An advanced hacking method where a hacker remotely hacks through a “chain” of servers in order to conceal his location to avoid being traced. Chain-hacking can be accomplished by using Telnet to remote into one server, and then another, and so on, making him untraceable by the F.B.I.
- The F.B.I. (Federal Bureau of Investigation) is a United States government agency whose main goal is to track down hackers. They are a hacker's worst nightmare and you should always use InPrivate Browsing and delete your internet cookies to avoid being traced.
- IP (Internet Protocol) Address
An IP Address (or just IP for short) is a numerical number assigned to every computer and server on the internet. They are often hidden by their server and are the first thing a hacker must have in order to hack it. Tools such as Ping and Tracer-T can be used to steal them.
- Internet Cookies
Internet cookies, also known as browser history, are files that get stored on your computer by Internet Explorer. Hackers should always cover their tracks by deleting these in order to avoid being traced by the F.B.I.
Keyloggers are the best hardware a hacker can own. Keyloggers plug into your victim’s computer and record what they type, revealing their information like passwords, logins, e-mails, or anything a hacker wants to know. Keyloggers are a great choice because they’re untraceable by antivirus software. Read more about keyloggers here.
- McAfee AntiVirus
A hacker’s worst nightmare. It has anti-virus protection and a firewall, but it can be penetrated if you know what you’re doing. People who are smart enough buy it and install it on their Windows computers. Fortunately tools like Sub7 and Telnet go undetected by McAfee because they’re encrypted.
Notepad is a text editor created by Microsoft. It comes automatically installed on Windows (just another reason why hacker’s use it) and is the #1 choice for editing text due to it’s availability and speed (it’s very small and runs fast if you know the keyboard shortcuts like I do). All of the hacking textfiles on this site were written by various hackers using Notepad, and it can even be used to create web sites like I did when I built this site.
- OS (Operating System)
The software that runs your computer and hacking tools. There are two types of operating systems: Microsoft Windows and Apple/Mac OS. Linux/UNIX is considered to be an OS, but hackers don’t consider it to be a good one for hacking because it only has a command line.
A hacking tool for stealing IP addresses from web sites so you can hack them. It works by flooding the server of your choosing and distracts it long enough to steal the IP. It is only available on Microsoft Windows.
A multi-function hacking tool that allows you to take control over your victim’s computer/server. It was built in the late 1980’s by legendary hacker, Mobman. Any serious hacker should have this ready to use at any given time.
A hacking tool that allows you to hack servers remotely and securely. Telnet is automatically encrypted and comes pre-installed on Microsoft Windows. Hackers use Telnet because of its ability to “chain-hack”.
An advanced hacking tool that is also pre-installed with Microsoft Windows. Tracer-T is used for viewing victim’s IP addresses and connection speeds. It also lists out which IP addresses are connecting to a specific site. Learn more about how Tracer-T works here.
- Visual Basic
A widely-used programming language created by Microsoft. It’s so complex that even Windows is built with it. Many hackers and developers use it to build GUI interfaces to track IP addresses and brute force password cracking. My hacking tools are also built using Visual Basic.