PRIYA ETHICAL HACKER

HACKING INFORMATION

Hacking:

Hacking is an attempt to exploit a computer system or a private network inside a computer. The person engaged in hacking activities is known as a hacker.

Hacker:



*A person who uses computers to gain unauthorized access to data. 
                           *A person or thing that hacks or cuts roughly.

Types of hacker:

hacking often refer to the unauthorized intrusion into a network or computer; normally carried out by one or more "hacker". White, Black and Gray refer to the relationship between to hacker and the hacker and the systems they are attacking.
Most people in digital world agree there are three main TYPES OF HACKER:

other types of hacker:

Hacking Phases:



Search Engines:



Google, bing, yahoo, duckduckgo.........

Web search engine or Internet search engine is a software system that is designed to carry out web search (Internet search), which means to search the world wide web in a systematic way for particular information specified in a textual web search query. the search results are generally presented in a line of results, often referred to as search engine results pages(SERPs). The information may be a mix of link to web pages, images,videos, info graphics, articles, research papers, and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler. Internet content that is not capable of being searched by a web engine is generally described as the deep web.

Google hacking:

Google hacking, also named Google dorking, is a computer hacking technique that uses Google search and other Google application to find security holes in the configuration and computer code that websites use.
Google Advance Operators:There are many similar advanced operators which can be used to exploit insecure websites:

OperatorPurposeMixes with Other Operators?Can be used Alone?WebImagesGroupNews
In-titleSearch page titlenoyesyesyesyesyes
AllintitleSearch page titlenoyesyesyesyesyes
InurlSearch URLyesyesyesyesnot completedlike in-title
AllinurlSearch URLnoyesyesyesyeslike in-title
File typeSpecific filesyesyesyesnoNot completed
In-textSearch text of page onlyyesyesyesyesyesyes
AllintextSearch text of page onlyyesyesyesyesyes
SiteSearch specific siteyesyesyesyesnonot completely
LinkSearch for links to pagesyesyesyesnononot completely
In-anchorSearch link anchor textyesyesyesyesnot completelyyes
numrangelocate numberyesyesyesyesyesnot completely
Date-rangeSearch in date rangeyesyesyesnot completelynot completelynot completely
AuthorGroup author searchyesyesnonoyesnot completely
GroupGroup name searchyesnoyesyesnot completely
In-subjectGroup subject searchyesyeslike in-titlelike in-titleyeslike in-title
MsgidGroup msgid searchnoyesnot completelyyes

Traceroute:

A trace-route is a function which traces the path from one network to another.
It allows us to diagnose the source of many problems.
Notes: To be effective, the trace-route must be run during a time when you are experiencing the problem, from a computer that is experiencing the problem.

Email Tracing: http://cyberforensics.in/OnlineEmailTracer/index.aspx   Emailtrackerpro Tool


Social Engineering
Art of convincing people to reveal their confidential information which they are unaware to protect it. 

System Hacking

 

-Password Cracking:-

What to avoid while selecting your password?

Tips to Create A Strong Password

Malware threats & Antivirus

Malware: It's a short form of malicious software a malware is created with the intention to damage or take control of a computer, a still information from it. Malware attacks itself to the component of web pages pop up, advertisement, tool bars or free application from that users download.

Types of Malware:The most commonly used technique are as follows:-
  • slow systems
  • pop up's
  • Unexpected system
  • Excessive & Suspicious HDD (Hard Disk Drive) activity

  • Antivirus software, or anti-virus software is also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

Wi-Fi Hacking
WiFi hacking is essentially cracking the security protocol in a wireless network, granting full access for the hacker to view, store, download, or abuses the wireless network. Usually, when someone hacks into a Wi-Fi, they are able to observe all the data that is being sent via the network.

Mobile Hacking
Although any mobile phone users may be targeted,"for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resource to make a concerted attack, it is usually more common, there are risks to face".

Web Server Hacking

Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDoS) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.

Shell-shock:(software bug) Shell-shock, known as Bash-door, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014.

Comments

Post a Comment

If you want information about anything else, then tell me in your comment