PRIYA ETHICAL HACKER
HACKING INFORMATION
Hacking:
Hacking is an attempt to exploit a computer system or a private network inside a computer. The person engaged in hacking activities is known as a hacker.
Hacker:
*A person who uses computers to gain unauthorized access to data.
*A person or thing that hacks or cuts roughly.
Types of hacker:
hacking often refer to the unauthorized intrusion into a network or computer; normally carried out by one or more "hacker". White, Black and Gray refer to the relationship between to hacker and the hacker and the systems they are attacking.
other types of hacker:
- Script kiddie
- Suicide hacker
- A Hacktivist
- Red hat hacker
- Blue hat hacker
- Green hat hacker
- Social Media hacker
Hacking Phases:
Search Engines:
Google, bing, yahoo, duckduckgo.........
A Web search engine or Internet search engine is a software system that is designed to carry out web search (Internet search), which means to search the world wide web in a systematic way for particular information specified in a textual web search query. the search results are generally presented in a line of results, often referred to as search engine results pages(SERPs). The information may be a mix of link to web pages, images,videos, info graphics, articles, research papers, and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler. Internet content that is not capable of being searched by a web engine is generally described as the deep web.
Google hacking:
Google hacking, also named Google dorking, is a computer hacking technique that uses Google search and other Google application to find security holes in the configuration and computer code that websites use.
Google Advance Operators:There are many similar advanced operators which can be used to exploit insecure websites:
Operator | Purpose | Mixes with Other Operators? | Can be used Alone? | Web | Images | Group | News |
In-title | Search page title | no | yes | yes | yes | yes | yes |
Allintitle | Search page title | no | yes | yes | yes | yes | yes |
Inurl | Search URL | yes | yes | yes | yes | not completed | like in-title |
Allinurl | Search URL | no | yes | yes | yes | yes | like in-title |
File type | Specific files | yes | yes | yes | no | Not completed | |
In-text | Search text of page only | yes | yes | yes | yes | yes | yes |
Allintext | Search text of page only | yes | yes | yes | yes | yes | |
Site | Search specific site | yes | yes | yes | yes | no | not completely |
Link | Search for links to pages | yes | yes | yes | no | no | not completely |
In-anchor | Search link anchor text | yes | yes | yes | yes | not completely | yes |
numrange | locate number | yes | yes | yes | yes | yes | not completely |
Date-range | Search in date range | yes | yes | yes | not completely | not completely | not completely |
Author | Group author search | yes | yes | no | no | yes | not completely |
Group | Group name search | yes | no | yes | yes | not completely | |
In-subject | Group subject search | yes | yes | like in-title | like in-title | yes | like in-title |
Msgid | Group msgid search | no | yes | not completely | yes |
Traceroute:
A trace-route is a function which traces the path from one network to another.
It allows us to diagnose the source of many problems.
Notes: To be effective, the trace-route must be run during a time when you are experiencing the problem, from a computer that is experiencing the problem.
Email Tracing: http://cyberforensics.in/OnlineEmailTracer/index.aspx Emailtrackerpro Tool
Email Tracing: http://cyberforensics.in/OnlineEmailTracer/index.aspx Emailtrackerpro Tool
Social Engineering
Art of convincing people to reveal their confidential information which they are unaware to protect it.
-
-
- Spam
- Phishing
- Spear phishing
-
- Fake call
- Fake sms
- Fake app
- Tailgating
- Piggybacking
- Reverse Social Engineering
Art of convincing people to reveal their confidential information which they are unaware to protect it.
-
- Spam
- Phishing
- Spear phishing
-
- Fake call
- Fake sms
- Fake app
- Tailgating
- Piggybacking
- Reverse Social Engineering
System Hacking
System Hacking
-Password Cracking:-
- Shoulder surfing
- Eaves Dropping
- Dumpster Diving
- Phishing
- Dictionary
- Brute Force
- SQL Injection
- Sniffing
- Cross-site Scripting Attack
- Know Vulnerability
- Rainbow table
- Hybrid
- Shoulder surfing
- Eaves Dropping
- Dumpster Diving
- Phishing
- Dictionary
- Brute Force
- SQL Injection
- Sniffing
- Cross-site Scripting Attack
- Know Vulnerability
- Rainbow table
- Hybrid
What to avoid while selecting your password?
Tips to Create A Strong Password
Malware threats & Antivirus
Malware: It's a short form of malicious software a malware is created with the intention to damage or take control of a computer, a still information from it. Malware attacks itself to the component of web pages pop up, advertisement, tool bars or free application from that users download.
Types of Malware:The most commonly used technique are as follows:-
- slow systems
- pop up's
- Unexpected system
- Excessive & Suspicious HDD (Hard Disk Drive) activity
-
Antivirus software, or anti-virus software is also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Malware: It's a short form of malicious software a malware is created with the intention to damage or take control of a computer, a still information from it. Malware attacks itself to the component of web pages pop up, advertisement, tool bars or free application from that users download.
Types of Malware:The most commonly used technique are as follows:-
- slow systems
- pop up's
- Unexpected system
- Excessive & Suspicious HDD (Hard Disk Drive) activity
- Antivirus software, or anti-virus software is also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Wi-Fi Hacking
WiFi hacking is essentially cracking the security protocol in a wireless network, granting full access for the hacker to view, store, download, or abuses the wireless network. Usually, when someone hacks into a Wi-Fi, they are able to observe all the data that is being sent via the network.
Wi-Fi Hacking
WiFi hacking is essentially cracking the security protocol in a wireless network, granting full access for the hacker to view, store, download, or abuses the wireless network. Usually, when someone hacks into a Wi-Fi, they are able to observe all the data that is being sent via the network.
Mobile Hacking
Although any mobile phone users may be targeted,"for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resource to make a concerted attack, it is usually more common, there are risks to face".
Mobile Hacking
Although any mobile phone users may be targeted,"for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resource to make a concerted attack, it is usually more common, there are risks to face".
Web Server Hacking
Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDoS) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.
Web Server Hacking
Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDoS) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.
Amazing work priya || Keep it up || God Bless You
ReplyDelete
Deletethank u for ur support
Nice one keep growing 💗
ReplyDeletethank u for ur support
Delete