing in terms of hacking. So I
hack the way out just to meet him in person.
I know some of you will just say that I can meet him after the
class and just show person to person in him. However, I am not
that kind of person. I always want a thrill and mystery in most
of my work so I did it. The day goes by and Neyo already gave
53
the letter to Mr. K.
He started introducing himself and said this line, Can you hack
Facebook accounts? I paused for a while, and said this line,
There are no 100% secure in cyberspace. Therefore, it's a
yes. He smiled at me and he shouted, At last! I found you! I
don't know what he is talking about so I asked, What did you
mean you found me? He said, Let's take a walk.
54
different so called security analyst. They called themselves
ethical hackers because they stop hackers and they counter
hack them. However, I don't label them as true hackers. I
asked, Why? They are doing the hands-on thing! Then he
replied, Not because they know the hands-on, they already
hackers. He added with a smirking smile, I asked them too
what I asked you a while ago if they can hack Facebook
accounts and they answered me terrible things. I asked again,
What did they say? He replied, They said things like these,
It's impossible!, There are no hacking tools for that!, Are you
joking!?, That's bullsh*t! He added, Those things are terrible
answers, a proof that they are not a real hacker.
I was starting to get his point little by little so I ask him again,
What is the exact terrible thing in that answer? He answered
me, Hacking is just like this:
55
like how it processes the forgot password, the retrieval system
and so on. It can help also to study the details about the human
who use the account because a human stupidity can never ever
be patched. It is the Know your Enemy method for you to know
what are the possible methods to hack the target. Third, think
of the smartest and easiest way to hack the account. List all of
the possible methods. To me, one of my possible methods I see
is by answering the security question of the victim. I can just
have a simple walk and talk like this to know what is their
street, what's the name of his first pet and so on in the middle
of chit chat with the victim. After knowing the answer to the
victim's security question, you can now access his account.
Lastly, for you to able to do that, of course, you must execute
the possible methods you just made. That's it! And they say it's
impossible? They say that a hacking tool for that doesn't exist?
Real hackers find ways! Not reasons! I was shocked how he
made hacking so easy to understand with those steps. Starting
that day, the line hackers find ways marked on my mind in
every hacking situation I'm in.
56
your motivation. All of those steps I gave you is the step used
by a Be-Do-Re hacker. As much as I want to talk with him a lot
more about the Be-Do-Re hacker, I cut the talk for my next class
will start in a few minutes.
57
hacker.
58
control of something or someone, but because we are in this
era where technology rules, the instruments we usually use are
the hacking tools and any technology that can help us in
gaining control. By using that story, I understand now that our
mind is the greatest tool we have in hacking. Mr. K added these
lines, You can hack everything or everyone using the greatest
hacking tool and computer you have which is your mind. That's
why I am teaching you to control the power of your mind, to
think like a true hacker because a true hacker believes that his
mind can do impossible things such as hacking everyone or
everything. All of us have that power, but only few know how to
use that power. Luckily, I am teaching you how to use it.
59
Well, the important thing now is you know why the Be part in
Be-Do-Re hacking is the most important. It is the hacker's
mindset creation and planning part in Be-Do-Re hacking where
most of your time will be eaten. However, I chose to make a
whole different chapter for that to emphasize it more here in
this book. In chapter 5 entitled, How to Think Like a Hacker
will tell you the details of how to think like a true hacker and
develop strategies differently from the normal people.
What I am telling you right now is there are some things that a
pure human cannot control. These are the things that the only
one can control the situation is the God who created us.
Another thing we cannot control sometimes is the human itself
that is not perfect. A human can sometimes make some errors
and it is a nature of humans that we must consider in our plans
and thinking.
60
In order for you to become confident, you must be
knowledgeable in the things a hacker must know in this era.
That thing is the technology. Hacking is not about technology,
but it can help your job become easier. The things you must
know in order for you to become confident in the field of
hacking are:
61
advantage for you will learn here how the computers connect to
each other. Social engineering will help you to hack humans,
which is the most vulnerable since there is no patch in human
stupidity. Lastly, penetration testing, in here you will learn the
actual hacking and you will never understand this thing without
the knowledge of the last 6 topics I just told you to learn.
Re means get the reward and all of the hackers have this thing
when they successfully hack something. The rewards can be
recognition that you successfully hack something and make it
more secure. Sometimes it's money that they'll give for
discovering vulnerabilities in their system. This is also important
for a hacker because it is the main reason why they are doing
the hack.
62
4.5 Finally
White Hats (good hackers) make our world a better place. They
push everyone to improve and innovate because if they don't,
they'll be hacked by the Black Hats (bad hackers). That's why
63
we created this book, for you to become an additional in the
white hackers who will make our world a better place. That's
why we started this kind of revolution, to create more White Hat
hackers in the next generation and make a more secure world.
~ Things to Remember
64
005
How to Think Like a
Hacker?
___________________________________________________________
65
5.1 Think Out of the Box
The Cave
66
People outside the cave walk along this walkway
carrying things on their head including; animals, plants,
wood and stone.
The Shadows
If you had never seen the real objects ever before, you
would believe that the shadows of objects were real.
The Game
67
The Escape
He sees that his former life and the guessing game they
played are useless.
The Return
When I heard that story from him, I was amused and there's a
lot of things running in my mind. I asked him, What is the
connection of this story in thinking out of the box?. He replied,
I am not a philosophy teacher, but I want to connect this story
with the phrase, think out of the box in hacking. Here's my own
explanation:
The Cave
68
The cave represents the people who focus on thinking
what is already there. They are the people who imprison
themselves in the traditional things their ancestors gave
them.
The Shadows
The Game
The Escape
69
The Sun represents unconventional truth and knowledge
The Return
70
While I was in deep silence, he added, I'm amazed that you're
still here with me wanting to learn for almost a month. I
replied, What do you mean?. He said, You are the only
student of mine who last this long. All of my past students tend
to walk away and never show up when there is no playing of
hacking tool occurs. Only a few people are like you who is not
scared of the truth and always embracing change. You're very
different from other students I had. They want power, but you?
You want something a normal person cannot see, something
extraordinary.. In the back of my mind I was saying, Does he
know? That I am the mastermind behind the underground
hacker org in the campus? The org that posted illegal
recruitment posters in the whole campus? The org that spread
business cards with puzzles in the campus? The org that
recruited hundreds of students to teach them hacking? If he
knew it then it could be risky.
71
chance that you'll spill it out unconsciously. He added, Don't
think too much about the things that you see. Think also about
the things you cannot see for it is more valuable to become a
great hacker. As we said earlier, THINK OUT OF THE BOX.
The only person you are destined to become is the person you
decide to be.
-Ralph Waldo Emerson
72
At age of 18, I became a known hacker in the issue of Mapuan
Files hacking. My team became the 2015 Hacker Games
Champion in one of the largest IT Security conference in the
Philippines called What The Hack: IT Security Summit. Last
but not the least, I became the founder of the company that
started the revolution in raising cyber security awareness
around the world called Cryptors, Inc. We do this by organizing
a very affordable seminars and conference in different colleges
and companies, creating interactive learning materials about
cyber security and creating a digital game where users can
hack other users virtually and defend themselves for them to
know what really happens in the real hacker world.
73
getting high grades for me to have a flying honors after
graduation, get a decent job, get married and retire at age of 60
because they think that success is something like that.
However, I went to the unconventional way where I made my
own curriculum and study the things I really love to explore
instead of sitting in the classroom and force to learn a thing I
am not interested in.
In schools, they say that the more exams you fail the more
chance you'll become a failure. In the real world, the more
failure you commit, the smarter you became because every
failure is a great lesson to treasure. That is the greatest teacher
of humans and a great thing to make humans smarter.
However, the schools today doesn't want you to experience
failing, if you fail a lot of subjects then probably you'll be
removed to the system of that school or if you fail an exam
then you will be teased by anyone. So what do you think? Is our
school an effective teacher for us to be ready in real world?
That was the question I am asking that day.
74
they can make money of, make application that can help them
automate their work, organize networks that can help them
connect with other devices but me who is not yet a college
graduate knows it already in detailed. Maybe because most of
our students today didn't apply it and use in real world where
100% knowledge occurs because what they want is just to pass
the subject.
I told you these things to show you that you can achieve things
that seem impossible in the eyes of the people in the traditional
world. By the use of self study, you can be anyone you want to
be and you can achieve anything you want to achieve. The
greatest thing about this era is we have now the Internet where
you can learn all of the things you want to learn and all you
have to do now is to just type what you want to learn. So all in
all, if I am capable of doing that then you are capable of doing
that too, and it can be much better than mine.
75
what they do because it seems extraordinary and it has the
ability to save people.
I know you will hate me for this, but I got a lot of girlfriends way
back during my high school days (30+ girls from different
schools and cities and most of them are muses of their school
or class). I applied to them one of the skills of a spy called
Social Engineering. This is a skill where you hack humans.
You are gaining control over their mind. I studied it very well in
books and the Internet then applied it in real life in hacking the
girls to like me and become their boyfriend even though I am
not so handsome.
76
Well, it's like planting a tree. At first, you have to water it day by
day and take care of it very carefully. However, once it starts to
grow bigger, you will just get the fruits of the tree whenever you
need it. It will also give you shade from the sunlight. It will be a
great benefit to you unconsciously.
For Mr. K, I already passed this test to him when he's training
me. It is because when we first met and he asked me a
question if I can hack Facebook accounts I said yes because
there is no 100% secure in cyberspace. In just one question, he
already knew that most of the trait he is finding in a hacker is in
me. The next trait I just acquired in that question is the phrase I
told him when I first met him, There is NO 100% Secure in
Cyberspace which is the next topic.
77
5.3 There is NO 100% Secure in
Cyberspace
78
Want an example of how easy it is to hack a billion dollar
company who spend millions of money in security? When I am
doing a legal hacking (means there is permission) in some
companies that I know, I sometimes just research and use
telephone in hacking it. I will call some IT guy and act like the
owner of the company shouting that there is some kind of
problem in my company account. I'll threaten him that I will fire
him if he didn't fix it very fast and give me some new username
and password. Well, because of his fear that he will lose a job,
he will give me a new username and password and also the link
where I can access the account externally. Then, using the
company account of the owner of that company, I will contact
the technical team to give me access to their servers and of
course, because it's an order from the highest position, they
won't bother to give it to you. Then I will just hack that
company with some small research and that's how easy it is.
They spend millions of money for their technical security, but
didn't spend a dime in training their employees in some kind of
social engineering skim that can happen to them.
Well, I am not the only hacker who does that skim. Kevin
Mitnick did it also in major companies in America. And by
showing you that, you can now see how important ethical
hackers in the new world we just created, the cyberspace.
Imagine if I am a Black Hat hacker when I did that in that billion
dollar company, terrible right? That's why I want you to be with
me in the revolution of creating more White Hats.
79
5.4 Hackers Dig Deeper
The only advantage of hackers why they can hack is they dig
deeper. What I mean is they study about their target thoroughly.
They study how it works and every detail of the target because
they believe that every information you will gather about the
target can be used against them. And when I say dig deeper, it
means research deeper than anyone can.
2.) She inserts the username of her target (email and number
can be an alternative).
3.) After the target's profile show up, she clicks the button
80
called No longer have access to these?
4.) After that, a page that's asking for a new email will show up
and shell just put a new email there that is not connected to
other Facebook accounts. (If this doesn't work for you then
proceed to the method number 2)
6.) If successful in step #5, as usual, she can now change the
password and go to the victim's Facebook and remove the email
in the settings so that the victim cannot retrieve their account
using their email.
81
These days, they say that the youth is more knowledgeable in
technology such as using social media accounts and shopping
online. That's why our grandmothers and grandfathers, who
don't experience technology too much in their age tend to call
us for help in using their online accounts or anything about the
technology. They see the youth as a technology persons who
are more techie. That's because the youth today tend to
spend a lot of time in cyberspace, whether in social networks or
online games.
Normal people just dive into the things they can see. The
hacker dives into the places where only few can see. That's the
greatest advantage of hackers and anyone can do it. Just be
dedicated and diligent in finding things that can help you in the
long run.
5.5 Be PRO
(Patient, Resourceful, Observant)
Patient
82
terminal and green fonts all over my screen and in just seconds
the system will be hacked with a note of Access Granted in
the screen. Well, not in this world my friend. Maybe they have
to stop watching Hollywood hacking movies where in just a
second by just doing some typing in the keyboard they can
hack CIA and FBI. I recommend you to watch Mr. Robot by Sam
Esmail rather than the other hacking movies out there because
this show is close to reality and will teach you the word
patience.
Resourceful
Hackers must know how to utilize what they have. That's why I
am teaching you in this book not to depend too much on
hacking tools. You, yourself, is a great tool and whether you are
imprisoned in a place without computers, you can still hack
your way out or the other systems in there. In this book, we are
making you a living hacking tool that can hack anything
under the sun.
83
In every hacking, there would be different kinds of situation and
you must evaluate what kind of situation you are in. For
some hackers, they tend to panic when the time starts ticking
when hacking some system for a limited time. Pressure can be
a good motivator, but if it's clouding your mind to think of a
solution, then just relax and you can now think of a solution.
Always remember that finding a solution is better than worrying
about the situation.
After knowing what kind of situation you are in, assess what is
available to you. Remember that being resourceful is all about
finding clever and creative use of your current resources. Ask
yourself, Do you have access into something that might
help in the situation?. Always remember that resources
aren't all about hacking tools; consider skills, people, and your
hacker mindset.
After you assess the resources you will use, it's time to use
those things in unconventional ways that can go against
conventional wisdom or societal norms. Traditions and rules
exist for a reason, but sometimes it holds back the progress in
our way. Don't just go along with how things have always been
done.
84
in multiple angles and see what went wrong and go from there.
This is very useful in developing possible methods in hacking.
Observant
If you know the enemy and know yourself, you need not fear
the result of a hundred battles. If you know yourself but not the
enemy, for every victory gained you will also suffer a defeat. If
you know neither the enemy nor yourself, you will succumb in
every battle.
-Sun Tzu, The Art of War
Take the time to really listen. For example you are having
some talk with the target. Be a good listener. Pay attention to
the person's words, emotions, body language, and gestures to
get the full picture of what is really going on. Don't interrupt the
person who are talking, just nod when it's necessary, make
comments when the conversation ask for it, however, don't say
85
Yes! That's so true every 5 to 10 seconds because the person
will get distracted and the information he is giving you will be
interrupted.
You must use your senses. Use your sense of sight to observe
and scan your surroundings and people's behavior wherever
you are. Use your sense of hearing to pay attention to all the
different voices. You should be able to distinguish voices from a
lot of noise. Use your sense of touch to know the mood of
people. For example, if someone shakes hands with you and
you find the person's hands sweaty, then the person may be
nervous. Use your sense of smell to detect any smell that is out
of the ordinary, like a sudden change in aroma of the area.
Notice what is not being said. What a person tells you is just
as important as what he or she doesnt say, so pay attention for
whats absent as well as whats present. For example, if your
friend is always gushing about how amazing his girlfriend is,
and suddenly, she doesnt come up at all in the course of a long
conversation, then maybe something is up. If your father has
been really excited about a big promotion at work, and then he
comes home and only wants to talk about your schoolwork,
then maybe things didnt work out. People often dont want to
mention the disappointments in their lives or the things that
they want to keep private. Be observant to see whats missing
in a conversation.
86
another strong indicator of what a person is really thinking and
feeling. If a person is standing up straight, looking straight
ahead or like hes ready for the next big thing, then chances
are, hes in a good mood and ready for success. If someone is
slouching, hunched over, fidgeting with his hands or looking at
the floor, then maybe things didnt go so well for that person
today. However, if thats how the person always looks, then the
body language may not mean as much but if you notice
something out of the ordinary, then it may indicate a change in
mood or emotion.
The first friend of him that we met around the Intramuros walls
was very boastful. He is the most boastful guy I've ever met. He
just talks about only himself and his unbelievable
achievements. He wants our topic to be just about him and if
you turn the topic to a different thing he will turn it back to him
87
no matter what topic you set. His voice is very annoying and
the odor of his breath is very disgusting.
I was pissed off when that guy started to belittle me and say
things that I don't like. I walked out that time for I am about to
lose my temper/for my temper is rising but Mr. K stopped me
and whispered, Its a part of your training. Becoming a PRO,
patient, resourceful and observant.. In my mind I was saying,
What the heck? What kind of training is this!? . Maybe my
temper was too high that time that's why I can't see the
significance of the training we are doing in that moment.
88
shocked my whole life.
Always surround yourself with people who bring out the best in
you, not the people who bring out the stress in you.
I had a chance to talk to sir Meric Mara, the man behind the
first Linux distribution in the Philippines called KahelOS and the
CEO and CTO of the 8layer Technologies. He is one of the
mentors I encounter while making this book. He always tells me
the things that I should do so I will be on the right path. What I
am saying right now is you must surround yourself with the
people who will inspire you, teach you and support you to grow
as an individual.
89
the people who just want to destroy you.
When I went to college, the people I find first are the people
who are actually interested in hacking. That's why I met Mr. K
and the rest of the members of our underground hacking
organization. If I surrounded myself with gay people that time,
then what do you think will happen? Of course, there is a huge
possibility that I will became a gay too in words, acts or thinking
and this book will not exist. Fortunately, I chose the path of a
hacker and create my best move to make a difference in this
world..
~ Things to Remember
90
006
Mr. K's Steps in Hacking
___________________________________________________________
91
6.1 Let's Do the Hack!
Maybe some of you will just hire someone who can do the hack
so that Mr. K will proceed on teaching you the technicalities and
hands-on hacking. Maybe some of you will just use hacking
tools and scripts that can help you in hacking the database.
Maybe some of you will be angry, tell Mr. K that it is impossible
and mark him as fake hacker. Well, all of those things crossed
my mind. However, I don't want to be controlled by my
emotions so I started to think while biking around the
92
Intramuros by 5:00am in the morning.
For you who don't know what Intramuros is, its a wonderful
place located in Manila, Philippines that is also called Walled
City because it is surrounded by huge walls used in past wars.
My college and dormitory was located inside Intramuros but my
permanent address that time was too far from this place. I lived
there alone, away from my parents just for me to feel
comfortable in my studies. The surroundings there at 5:00am in
the morning is very peaceful. I biked around the Intramuros
every morning like I am the king of the road because only a few
vehicles are entering that place by 5:00am to 6:00am.
93
advantage. I have to know what or who can be a valuable target
that will give me an access to the database. I need to find a
target that once I exploit will give me an access to the
database.
The first valuable target that came into my mind was the
employees of the company. Their emails were posted on their
website and their full name. Therefore, I can search them in
Facebook or LinkedIn to dig more about their personal life, what
they like and what they don't. Then, eventually, I will find a
vulnerability in their emotions that will let me access their
database.
All in all, my targets are three, the employees, the owner (Mr. K)
and the website. The valuable targets can be changed in the
middle of the hacking phase since we can discover a much
more valuable target. However, as of the moment, I only see
these three valuable targets as my top priority to study for me
to discover useful information that can help in exploiting the
database.
94
The first step was done in just a minute and I have to proceed
this time with the study about the targets. I will do that step
after my class in the afternoon. Well, I am still a college student
this time, so I have to go study and act like a normal student.
Do you know what I thinking about this time? I'm walking back
to my dorm while talking to myself in my mind like this: Am I a
moron to do the challenge? Is it really possible? What if I cant
find anything in this step? What if I fail? Hacking without
technical things is very ridiculous! Maybe he is a fake! No! I
need to do this and prove to him that I can hack it! Well, it's so
easy! very very easy. Wait, am I lying to myself? No!, It's true!
It's EASY, EASY, EASY! After all, he said to me that this is the
easiest test he'll give. Oh, I'm getting crazy. My mind is
exploding. I need to calm. I need to be at peace.. Are you
getting crazy too by reading what I'm thinking that time? Well,
get used to it because I'm kind of person who analyze things by
talking, arguing, and asking myself.
95
very clear. In that case, you can able to make decisions for the
improvement of the situation. You can be on the right path by
talking to yourself so don't be afraid in doing that thing, it
doesn't make you crazy, it makes you a well decisive man.
96
Stacey describes me as a chess player. The board is the world,
my chess pieces are the humans and the enemy player and his
chess pieces are the odds that can come against my ability to
control the game. However, because of my proper creation of
strategy, I can control the game. Knowing more about the
details of the odds that is stopping me can increase the chance
of me being in control. And you all know that hacking is a game
of who is in control.
I told her about the teachings of Mr. K about the You Can
Achieve Anything principle. I told her that if you want to be
something in this world then you can be that one. If you don't
want to be that something, then you won't become that one. It
is all in your mind and if you keep telling your mind that you
can achieve that impossible thing then probably you can have
it. Then she said You already have answers to your problem,
and she added The answer is within you, but your negative self
is stopping you from finding it..
97
about the targets.
98
Facebook account.
99
has a deep relationship with Christine while being married to
Mary. And lets add the fact that Christine is not the only other
woman of Carlos because he's also hitting on my female
Facebook account (wanting to be the boyfriend of my female
Facebook account) which is so ridiculous. Maybe Carlos'
account for Christine blocked Mary's account to become
invisible to Mary, ridiculous isn't it? That's why I didn't mention
the real name of Mr. K in this book because you'll find out who
is Carlos and as you can see, I don't want to degrade and
humiliate people.
100
Now I have to proceed to the next target which is Mr. K. Since
I've been with him frequently then definitely I can find
something that can allow me to exploit him. After all, from his
teachings he is always telling me that, There is NO 100%
Secure in Cyberspace and Meatspace so probably I can find
something. I know some of the characteristics of Mr. K, his class
schedule, his family, his other jobs, other friends and many
more so I am thinking what I have to know about him more.
101
employees here and the email where I can contact them.
However, the only name and email I picked was Carlos' since he
is my point of interest in this situation.
It's 8:30pm now and the only time left for me is 51 hours and
30 minutes. I am now in my room to create possible methods to
hack the database of their company. On my table, I ready have
two big bottles of water. It is because when you are thinking too
much and you feel like drowned with information in your head
drinking water can help you refresh your mind. Well, I am not
taking up medicine but I just feel comfortable doing that for it
boost my productivity.
102
wrong because we have laws about signatures so if you are a
law enforcement who's reading this, go read the next chapter
and you'll know why you can't put me in jail.
103
I will give to that friend the number of the programmer in
Mr. K's company and the message she has to text in Mr.
K's phone containing, Hey, this is Mr. K, give me the
credentials in our database. A.S.A.P. or else you'll be
fired. Send it to (insert my number) and not here. Do not
reply to this message.
After that friend go to Mr. K, borrow his phone, and send
the message, she must delete her text in the sent
messages.
Then, after a few minutes, the credentials will be sent to
my phone and it's game over, I win.
They say that you have to save the best for last. One of the
great vulnerabilities I found in the employee is the story of
Carlos. Since I know his dirty little secret I have the power over
him by using the word FEAR. I can control him by just saying
the magic words and I know you know it. I don't really want to
do this thing because it's too personal that's why I made this
my last option.
Here is the third method if the first and second didn't work out:
Gather all the evidence that will prove that Carlos has a
deep relationship with Christine while being married to
Mary.
Email Carlos that if he didn't give the correct credentials
in their database, then all of the evidence that he is
cheating on his wife will be exposed to: first, to his own
wife and second, to all of the internet users around the
world including his family, co-worker, friends and many
more.
To make sure that he will read the message in his email
I will call him from his phone using a payphone to tell
him this thing, You have 1 hour to check your email
and read my message. If the time is out and you didn't
104
give what I want, then your dirty secrets with Christine
will be exposed to the whole world, including your wife.
Then I will put down the phone immediately.
Since Carlos is the head of the technology in that
company, I assume he can give me the credentials I
want to be in their database.
During the second day, I sit-in (attend the class even though
youre not in the class list) on Mr. K's class. I talked to Ben, who
is sitting in the back, about my plan which is the first method. I
said to him, Put your name here in the letter and act like you
will absent next meeting. Then you will give this excuse letter to
Mr. K. I'll give you 100 pesos if you did this perfectly. Ben is a
big guy and he became my classmate in some minor subjects
like English and Filipino class and he is also my friend, I assume.
Ben started to write his name in the letter.
105
chose to be present next meeting so he can report next
meeting and not this day. So Mr. K didn't sign the excuse letter
and Ben came back to his seat.
I was so disappointed and this is also the reason why you can't
jail me in copying a signature for it is not successfully done but I
attempted. I didn't see it will come that way. I have to move on
very fast so I can proceed to the second method. I have to find
a beautiful girl in the class and it can help if she had already
become my classmate in other subjects. I started to look at
every student in the class.
A good thing about Valerie is she knows that I'm into hacking
and she's very supportive about that. She categorized my
hobby as cool and mysterious. So I told her what is really going
on between Mr. K and me and explained to her how she can
help me in my second method. She was laughing and said, So I
will be your hacking partner? then she quite raise her hands
and form a quotation in her fingers and said, In this hacking
operation?. She is smiling and said this is so cool. She said that
she feels like she's a spy.
106
the fact that Ana is much more intelligent than Valerie, enough
said. So here it is. We have to hack Mr. K immediately.
When the class was finished, Valerie quickly came near to Mr. K
and started to make a cute puppy face. I am just watching them
from the back seat of the class and I can't hear anything from
them for it is too noisy. Mr. K's expression was very surprised
and happy. I can see the two of them enjoying the talk and I'm
impressed that Valerie is so confident in doing the job. That
time, I feel that she really has a future in becoming a spy, I
think.
107
Then I went to payphone and call his phone. I told him, Open
your email. Find my instructions there and no one will know
about your dirty little secrets. You have 1 hour to do that. He
shouted into the phone while I am talking, Who are you!?. I
put down the phone and wait if he will take the bait.
108
strong foundation in hacker's mindset first. It is because, again,
you can hack everything by just using your hacker's
mindset and the hacking tools we are using now are just
subordinates.
I told him all of the details from start to bottom from the first
method to the last method I used. He was so amazed and he
said, That's what a Black Hat do. However, you are now
thinking like a true hacker, but you must be careful with your
steps and make sure it is always ETHICAL. Do you know that
we spend thousands for the security of those things you just
hacked? We spend a lot of money and time to make it secure.
We even worked with information security firms to make our
technology more secured. However, you just hacked it by just
using your hacker's mindset so still I'm proud of you, but the
only thing you fail in this test is to make your hack ETHICAL
and that's what we have to work on you.
109
tools and technology, but they didn't know that the real power
is already in them: their mind. They just have to customize and
setup their mind to a hacker's mind so that they can use the
real power of hacking. Always remember this: the power of
hacking will not be found in the technology, it will be found
in your mind. So my first phase of training which is building
the hacker's mindset is the most important phase of our
training and without this, I am not a true hacker.
~ Things to Remember
110
007
Hacking Humans
___________________________________________________________
111
7.1 Social Engineering
Brother: Wow, nice email. When did you create that email? It
seems it is so old. Mine was just created a year ago. The PDF I
want to give you is an eBook that you are waiting for all of your
life.
112
Joseph: Yeah, it is too old. I created that in summer 3 years
ago. Wait, what's the title of that e-book? I'm kinda interested.
Brother: Just check your email now. Did you see it?
Joseph: numberone@gmail.com,
numbertwo@gmail.com, numberthree@gmail.com,
numberfour@gmail.com and numberfive@gmail.com. I am
sure they will like what you've sent to me.
Step 1: Go to www.gmail.com
Step 2: If you are logged in then sign it out. Then click the Add
an account button and then Need Help button.
Step 3: Click the I don't know the password and enter the
email address of your target. Then, click Continue.
113
Step 6: If it prompts you to get a verification code via a text
message, then just click the button I can't access my phone.
Step 9: It will prompt you to enter the exact date when was the
last time you open your Gmail account and when did you
created your Gmail account. In my case here, Joseph just said
to me flawlessly that he created his Gmail account 3 years ago
in summer (which means April or May). And by telling him to
open his account that time, I can have the exact date of when
was the last time he opened his Gmail account. After all of
these, just click Continue.
Step 11: After all of those things, Gmail will tell you to open the
email you use in Step 8 to access the reset password link. Then
in my case, I just hacked Joseph's Gmail account by just
interacting with him and using these steps. I hacked not just his
Gmail account, but also the Facebook, Twitter, and Instagram
that is connected to his Gmail account.
114
(By the time I wrote this book, this step worked. However,
Google may change their security in Gmail as the time goes by.)
115
7.2 Social Engineering Methods
1.) Tailgating
This method is effective for those who have a security gate that
doesn't have a guard and the only thing you need is an ID to
enter. That ID will be scanned by the gate system and the door
will open. In this case, tailgating from the word tail, you have to
tail an employee or a person that has an access and can open
the door. Then you just have to be behind that target and
quickly enter into the facility with the target in front of you.
116
definitely you can open their account.
You can do this method by just purely watching what the victim
is typing. However, if the victim is fast in typing, then probably
you must use some tools like a video camera in your phone. So
that, you can play the video later in slow motion to see what
does the victim types. Pretty easy, right?
3.) Rewards
117
didn't give them credit? Maybe the company didn't treat them
well? Whatever the reason why they are dissatisfied and angry,
this employee is a hacker's treasure.
This is a treasure for you'll never know that maybe some of this
disgruntled employees know the password in the target
companies' computers. These previous employees can give you
an idea how you will hack their system. This employee has
been there inside the company you want to hack so they can
give you a lot of information better than the information a tool
can give you. They can also reveal a secret code of employees
so that if you do social engineering, you can impersonate as an
employee also because you know how their system of
communication or code works.
118
deeper about you so that they will know your vulnerability.
119
routers, operating systems, and any other technologies they are
using inside the company. Knowing the inside of the company
can also help you determine how you will hack the company.
1.) Fear
120
myself as the CEO of that company and there is some problem
in my company account so he must fix it and give me another
username and password or else, I'll fire him. When he heard the
word fire, he became quick in doing things hearing him typing
very fast and always saying this line, Wait sir! Wait sir! I can fix
it! Wait! I'll give you a new username and password!. Then I
just pushed him to give me an access to the CEO's company
account. By doing that, you knew what happened. By having
the CEO's account, I can have and do whatever I want with their
data.
2.) Revenge
121
give it to you just to harm the company. However, as a White
Hat, always remember that you are using this kind of advantage
to make the company more secure and not the other way
around.
3.) Reciprocation
You can use this psychological factor in the people that owe you
or anyone that has an obligation to repay you for something
good you did to them. Most of the people tend to do everything
to the people they owe. For example, if someone saves your
life, will you do anything for him? Maybe you will for you owe
them your life.
122
4.) Good Samaritan
5.) Likable
If the campus crush went to you and asked for a favor, would
you do the favor? Many of the people will do the favor because
sometimes they are in love with that person or they like that
person too much. The saying Love is blind goes true in this
psychological factor. Love can make you blind because there is
a tendency that you will do any favor that person will ask you
even if it is not your intention to do it. And yes, some hackers
use this kind of factor to hack someone or to control someone.
123
their company and more that I can use in my hacks. You can
prettily ask anything to the person who likes you too much or
simply make yourself a likable person for you to control anyone.
7.4 Countermeasures
124
social engineering strategy for your company.
All of the people must be aware of these kinds of tricks for them
to be more secure. Raising cyber security awareness can lessen
the increasing number of hacking victims around the world so
help us raise cyber security awareness by sharing the ideas this
book have.
~ Things to Remember
125
008
The Beginning
___________________________________________________________
126
8.1 Ethical Training
This is the same story with the policemen (at least in the
Philippines). All of them MUST be trained ethically and
theoretically on what kind of situation they will have to use
their gun, what they must think while handling the gun and
whom they will shoot it before they can handle and use the gun
practically. All of them must have undergone a massive
theoretical training to condition their mind before handling any
kinds of weapon. It is because who knows, maybe some of them
don't really understand where to use it so theyll just use it to
scare people which is unethical. Again, they must be trained
first to be ethical before handling a weapon.
All of these stories are the same with hacking. You have to know
what is the ethical way of becoming a hacker before you can
use weapons in hacking. That's why before I introduced you to
the greatest weapon in hacking which is a hacker's mindset, I
already introduced to you that all of this must be used ethically.
You can be superhero and make a difference in this world
without breaking the law. And the greatest thing about it is you
can use hacking to make that possible.
127
system you are hacking. It is good to have a pre-engagement to
the owner about the hack that you will do. Your reasons must
be for intellectual challenge or rewards, but whatever it is, talk
to the owner about the scope of the hack you will do because
through this you'll know the limits of your operation. This is a
good start to make the system of your targets more secure
because after you hack their system, you must give them the
solution on how to fix that hole in their system.
As the time goes by, Mr. K trained me after that first test to be
ethical. He gave me more tests and the challenge here is not
how I can hack the system, but how I can make it ethical. That's
why now all of the steps I am using in my journey such as the
Hacker Games Championship, my cyber security business and
Mapuan Files issue were purely ethical and no person nor
system has been harmed.
128
technology goes down in this world. Always remember that
technology is just a subordinate in hacking and the real power
of hacking lies on your mind, the hacker's mindset.
Some of them may say that what I've done in my past hacks is
just social engineering. Social engineering is all about hacking
the humans. However, social engineering is just one of the
capabilities of a hacker's mindset. Some of the capabilities of a
hacker's mindset are creating unconventional strategies that
can lead you to a more successful hacks, utilizing all of the
things you have and turn it into a powerful hacking weapon.
These are the reasons why you must not belittle the hacker's
mindset because it is has the greatest capability that any tool
can't have.
Now that you have a permit and a target you now have to do a
massive information gathering about the targets. Utilize all of
the things you have so that you can extract more information
about the target. The more information, the more chances you
can see a vulnerability in their system. Sometimes, the
passwords or any confidential information is right here in this
step. So now, start being a deep researcher because the more
you dig deeper, the more you can find valuable information.
129
Here, you must think out of the box and you must create the
smartest way to hack the target. Lastly, the ways you will
formulate in this step must be ethical. So now, start creating
more strategies on how you can hack a certain target because
it will let you look what your situation is and how possible it is
to achieve an impossible thing. Always remember that hacking
is also about the creation of strategies.
Finally, we have the execution where you will execute the plans
youve made from the most possible to the least possible. This
is for you to save time and of course you must be flexible
because most of the time, there will be some changes in your
methods.
130
will teach you the things you need to know first before jumping
in to technical hacking. This book is primarily focused on
developing a hacker's mindset which makes up the 80% of a
hacker and technical hacking is only subordinate in hacking
which is just 15% that's why I dedicated this whole book in
having a hacker's mindset.
1.) Phishing
This is the act of sending an email to a victim and
falsely claiming to be an established company in an
attempt to scam the user into surrendering confidential
information such as username and passwords. This email
will direct you to a website where you will be asked to
log-in or update any personal data such as password,
social security, bank account, and credit card numbers.
However, the website is fake and will capture all the data
youve entered.
Countermeasure:
Always check the URL of the website you are visiting.
Sometimes you can see that the website you are visiting
by appearance is really that website for example,
gmail.com. However, if you check the URL and turns that
it is not gmail.com but gm4il.com, it must be phishing.
2.) Keyloggers
It is a software or a hardware that records the real time
activity of a computer user including the keyboard keys
they press. It allows not only keyboard strokes to be
captured, but also capable of collecting screenshots
131
from the computer's victim. However, the primary goal of
hackers in using this is to collect sensitive
information like passwords and username.
Countermeasures:
Keylogger detection software can literally find
keyloggers. However, just like common anti-virus
software, it only detects recorded and known keylogger
software. Any new or unknown keylogging programs
won't be detected as their signatures aren't recognized
by the software.
Keyloggers are one of the primary reasons why you have
to turn on your firewall. The firewall prevents any
unauthorized information from leaving your computer. If
a keylogger is installed in your computer, the information
it's attempting to send can't get through. Although
Windows Firewall is somehow, useful, you should invest
in more secure firewall software.
You can use Spybot software which not only detects
keyloggers but also the Trojan horses (one of the ways
remote keyloggers are installed)
You can also use less popular operating system such as
GNU/Linux, which have very little compatible keylogger
software available.
132
you just have a little chitchat with the target about that
question then you'll discover the answer and break-in
to their account easily.
Countermeasures:
4.) R.A.T.
RAT stands for Remote Administration Tool. It is
mostly used for malicious purposes, such as controlling
the victim's computer remotely, stealing the victims'
data, deleting and/or editing some files on the victim's
computer. One can infect someone else by sending them
a file called Server. When this file is opened by the
victim, it will plant itself deep into the system and starts
to run in the background anonymously. Additionally, it
can also send a message to the attacker every
time the victim's computer is active like when a
computer is turned on.
133
RAM Memory, Computer Name, Network Address etc.)
Get passwords, credit card numbers, or any private data
View and control remote desktop. (Take a screenshot or a
snap from the webcam)
Record camera, or sound (Control mic and camera)
Control mouse or keyboard input
Almost everything you can do in your own computer.
Countermeasure:
RATs are one of the most difficult to detect because they
usually don't show up in the list of running programs or
tasks so it is better to have the best antivirus you can
ever have to defend yourself from this kind of attack.
Always keep your antivirus up to date.
Don't download files in the Internet from the parties you
don't actually know.
Countermeasures:
Use WPA encryption.
134
Use a strong password.
Countermeasures:
From a user's perspective, make sure that your password
is difficult to guess and can't be found in the dictionary. It
must have a symbol and numbers.
In the programmer's perspective, make sure that you
have an account locking program in your password
system. Locking an account after several unsuccessful
attempts (three to five) prevents a hacker from checking
multiple possible passwords to log in.
135
8.4 Learning Continuously
You also learned that all of this power must be used purely in
ethical. All of you now who read this book are responsible to
help our digital world to make it more secure. You are now
responsible to make a more secure cyberspace for the next
generation. For as a popular saying goes, With great power
comes great responsibility.
The good thing in this era is we have the Internet. You can
learn anything you want in just a click of a button. So go utilize
this thing called the Internet for your development. As a hacker,
you must learn continuously and you never stop learning
because every field in this life is a never-ending mystery so
learning must also be eternal for you to become ahead.
True learning will be yours forever if you will apply it in the real
world. So we are encouraging you to apply it, especially the
hacker's mindset:
Think Out of the Box
You Can Achieve Anything
There is NO 100% Secure in Cyberspace
Hackers Dig Deeper
Be a P.R.O. (Patient, Resourceful and Observant)
Those are the things most of the security professionals didn't
have. Most of them belittle it and say that they are already
using those things; but based on their acts, they're not.
136
Always remember that hacking's great power relies on the
hacker's mindset and not to the tools they are using. That's
why we want you to learn first how to hack without using any
tools. Again, technology is just a subordinate to hacking and
the only reason why technicalities are the main focus of hacking
nowadays is because we are in the technology era today.
However, reading this book will be for nothing if you won't apply
it so go apply what you've learned in this book ethically.
This book is a series. The book two of this will talk about the
technicalities in hacking so for those who are waiting for easy-
to-understand techniques about technical hacking, grab our
next book. This is for you to complete the 100% of a Be-Do-Re
hacker. By reading this book you just acquired the 80% of being
a hacker, the majority of being a hacker and the thing that
every hacker needs; and by reading the next book, you you will
now complete the 100% of becoming a Be-Do-Re hacker.
137
8.5 Join Us In Our Revolution!
Most of the bad people know how to use this power but only a
few good people know it. That's why I created this book: to
populate our cyberspace with superheroes or the ethical
hackers. If we overpopulate the cyberspace with superheroes,
then probably, the cybercrime rate will decrease. That will be
one of our solutions to definitely change not just the cyberspace
but also the world and this is your chance to be a part of it!
138
How to join in our revolution? Simply, spread the idea of this
book because the idea is bulletproof. We want it to spread like a
virus but with a good effect and social media is good with it so...
Take a photo with this book in your Facebook or Twitter
account.
Include our official hashtag #Cryptors
The caption must be related to the idea of this book
which is to become the modern superhero of this
society through the power of hacking.
Every month we will pick a winner whose picture is
extraordinary (25%), caption is motivating (25%) and
has the huge numbers of likes and shares/retweet
(50%).
The winner will be recognized in our social media
accounts and to our official website as one of the
modern superheroes who spread the golden idea of this
book. Then he/she can get the limited edition T-shirt of
Cryptors as a souvenir.
Why do this? The world needs the idea of this book and you
are one of the ways for them to discover this thing. This book is
a real treasure for those who want to make a difference in this
world so go spread the idea. We want the people to discover
this in the fastest way and to be honest; YOU are the key to it.
Why not pirate this book? By buying this book, whether it's in
a form of e-book or paperback, you just helped this revolution.
Encourage the people to buy and not to pirate this book. By
doing that, we can possibly make another book to expose the
truth and give the idea that the people must know about
hacking. And of course, if you value a thing then you will
probably spend a dime. So why not legally support this book?
139
Are you a shy person who doesnt want to take a picture?
Then you can still join the revolution by making a status update
in your social media like Facebook or Twitter with the hashtag
#Cryptors. Of course, the status must be about the idea of this
book we want to spread like a virus. The most liked and shared
status for the month will also get recognition on our website as
one of the superheroes who shared the golden idea of this
book. Then he/she can get the limited edition Cryptors T-shirt
as a souvenir.
140
(For the updated details here, just go to www.cryptors.org)
Whatever race, culture, religion you are right now you can still
join this revolution. This revolution will raise cyber security
awareness around the world. It will make our cyberspace more
secure and by just being with us in this revolution, you just
make a difference. Go! And become the superhero of this
modern society!
~ Things to Remember
141
Recommendations
Go to www.cybrary.it: (For FREE)
Learn CompTIA A+ (For you to know the basics of
computer software and hardware)
Learn CompTIA Network+ (For you to have an in
depth knowledge about networks)
Learn CompTIA Linux+ (For you to have an in
depth knowledge on how to use the Linux
platform)
Learn CompTIA Security+ (For you to have a
basic knowledge in security)
142
Resources
143