🔰 Maltego🔰
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.
🔰 Course Content 🔰
✔Basic hacking terms
✔Build your hacking environment!
✔Set up instructions for Mac users ONLY
✔How to create a bootable USB of Kali Linux ( optional )
✔Updates How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
✔Linux Terminal including basic functionalities and CLI
✔What is Tor
✔ProxyChains
✔VPN
✔MACChanger
✔Footprinting
✔Attacking Wireless Networks
✔Break WPA/WPA2 Encryption
✔Signal Jamming and DOS
✔SSL Strips
✔Let's Have a Bit of Fun
✔Evil Twin
✔Attacking Router
✔DNS Setting Hacking to Redirect
✔SQL Injections
✔Brute-Forcing Methodes
✔DoS Attacks
✔Reverse Shells
✔Make your own Keylogger in C++
➖➖➖➖➖➖➖➖➖➖➖
✔Basic hacking terms
✔Build your hacking environment!
✔Set up instructions for Mac users ONLY
✔How to create a bootable USB of Kali Linux ( optional )
✔Updates How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
✔Linux Terminal including basic functionalities and CLI
✔What is Tor
✔ProxyChains
✔VPN
✔MACChanger
✔Footprinting
✔Attacking Wireless Networks
✔Break WPA/WPA2 Encryption
✔Signal Jamming and DOS
✔SSL Strips
✔Let's Have a Bit of Fun
✔Evil Twin
✔Attacking Router
✔DNS Setting Hacking to Redirect
✔SQL Injections
✔Brute-Forcing Methodes
✔DoS Attacks
✔Reverse Shells
✔Make your own Keylogger in C++
➖➖➖➖➖➖➖➖➖➖➖
🔥 Day 1
__Chapter 1__
🔰 Basic terminology 🔰
✔Type of Hackers
✔Footprinting
✔DoS (Just You)
✔DDoS (Multiple People)
✔FUD (Anti-Virus can not detect)
✔RAT
✔Phishing
✔SQL Injection
✔VPN
✔Proxy
✔Tor
✔VPS
✔Key Loggers
✔Terminal
✔Firewall
✔Root kit
✔Reverse-shells
➡➡➡➡➡➡➡➡➡➡➡➡➡➡
__Chapter 1__
🔰 Basic terminology 🔰
✔Type of Hackers
✔Footprinting
✔DoS (Just You)
✔DDoS (Multiple People)
✔FUD (Anti-Virus can not detect)
✔RAT
✔Phishing
✔SQL Injection
✔VPN
✔Proxy
✔Tor
✔VPS
✔Key Loggers
✔Terminal
✔Firewall
✔Root kit
✔Reverse-shells
➡➡➡➡➡➡➡➡➡➡➡➡➡➡
Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 1
🔰 Basic Terminologies 🔰
Part 1
Media is too big
VIEW IN TELEGRAM
__Chapter 1__
🔰 Basic Terminologies 🔰
Part 2
🔰 Basic Terminologies 🔰
Part 2
🔰 Build Your Hacking Environment 🔰
Installation of Kali Linux in Virtual Box or You can use Bootable Version of kali linux for practicing.
Installation of Kali Linux in Virtual Box or You can use Bootable Version of kali linux for practicing.
Media is too big
VIEW IN TELEGRAM
🔰 How to make Bootable USB-Drive 🔰
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
🔰 Linux Terminal Including Basic functionalities 🔰
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 1
🔰 Linux Terminal Including Basic functionalities 🔰
Part 1
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 2
🔰 Linux Terminal Including Basic functionalities 🔰
Part 2
Media is too big
VIEW IN TELEGRAM
__Chapter 2__
🔰 Linux Terminal Including Basic functionalities 🔰
Part 3
🔰 Linux Terminal Including Basic functionalities 🔰
Part 3
➖➖FOOTPRINTING➖➖
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system
======= @HackWorm =======
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system
======= @HackWorm =======
➖➖ Footprinting : Google Hacking ➖➖
Description: we are going to take a look at the Google Hacking Database. Google hacking (sometimes called Google Dorking) allows us to use specific strings to narrow down search results and potentially locate usernames, passwords, and other data. One thing to keep in mind is that Google frequently disables some of these, so the Google Hacking Database site is going to be a great long-term resource of what still works.
Requirements for the lab: Web Browser
Step 1: Open a Web browser
Step 2: Search for Google Hacking Database (https://www.exploit-db.com/google-hackingdatabase/ )
Step 3: Open the site
Step 4: Search for the word Excel in the search box
Step 5: This will show several commands you can use based on the data you are seeking.
Step 6: Open Google search and either type the command or just copy/paste
Description: we are going to take a look at the Google Hacking Database. Google hacking (sometimes called Google Dorking) allows us to use specific strings to narrow down search results and potentially locate usernames, passwords, and other data. One thing to keep in mind is that Google frequently disables some of these, so the Google Hacking Database site is going to be a great long-term resource of what still works.
Requirements for the lab: Web Browser
Step 1: Open a Web browser
Step 2: Search for Google Hacking Database (https://www.exploit-db.com/google-hackingdatabase/ )
Step 3: Open the site
Step 4: Search for the word Excel in the search box
Step 5: This will show several commands you can use based on the data you are seeking.
Step 6: Open Google search and either type the command or just copy/paste
➖➖ Footprinting : theHarvester ➖➖
Description: we are going to to use a tool called theHarvester. This tool is useful for gathering information on subdomains, employee names, emails, open ports, and banners. It gathers the information from public sources, like regular search engines and Shodan. You can read more about it here: https://tools.kali.org/information-gathering/theharvester
Requirements for the lab: Kali Linux
Step 1: Launch you Kali machine and login (Username is normally: root and the password is normally: toor )
Step 2: Open a Terminal window
Step 3: At the prompt, type theharvester -h to view the help file for the tool.
Step 4: We are just going to use one of the example statements from the help section. Please type this command: theharvester -d microsoft.com -l 50 -b google -h myresults.html
-d is the domain or company name to search. In this case, we are searching microsoft.com
-l is used to limit the results. In this case, we are limiting to just 50 results.
-b is used to define our data source. In this case, we are just using google.
-h allows us to use the Shodan database to query any discovered hosts.
➖➖➖ @HackWorm ➖➖➖
Description: we are going to to use a tool called theHarvester. This tool is useful for gathering information on subdomains, employee names, emails, open ports, and banners. It gathers the information from public sources, like regular search engines and Shodan. You can read more about it here: https://tools.kali.org/information-gathering/theharvester
Requirements for the lab: Kali Linux
Step 1: Launch you Kali machine and login (Username is normally: root and the password is normally: toor )
Step 2: Open a Terminal window
Step 3: At the prompt, type theharvester -h to view the help file for the tool.
Step 4: We are just going to use one of the example statements from the help section. Please type this command: theharvester -d microsoft.com -l 50 -b google -h myresults.html
-d is the domain or company name to search. In this case, we are searching microsoft.com
-l is used to limit the results. In this case, we are limiting to just 50 results.
-b is used to define our data source. In this case, we are just using google.
-h allows us to use the Shodan database to query any discovered hosts.
➖➖➖ @HackWorm ➖➖➖
Kali Linux
theharvester | Kali Linux Tools
theharvester Usage Example
Search from email addresses from a domain (-d kali.org), limiting the results to 500 (-l 500), using DuckDuckGo (-b duckduckgo):
root@kali:~# theHarvester -d kali.org -l 500 -b duckduckgo
***************************************…
Search from email addresses from a domain (-d kali.org), limiting the results to 500 (-l 500), using DuckDuckGo (-b duckduckgo):
root@kali:~# theHarvester -d kali.org -l 500 -b duckduckgo
***************************************…
[@HackWorm] How To Hack Facebook Account.pdf
578.9 KB
🔰 Exclusive 🔰
Find out the exact step by step methods hackers use to hack Facebook & how you can defend yourself.
Find out the exact step by step methods hackers use to hack Facebook & how you can defend yourself.
Media is too big
VIEW IN TELEGRAM
What is Tor & How to Configure it with Kali Linux
Part 1
Part 1
Media is too big
VIEW IN TELEGRAM
What is Tor & How to Configure it with Kali Linux
Part 2
Part 2