π ️ Hacking Practice Guide: A Step-by-Step Tutorial for Beginners
Hello! π This guide is designed to help you practice hacking in a structured and easy-to-follow way.
Even if you are new to hacking, you can follow this step-by-step guide and complete the exercises successfully. π
1️⃣ Setting Up the Practice Environment π️
✅ 1. Installing a Virtual Machine
Hacking practice should be done in a safe, isolated environment, not on a real system.
We will use VirtualBox or VMware to set up virtual machines.
π Required Software Downloads:
- VirtualBox: π Download
- Kali Linux (OS with built-in hacking tools): π Download
- Metasploitable (Vulnerable practice server): π Download
Installation Steps:
- Install VirtualBox.
- Add Kali Linux and Metasploitable as separate virtual machines.
- Set Kali Linux as the attacker machine and Metasploitable as the target server.
- Connect both virtual machines to the same network (Host-Only Adapter).
Now, you're all set! π
2️⃣ Information Gathering (Reconnaissance) π΅️♂️
Before attacking a target, we must first gather information about it.
In this stage, we will find the target system's IP address, open ports, and running services.
π 1. Finding the Target IP Address
Open the terminal in Kali Linux and run the following command:
π This will reveal the IP address of the Metasploitable (target) machine.
π 2. Scanning for Open Ports
To check which services are running, we use a tool called Nmap.
π This command will display open ports and running services.
π‘ Example Nmap Scan Results:
Now, we know which services (web server, database, etc.) are running on the target system! π
3️⃣ Vulnerability Scanning (Scanning & Enumeration) π
Now, let's start analyzing the system for vulnerabilities.
π 1. Checking for Web Server Vulnerabilities
Metasploitable contains intentionally vulnerable web applications.
Open a web browser and visit http://[Target IP].
✅ You will see several vulnerable web applications.
✅ The target we will focus on is "Mutillidae".
Now, let's scan the website for security issues!
π Nikto will automatically detect security flaws in the web server.
4️⃣ Exploiting Vulnerabilities (Exploitation) π₯
Now, let's perform an actual attack.
We will try SQL Injection (database attack) to bypass login authentication.
π 1. Bypassing Admin Login with SQL Injection
- Open the Mutillidae website.
- Find the Login page.
- Enter the following credentials:
- Username:
' OR 1=1 --
- Password: (Leave empty)
- Username:
π Click "Login," and you will successfully log in as an administrator! π―
This attack technique is called SQL Injection, where poorly protected web applications allow unauthorized access to the database.
5️⃣ Privilege Escalation π
Now, let's go beyond web hacking and gain root (administrator) access to the target system.
π 1. Exploiting a Vulnerability with Metasploit
Open the terminal in Kali Linux and start Metasploit:
Once Metasploit is running, enter the following commands:
π Success! You now have access to the target server! π
Now, you can execute further attacks inside the system.
6️⃣ Covering Tracks (Hiding Evidence) πΆ️
Just because you've hacked into a system doesn’t mean your job is done!
To avoid detection, you need to erase logs and hide evidence.
π 1. Clearing Command History
π 2. Deleting Log Files
Now, no one will know that you were ever there! π
7️⃣ Final Steps: What to Do After Hacking Practice π
✅ Reset your virtual machine after each practice session!
✅ Always practice in a legally authorized environment.
✅ Use your knowledge to improve security, not to harm others.
Now, you’ve learned the basics of hacking! π
If you want to go deeper, explore web hacking, system hacking, and network hacking topics.
π₯ Want to try more advanced hacking exercises? Stay tuned for the next tutorial!
Comments
Post a Comment