🔰 Reconnaissance:- 🔰
☯ This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc.🎇
☯ This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc.🎇
🔰 Scanning:- 🔰
☯It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.🎇
☯It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.🎇
🔰 Gaining Access:- 🔰
☯ After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.🎇
☯ After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.🎇
🔰 Maintaining Access:- 🔰
☯ Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system.🎇
☯ Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system.🎇
🔰 Covering Tracks:- 🔰
☯ Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.🎇
☯ Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.🎇
🔰 Information Gathering 🔰
Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
🔰 Footprinting 🔰
Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.
✔During this phase, a hacker can collect the following information −
✴Domain name
✴IP Addresses
✴Namespaces
✴Employee information
✴Phone numbers
✴E-mails
✴Job Information
➖➖ @HackWorm ➖➖
Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.
✔During this phase, a hacker can collect the following information −
✴Domain name
✴IP Addresses
✴Namespaces
✴Employee information
✴Phone numbers
✴E-mails
✴Job Information
➖➖ @HackWorm ➖➖
🔰 Maltego🔰
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.
🔰 Course Content 🔰
✔Basic hacking terms
✔Build your hacking environment!
✔Set up instructions for Mac users ONLY
✔How to create a bootable USB of Kali Linux ( optional )
✔Updates How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
✔Linux Terminal including basic functionalities and CLI
✔What is Tor
✔ProxyChains
✔VPN
✔MACChanger
✔Footprinting
✔Attacking Wireless Networks
✔Break WPA/WPA2 Encryption
✔Signal Jamming and DOS
✔SSL Strips
✔Let's Have a Bit of Fun
✔Evil Twin
✔Attacking Router
✔DNS Setting Hacking to Redirect
✔SQL Injections
✔Brute-Forcing Methodes
✔DoS Attacks
✔Reverse Shells
✔Make your own Keylogger in C++
➖➖➖➖➖➖➖➖➖➖➖
✔Basic hacking terms
✔Build your hacking environment!
✔Set up instructions for Mac users ONLY
✔How to create a bootable USB of Kali Linux ( optional )
✔Updates How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
✔Linux Terminal including basic functionalities and CLI
✔What is Tor
✔ProxyChains
✔VPN
✔MACChanger
✔Footprinting
✔Attacking Wireless Networks
✔Break WPA/WPA2 Encryption
✔Signal Jamming and DOS
✔SSL Strips
✔Let's Have a Bit of Fun
✔Evil Twin
✔Attacking Router
✔DNS Setting Hacking to Redirect
✔SQL Injections
✔Brute-Forcing Methodes
✔DoS Attacks
✔Reverse Shells
✔Make your own Keylogger in C++
➖➖➖➖➖➖➖➖➖➖➖
🔥 Day 1
__Chapter 1__
🔰 Basic terminology 🔰
✔Type of Hackers
✔Footprinting
✔DoS (Just You)
✔DDoS (Multiple People)
✔FUD (Anti-Virus can not detect)
✔RAT
✔Phishing
✔SQL Injection
✔VPN
✔Proxy
✔Tor
✔VPS
✔Key Loggers
✔Terminal
✔Firewall
✔Root kit
✔Reverse-shells
➡➡➡➡➡➡➡➡➡➡➡➡➡➡
__Chapter 1__
🔰 Basic terminology 🔰
✔Type of Hackers
✔Footprinting
✔DoS (Just You)
✔DDoS (Multiple People)
✔FUD (Anti-Virus can not detect)
✔RAT
✔Phishing
✔SQL Injection
✔VPN
✔Proxy
✔Tor
✔VPS
✔Key Loggers
✔Terminal
✔Firewall
✔Root kit
✔Reverse-shells
➡➡➡➡➡➡➡➡➡➡➡➡➡➡
Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 1
🔰 Basic Terminologies 🔰
Part 1
Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 2
🔰 Basic Terminologies 🔰
Part 2
🔰 Build Your Hacking Environment 🔰
Installation of Kali Linux in Virtual Box or You can use Bootable Version of kali linux for practicing.
Installation of Kali Linux in Virtual Box or You can use Bootable Version of kali linux for practicing.
Media is too big
VIEW IN TELEGRAM
🔰 How to make Bootable USB-Drive 🔰
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
🔰 Linux Terminal Including Basic functionalities 🔰