Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
🔰 Learn Ethical Hacking From Scratch 🔰

Premium Hacking Video Tutorial
Premium Hacking Software
Black Hat Techniques & much more
Download Telegram
🔰 Learn Ethical Hacking From Scratch 🔰
🔰 Why Teach/Learn Hacking 🔰
🔰 Course Overview 🔰
🔰 What is Hacking 🔰
💻 Type of Hackers
🔰 Information Gathering 🔰
Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
🔰 Footprinting 🔰
Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.

During this phase, a hacker can collect the following information −

Domain name
IP Addresses
Namespaces
Employee information
Phone numbers
E-mails
Job Information

@HackWorm
🔰 Maltego 🔰
🔰 Maltego🔰
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.
🔰 Course Content 🔰
Basic hacking terms
Build your hacking environment!
Set up instructions for Mac users ONLY
How to create a bootable USB of Kali Linux ( optional )
Updates How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
Linux Terminal including basic functionalities and CLI
What is Tor
ProxyChains
VPN
MACChanger
Footprinting
Attacking Wireless Networks
Break WPA/WPA2 Encryption
Signal Jamming and DOS
SSL Strips
Let's Have a Bit of Fun
Evil Twin
Attacking Router
DNS Setting Hacking to Redirect
SQL Injections
Brute-Forcing Methodes
DoS Attacks
Reverse Shells
Make your own Keylogger in C++

🔥 Day 1
__Chapter 1__
🔰 Basic terminology 🔰
Type of Hackers
Footprinting
DoS (Just You)
DDoS (Multiple People)
FUD (Anti-Virus can not detect)
RAT
Phishing
SQL Injection
VPN
Proxy
Tor
VPS
Key Loggers
Terminal
Firewall
Root kit
Reverse-shells

Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 1
Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 2
🔰 Build Your Hacking Environment 🔰

Installation of Kali Linux in Virtual Box or You can use Bootable Version of kali linux for practicing.
Media is too big
VIEW IN TELEGRAM
🔰 How to make Bootable USB-Drive 🔰
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 1
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 2
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 3
FOOTPRINTING


Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system

======= @HackWorm =======