Grey Hack

Grey Hack

Not enough ratings
Project "Neophites Are Welcome"
By Kingslayer
If you don't understand it - you can't do it.
If you don't have a goal - you can't achieve it.
   
Award
Favorite
Favorited
Unfavorite
Basics

A typical approach in an attack on Internet-connected system is:

  • Network enumeration: Discovering information about the intended target.
  • Vulnerability analysis: Identifying potential ways of attack.
  • Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

Network enumeration
Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system runs on them.

Network enumeration is the discovery of hosts or devices on a network. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to fingerprint the operating system of the remote host.



A network enumerator or network scanner is a computer program used to retrieve usernames and info on groups, shares, and services of networked computers.

Network enumerators are often used by script kiddies for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, whois queries, zone transfers, ping sweeps, and traceroute can be performed.
Vulnerability analysis
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Firewalls defend computers from intruders by limiting access to ports and machines, but they can still be circumvented.)

Hackers may also attempt to find vulnerabilities manually. A common approach is to search for possible vulnerabilities in the code of the computer system then test them, sometimes reverse engineering the software if the code is not provided. Experienced hackers can easily find patterns in code to find common vulnerabilities.

Social engineering
In the second stage of the targeting process, hackers often use social engineering tactics to get enough information to access the network. They may contact the system administrator and pose as a user who cannot get access to his or her system. This technique is portrayed in the 1995 film Hackers, when protagonist Dade "Zero Cool" Murphy calls a somewhat clueless employee in charge of security at a television network. Posing as an accountant working for the same company, Dade tricks the employee into giving him the phone number of a modem so he can gain access to the company's computer system.

Hackers who use this technique must have cool personalities, and be familiar with their target's security practices, in order to trick the system administrator into giving them information. In some cases, a help-desk employee with limited security experience will answer the phone and be relatively easy to trick. Another approach is for the hacker to pose as an angry supervisor, and when his/her authority is questioned, threaten to fire the help-desk worker. Social engineering is very effective, because users are the most vulnerable part of an organization. No security devices or programs can keep an organization safe if an employee reveals a password to an unauthorized person.

Social engineering can be broken down into four sub-groups:
  • Intimidation As in the "angry supervisor" technique above, the hacker convinces the person who answers the phone that their job is in danger unless they help them. At this point, many people accept that the hacker is a supervisor and give them the information they seek.
  • Helpfulness The opposite of intimidation, helpfulness exploits many people's natural instinct to help others solve problems. Rather than acting angry, the hacker acts distressed and concerned. The help desk is the most vulnerable to this type of social engineering, as (a.) its general purpose is to help people; and (b.) it usually has the authority to change or reset passwords, which is exactly what the hacker wants.[32]
  • Name-dropping The hacker uses names of authorized users to convince the person who answers the phone that the hacker is a legitimate user him or herself. Some of these names, such as those of webpage owners or company officers, can easily be obtained online. Hackers have also been known to obtain names by examining discarded documents ("dumpster diving").
  • Technical Using technology is also a way to get information. A hacker can send a fax or email to a legitimate user, seeking a response that contains vital information. The hacker may claim that he or she is involved in law enforcement and needs certain data for an investigation, or for record-keeping purposes.
Exploitation
An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack.

Types of exploits
There are several methods of classifying exploits. The most common is by how the exploit communicates to the vulnerable software.

A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system.

A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator.

Common techniques

Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches the highest administrative level (often called "root").

Shellcode
A shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode.

Packet analyzer
A packet analyzer ("packet sniffer") is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Password cracking
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system.

Rootkit
A rootkit is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators.
Okay, what's next?
Now you go and take a mission in the game.

You have a target. DO YOUR RESEARCH.
Collect all the network data you can - global IP, local IP, ports and services.
Collect all the personal data you can - name, login credentials, email, phone, online schedule.

Now you have fuel for your engines of doom.
Start looking for VULNERABILITIES!
There's always something! Small steps matter!
Total control starts from foot at the door (google it)!

You think you're ready? Then execute the plan, and EXPLOIT the sh*t out of it!

Please do not forget to exclaim once you did it


But seriously -

11 Comments
sethm6348 29 Jun, 2022 @ 7:41pm 
(You have good examples when you give them tho)
sethm6348 29 Jun, 2022 @ 7:38pm 
Giving a sticker as well, you deserve it. You've gone almost exclusively on the definition side, but almost everyone which will either learn from or appreciate this guide will have at least enough patience to pull trough. So I approve of everything that is said, I'm a newbie but this really explained well what I already knew, even expanding sligthly on top of that, but this 'sligthly' was precious enough to deserve a sticker, keep up the good work! (I like how you tried to inspire people with your speech too)
Azrael 19 Sep, 2021 @ 5:37am 
u can't no scope irl can u lmfaoo
Isco 1 Sep, 2021 @ 4:25pm 
Nice book.I love the humour in it.Its true hacking is a life style, like people at the gym or else.
Kingslayer  [author] 22 Jul, 2021 @ 1:11am 
I don't get the point of using Any-FPS-game to actually practice warfare (like, wtf, dude?). It's not very realistic in a lot of aspects and isn't a pragmatic representation of actual war. That's what Gun ranges, Courses and KillHouses are for. I think the game should just be played for fun, but it's your game, so your rules.
Azrael 20 Jul, 2021 @ 10:34pm 
I don't get the point of using Grey Hack to actually practice attacks. It's not very realistic in a lot of aspects and isn't a pragmatic representation of actual hacking. That's what CTFs, Labs and Simulations are for. I think the game should just be played for fun, but it's your game, so your rules :p
Kingslayer  [author] 7 Apr, 2021 @ 3:20am 
Tnx love! :evelyn2077:
Hammer 6 Apr, 2021 @ 4:38pm 
Damn good guide, it doesn't give solutions, it gives essential concepts to succeeding!
Kingslayer  [author] 6 Feb, 2021 @ 11:46pm 
Thanks mate! :angrytiger:
Isco 6 Feb, 2021 @ 8:31am 
gaved you a sticker , you deserved it.