Professional Documents
Culture Documents
Basic Hacking Techniques (Linux)
Basic Hacking Techniques (Linux)
Basic Hacking Techniques (Linux)
aumif;qkom pmay 1
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 2
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
...
acwfrif;ndK
vG,fulavhvm tajccH Hacking enf;ynm
aumif;qkom pmay 3
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
odkY
.............................................
............................................
rS
............................................
...........................................
aumif;qkom pmay 4
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aus;Zl;wifvTm
pma&;ol
aumif;qkom pmay 5
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Disclaimer
uRefawmf a&;om;aom Basic Hacking Guide (vG,fulavhvm tajccH
Hacking enf;ynm) pmtkyo f nf uRefawmfwYdk EdkifiHwGif rMumrD vdt
k yfcsufwpfck
jzpfvmrnfh Security ydkif;qdik &f mtwGuf taxmuftyHh&&Sad p&ef Penetration
Tester tjzpf 0goemtavsmuf vkyfaqmifvo dk nfh enf;ynm pdwf0ifpm;olrsm;
twGufom &nf&G,fa&;om;xm;jcif;jzpfygonf/
odYkjzpfí þpmtkyyf g taMumif;t&mrsm;ESihf tajccH enf;ynmrsm;onf
Educational Purpose Only omjzpfjyD; rnfonfh Cyber Security Breaches udr k Q
tm;ray;yg/ tu,fí vkyfaqmifyguvnf; þpmtkyfEiS hf roufqidk fygaMumif;
BudKwif today;tyfygonfcifAsm/
pma&;ol
aumif;qkom pmay 6
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
DESCRIPTION
pm&Iol enf;ynmcspfoltaygif; r*FvmygcifAsm/ 'Dpmtkyfav;eJY
ywfoufjyD; trSmpm vdYk roHk;EIef;vdw k maMumifh Description (azmfjycsuf)
taeeJYom xnfo h Gif;vdu
k fyg&ap/ 'Dpmtkyfav;eJY ywfoufjyD; uRefawmfhtaeeJY
BudKwif aqG;aEG;p&mav;awG &SdaewmaMumifh 'DpmrsufESmav;awGudk jyD;qH;k wJt h xd
zwfay;zdkY awmif;qdyk g&apcifAsm/ 'Dpmtkyfav;udk uRefawmf a&;csifaewm tcsdef
awmfawmf MumygjyD/ taMumif;trsdK;rsdK;aMumifh ra&;jzpfchJygbl;/
tcsdKUuawmh uRefawmfhudk wGef;tm;ay;Muygw,f/ Hacking qdik f&m
pmtkyaf v;wpftkyf a&;zdYk taMumif;aygh/ 'gaMumifyh J uRefawmfh tm;vyfcsdefav;
awGudk tenf;i,fpD zJhjyD; 'Dpmtkyfav;udk a&;jzpfcyJh gw,f/ 'Dpmtkyfav;onf
rnfonfh Hacking pmtkyu f rdk Q wdu
k f&dkuf bmomjyefxm;wJh pmtkyf r[kwfyg/
'Dpmtkyfav; a&;zdYktwGuf uRefawmfhtaeeJY ud;k um;cJhwmawmh &Sdygw,f/
Hacking with Kali (James Broad & Andrew Binder) pmtkyu f dk ud;k um;cJhwmyg/
Chapter awGuda k wmh EC council &JU CEH module awGudk twk,ljyD;
pDpOfcJyh gw,f/ usef&Sw d Jh &Si;f vif;csufawGuadk wmh Kali &JU Official Page jzpfwJh
offensive security &JU Documentation awGudk ,lo;Hk xm;ygw,f/
'Dpmtkyfav; a&;wJt h cgrSm uRefawmfhtwGuf tBuD;rm;qHk; tcuftcJ
awG BuHKcJh&ygw,f/ wpfcku oabmw&m;ydkif;yg/ (uRefawmf wufczJh l;wJh Online
Training av;wpfck &Sdygw,f/ tcef; wpfckcsif;pDudk oabmw&m;ydkif;csnf;yJ
aqG;aEG;xm;wJh pmtkyf av;tkyfrSm wpftkyfudk pmrsufESm 500 0ef;usif &Sdygw,f/)
'Dae&mrSm uRefawmft h wGuf tcuftcJu oabmw&m;ydki;f awGudk xnfo h Gif;rvm;
z,fxm;rvm; qdw k m pOf;pm;&jcif; jzpfvmygw,f/
aumif;qkom pmay 7
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
pmzwfol tawmfrsm;rsm;onf oabmw&m;ydkif;qdik f&m awGudk zwfzYdk
ysif;Muw,f vdYk uRefawmf xifrdygw,f/ 'gayr,fh tcsdKUaom oabmw&m;ydkif;
awGudk em;rvnfbl;qd&k if (oabmw&m;rygwJh vufawGo Y nf) wwfajrmufzdkY
cufygw,f/ rjzpfrae em;vnf oifhwJh taMumif;t&mawGudk od&x Sd m;rSomvsif
xdt k aMumif;t&mawGay: rlwnf pOf;pm;&r,fh tajctae BuHKvmwJt h cg toH;k cs
Edkifygvdrfrh ,f/ 'gaMumifh 'DpmtkyfxJrSm oabmw&m;awGvnf; ygap?
pmrsufESmt&vnf; tqifajyap qdjk yD; twdck sKyf xnfo h Gif;azmfjycsufawG
yg0ifaeygw,f/
'gaMumifh tcsdKUaom ae&mav;awGrmS wpfa,mufrusef oabmayguf
em;vnfwmrsdK; rjzpfbJ usefcsif usefaecJhEdkifwJh tm;enf;csufwpfck
jzpfoGm;ygw,f/ Oyrm ajym&&if Networking eJY ywfoufjyD; od&eSd m;vnf xm;ol
awGu uRefawmf twdck sKyf ajymjyxm;ayr,fh zwfjyD; em;vnfEidk fayr,fh
networking eJY ywfoufjyD; avhvmxm;rI r&Sdao;olawGuawmh em;vnfzdkY
tenf;i,f BudK;pm;&r,fh tajctaeyg/ tJonftwGuf zwfoifw h Jh pmtkyaf wG
pdf awGudv k nf; Facebook Secret Group uae qufjyD; wifay;oGm;rSm
jzpfygw,f/ ,ckpmtkyfrSm yg0ifwJh Member Form rSm yHkpHav;jznfjh yD; ay;ydYjk cif;
tm;jzifh Facebook Secret Group udk 0ifa&mufEidk rf Sm jzpfygw,f/
'kwd, tcuftcJwpfcu k English tac:ta0:av;awGeJY ywfoufwm
yg/ tcsdKUaom a0g[m&awGudk jrefrmvdk ajymjyzdYk rvG,fwt Jh wGuf 'Dwidk ;f
xm;&ovdk jrefrmvdk ajymjyvdkY &wJh a0g[m&awGtwGufvnf; oH;k av;Budrfavmuf
jrefrmvdek JY English vdk wGjJ yD; azmfjyxm;ygw,f/ aemufyidk f;rSm xdk tac:ta0:
awGudk t*Fvdyfvdyk J oH;k ygw,f/ bmaMumifhvJ qdak wmh Vulnerability udk jrefrmvdk
tm;enf;csuf qdw k Jt
h aMumif; tBudrfBudrf wGjJ yD; azmfjyxm;ayr,fh uRefawmfh
oabmt& Vulnerability vdYkyJ ac:apcsifygw,f/ pm&IolawGvnf; tJovdyk J
rSwfxm;apcsifygw,f/ bmaMumifhvJq&dk ifawmh msf xJrSm vulns vdk
vulnerabilities udk twda k umuf oH;k &wmrsdK;awG BuHKwwfvdkY jzpfjyD; man awG help
awG azmfMunfhwJt h cgrSmvnf; xdpk um;vH;k awGudk em;vnfapcsifvYdyk g/
'gaMumifh uRefawmf BuHK&wJh 'kwd, tcuftcJonf a0g[m& (tac:
ta0:) ydkif; jzpfvmygw,f/ cke Oyrmtwdik ;f yJ aqG;aEG;&&if pmtkyfwpftkyv f ;Hk rSm
tm;enf;csuf vdYkcsnf;yJ wGifwGif oH;k oGm;vdkY &ayr,fh t*FvdyfpmvH;k awGyJ jrif&wJh
ae&mawGrSm rrSwfrdawmhrmS pdk;rdwmaMumifh jrefrmvdk ac:vdYk &ayr,fv h nf;
t*Fvdyfvdyk J nSyfoHk;vdu k fygw,f/ 'gaMumifh t*Fvdyfvdk pum;vH;k av;awG
nyfygaewmudk em;vnfay;MuygvdkY BudKwif yefMum;yg&ap/
aumif;qkom pmay 8
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
'Dpmtkyfav;onf uRefawmfhtwGuf yxrqHk; tawGt Y BuHK jzpfygw,f/
'gaMumifh tm;enf;csufawG &SdaeEdik yf gw,f/ 'Dpmtkyfav;udk tajccHtjzpf
xkwfa0jcif;om jzpfjyD; Hacking e,fy,fonf us,fajymvGef;wJt h wGuf 'Dpmtkyf
wpftkyfwnf;rSmawmh enf;ynm tm;vH;k udk yg0ifatmif xnfo h Gif;vduk fEidk fjcif;
r&SdcJhyg/ Oyrm - SQL Injection vdk tcef;rsdK;awGonf oD;oefY pmtkyf wpftkyf
a&;rSomvsif Manual vkyfaqmifEkid fzYdt k wGuf tqifajyrSm jzpfygw,f/ 'Dpmtkyf
xJrSmawmh tool awGeJY vkyfaqmifwJh tydkif;av;awGom xnfo h Gif; aqG;aEG;cJh
Edkifygw,f/
2018 ar vavmufrmS Hacking Tool rsm;udk toH;k jyKjcif; ESihf Hacking
Trick rsm; qdw k Jh pmtkyaf v; wpftkyf xyfrH xkwfa0oGm;ygr,f/ xdpk mtkyftwGuf
tajccHtjzpf 'Dpmtkyfuav;udk avhvmxm;oifyh gw,f/ 'DxJu vkyfaqmifcsuf
awGeJY oabmw&m;awGudk em;vnfvsif twdik f;twmwpfct k xd tajccHynm
vrf;aMumif;ay: ajccsEdik rf ,fvYdak wmh ,HMk unfxm;ygw,f/
'Dpmtkyfav;xJrSm yg0ifwJh taMumif;t&mawGonf uRefawmfh&JU Blog
av; jzpfwJh www.khitminnyo.com rSm a&;om;azmfjy xm;wJh taMumif;t&m
awGudk jyefvnf pkpnf; xkwfxm;jcif;vnf; r[kwfyg/ uRefawmfh&UJ blog
av;rSmvnf; avhvmvdYk &r,fh taMumif;t&mav;awGudk pDpOfxm;&Sday;ygw,f/
Kali Linux installer acG jyKvkyfenf;? Kali Linux udk wifjyD; toH;k jyKenf;?
VirtualBox rSm toH;k jyKenf;? Live Mode taeeJY toH;k jyKEdi k zf Ydk USB stick rSm
xnfo h Gif;enf; pwmawGudv k nf; Blog rSm pkpnf;ay;xm;ygw,f/ wifenf;udk
wpfa,mufcsif;pD twGuf uGefysLwm tajctaeay: rlwnfjyD; aqG;aEG;ay;oGm;rSm
jzpfwJt h wGuf BudKwifxm;p&mrvdyk gcifAsm/ (wifjyD;om;olawGuawmh jyefvkyfp&m
rvdkavmufyg/ jyefwifzkdY vdk rvdk pwmawGudk aqG;aEG;Edkifygao;w,fcifAsm)
aemufwpfcktaeeJY 'DpmtkyfxJrSm yg0ifwJh Tools/Application awGudk
bit.ly/kmn-app qdw k Jh vdyfpmav;udk Browser rSm &dkufxnfhvdkufwmeJY
emrnftvddkuf a'gif;,l&rSmawGudk pkpnf;ay;xm;wJh Page udk a&muf&ySd gr,f/
Latest Version awGcsnf;yJ pkpnf;ay;xm;ygw,f/ tjrJwrf; update version udk
&EdkifzkydY g/
'Dpmtkyfonf tjcm;aom pmtkyfawGeYJ EIdif;,SOMf unf&h if tacG rygygbl;/
tacGvkyef nf; eJY wifenf;awGuydk g rdrb d mom vkyfwwfapzdYk vrf;nTefay;wmu
tacGxnfo h Gif;ay;wmxuf ydkjyD; oifhavsmfr,fvYdk xifrw d t
Jh wGuf jzpfygw,f/
rdrbd mom zefwD;jcif;tm;jzifh xnfah y;wJt h acGudk upgrade jyefvkyf&wmxuf
Updated Version udk &&Sa d prSm jzpfygw,f/
aumif;qkom pmay 9
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
uRefawmf 'Dpmtkyfav;udk p a&;pOfrmS Kali Linux onf 2017.1 om
&Sdao;aomfvnf; pmtkyfav; a&;jyD;vdYk 'D azmfjycsufav; a&;aepOfrSm 2017.3
jzpfoGm;ygjyD/ 'gaMumifh rdrw k mom Updated Version (Latest Version) udk &,l
d Ydb
oH;k pGJwwfzdku
Y dk ydkjyD; tav;xm;cJhjcif;jzpfygw,f/
azmfjycsufeJw Y if tawmf &Snfvsm;oGm;jyDxifygw,f/ ed*kH;csKyftaeeJY
'DpmtkyfxJu taMumif;t&mawGudk ausmfrzwfzYd?k vdu k fvkyfzkdY vdt
k yfwJh ae&mawG
rSm vdu k fvkyfMunfjh yD;rS a&SUqufzwfzYdk eJY avhusifhzYdk vdt
k yfwJhae&mawGrSm wpfykdif;
rjyD;cif (aocsm rvkyfwwfao;cif) aemufwpfyidk ;f rqufzdkY pwmav;awGudk
BudKwif rSmMum;&if;eJY 'Dpmtkyfav;eJY ywfoufwJh azmfjycsufav;awGudk
&yfem;yg&apcifAsm/
pma&;ol
acwfrif;ndK
khitminnyo@khitminnyo.com
aumif;qkom pmay 10
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
1 Introduction to Hacking
1. Hacking qdkwm 20
2. Hacker qdkwm 20
3. Hacker trsdK;tpm;rsm; 20
3 Vulnerability Analysis 28
4 Linux Fundamental
1. Introduction to Linux 43
2. Unifying File System 44
3. The Command Line 45
APT Package Handling Utility 55
Update 57
Upgrade 57
Distribution Upgrade 59
Removing Package 59
Purge 60
aumif;qkom pmay 12
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
Clean 60
Autoclean 61
Combining to the commands 61
Removing Debian package 61
Tarballs 61
Linux System 63
8 Reconnaissance
Introduction 75
Start with the Target's own website 76
Website Mirroring 77
Command manual and help 78
Google Search 80
Google Hacking Database 85
Social Media 87
DNS & DNS Attack 87
aumif;qkom pmay 13
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
Zone Transfer 89
Information Gathering Tools in Kali Linux 91
Seven Steps of Information Gathering 91
WHOIS 92
9 Scanning
Introduction 95
Vocabulary & Definitions 95
Ping 96
Traceroute 101
Nmap Demonstration 102
Scanning with Nessus 112
Types of Scanning 122
Network Scanning 122
Port Scanning 126
Zenmap 128
10 Exploitation
Introduction 129
Attack Vectors and Attack Types 130
Local Exploits 132
Local Exploit Searching 132
Remote Exploit 136
Metasploit 136
Social Engineering Toolkit 137
Tables of Contents
CH Description Page
Introduction 150
Main Menu of SeToolkit 151
Social Engineering Attacks 152
13 Authentication System
Introduction
165
Authentication Protocol 166
CHAP Vs MS-CHAP 167
NTLM 168
Triple A (AAA) 169
Introduction 170
Aircrack Suite 172
Hacking Mac Filtering wifi 175
WEP Cracking 180
WPA & WPA2 189
aumif;qkom pmay 15
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
15 Banner Grabbing
Introduction 194
What is Banner Grabbing 195
Types of Banner Grabbing 197
Banner Grabbing Tools 198
Banner Grabbing Using Telnet 199
Countermeasures 201
16 Enumeration
Introduction 203
Applications 204
NetBIOS 204
SNMP 210
LDAP 211
NTP 216
SMTP 216
DNS Enumeration 217
Introduction 219
Password Attacks 219
Password Guessing 221
Password Hashing & Encryption 225
Cain and Able 226
Hacking Windows 7 without password 237
Creating Rainbow Tables in Windows 244
aumif;qkom pmay 16
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
Introduction 248
Spyware Distribution 250
PowerSpy 253
Keyloggers 257
Hardware Keyloggers 257
Software Keyloggers 259
Ultimate Keyloggers 260
Kernel Keyloggers 263
Protecting Yourself 263
Hijackthis 266
Key Scrambler 267
Introduction
269
Capabilities 271
Netcat 272
Trojan 276
DarkCometRat 277
Wrappers 284
File Joiner 284
Countermeasures 285
Tables of Contents
CH Description Page
21 Sniffers
Introduction 306
Wireshark 308
TCP Dump 312
Sniffing: Passive Vs Active Sniffing 313
Techinques for Poisoning Network 316
ARP Poisoning 318
MAC Spoofing 325
DNS Spoofing 325
Sniffing and Spoofing Tools 326
22 SQL Injection
Introduction
331
SQL Injection Methodology 333
Finding Vulnerable Website 334
Havij (Windows) 338
SQL Map 342
23 Mobile Hacking
Introduction 347
Area of Consider 347
Hacking Android Using Metasploit 348
TheFatRat Installation and Hacking with FatRat 353
aumif;qkom pmay 18
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
Tables of Contents
CH Description Page
24 Metasploit
Introduction 361
Metasploit Fundamental 367
Metasploit Framework Console 367
Payloads 371
Generating a Payload for Metasploit 373
Scanning in Metasploit 377
Finding Vulnerable MS-SQL systems 380
Introduction 384
Botnets 385
Botnet Tools 386
DoS & DDoS Tools 387
Dos Attack with Pent Menu 389
SYN Flooding in Metasploit 393
DoS with DAVOSET 395
DDoS Botnet Attack 397
DoS Attack Detection & Countermeasures 402
Introduction 405
Method 1 (Example with Setoolkit) 405
Method 2 (Example with Android Hacking) 412
aumif;qkom pmay 19
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
2. Hacker qdw
k m
Hacking udk vkyfaqmifol vdYk tvG,fq;Hk ajymvd&kY ygw,f/
pepftrsdK;rsdK;twGif;udk xGif;azmuf0ifa&mufol? tjcm;olawG&UJ uGefysLwmpepfawG
xJu ta&;ygwJh information (data) awGudk w&m;r0if &,l^zsufqD;ol?
qufoG,fa&;pepftrsdK;rsdK;udk Mum;jzwfem;axmifol (tcsuftvuf Mum;jzwf&,l
ol) ponfjzifh Hacker udk t"dyÜg,fzGifhqdkMuygw,f/
3. Hacker trsdK;tpm;rsm;
vkyfaqmifykHeJY cH,lcsufawGay:rlwnfjyD; Hacker awGudk trsdK;tpm;
cGJjcm;Muygw,f/ t"dutkyfpk oH;k pkuawmh Black Hat Hacker, White Hat Hacker
eJY Grey Hat Hacker wdYk jzpfMuygw,f/
Black Hat Hacker awGrSmawmh aumif;rGefus,fjyefYwJh uGefysLwmqdik f&m
todynmawG &SdaeMujyD; olwYd&k JU todynmA[kokwawGudk Internet Security udk
aumif;qkom pmay 20
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
ausmfjzwfcsdK;azmuf (Breach or Bypass) wJah e&mrSm toH;k jyKMuygw,f/ Black
Hat Hacker awGudk Cracker (or) Dark-site-hacker awGvYdv k nf;
ac:qdMk uygao;w,f/ uGefysLwmeJY euf0yfawGxJudk csdK;azmuf0ifa&mufol?
uGefysLwmAdik ;f &yfawGudk zefwD; ysHUyGm;apolawG[m Black Hat Hacker awG
jzpfMuygw,f/ olwdYk[m olwYd&k JU vkyfaqmifrIaMumifh wpfbufrSm jzpfoGm;r,fh
qH;k &IH;epfemrIawGudk xnfah wG;avh r&Syd gbl;/ rdrw d Ydt
k usdK;pD;yGm;udo k m Munfw h Jh
vkyf&yfawGrsdK; vkyfaqmifavh&MSd uygw,f/ 'gaMumifh Black hat hacker awG[m
pdwfxm;raumif; vkyf&yfraumif;wJh vlq;dk awGvdkY rSwf,lEidk yf gw,f/
Black Hat, White hat qdw k mawGu ]]The bad guys usually wore black
hats and the good guys wore white ones.}} qdw k Jh taemufwidk f; a&S; qd&k dk;pum;
wpfcu k ae qif;oufvmwm jzpfygw,f/ oabmu vlaumif;rsm;onf OD;xkyfjzL
aqmif;MujyD; vlqd;k rsm;u OD;xkyfteuf aqmif;Muonf aygh/
White Hat Hacker awGuvnf; Black Hat Hacker awGvy dk J
uGefysLwmpepfawG&JU tm;enf;csuf ,dak ygufawGudk &SmazGygw,f/ Black Hat
Hacker awGeJY rwlwmuawmh White Hat Hacker awGu &SmawGv Y mwJh
tm;enf;csufawGay: tcGihfaumif;,ljyD; wdu k fcu
dk fwmrsdK; rvkyb f J
tJonftm;enf;csufawGudk b,fvjdk yefvnfjyKjyifjyD; aumif;rGefatmifzefwD;rvJ
qdwk mudk BuHpnfvkyfaqmifygw,f/ olwYd&k JU prf;oyfvkyfaqmifrIaMumifh rnfou lY rdk Q
xdcdu k fepfemaprIr&Sdapatmif BuHpnfvkyfaqmif&jcif;rdkY White Hat Hacker awG&JU
vkyfaqmif&rIawGu vufawGrY Sm ydkcufcJygw,f/ jyD;awmh White Hat Hacker
awG[m pepfwpfckudk prf;oyfppfaq;zdkY vdt k yfwt Jh cg xdpk epf&JU ydkif&SifxH
cGihfawmif;jyD;rS xdpk epfudk xdcu
dk fapjcif;r&Sb d J Security t& tm;enf;csufawGudk
&SmazG&ygw,f/ tm;enf;csufawG &SmazGawG&Y ySd guvnf; ydkif&Six f H today;jcif; eJY
umuG,fEdik frnfh enf;vrf; &SmazGjcif;awGudk vkyfaqmifMuygw,f/
av;pm;twk,lzG,f pdwfxm;eJY vkyf&yfrsm;udk vkyfaqmifMuolawGaygh/
Grey Hat Hacker uawmh white rus Black rus Hacker awG
jzpfygw,f/ Black hat awGvdk pepfawGuv dk nf; rzsufqD;Muovdk White Hat
awGvdk ydkif&SifxHcGifah wmif;wmrsdK;vnf; rvkyw f wfMuygbl;/ White Hat awGvdk
cGihfrawmif;&ifawmifrS Black Hat awGvdk pepfawGudk xdcu dk fysufpD;aprIr&Sdatmif
vkyfaqmif&ifawmh Grey Hat vnf; rqdk;wJt h xJrSm yg0ifvmEdkifygw,f/ 'gayr,fh
Grey Hat Hacker tawmfrsm;rsm;uawmh rdrw d Yd&k JU prf;oyfrIaMumifh wpfbuf
System awG ysufpD;oGm;vnf; *&kpdkufavhr&SdMuygbl;/ 'gaMumifh pmzwfolu
White hat tjzpf r&yfwnfEi dk &f ifawmif rdrpd rf;oyfrItwGuf wpfzufpepfawG
aumif;qkom pmay 21
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
ysufpD;roGm;apzdkY *&kpkdufvkyfaqmifr,fq&dk ifawmh vlq;dk pm&if;xJrSm yg0ifrSm
r[kwfawmhbl;aygh/
'gawGuawmh Hacker awG&JU cH,lcsufeJY tjyKtrlawGay: rlwnfjyD;
cGJjcm;jcif;om jzpfygw,f/ em;vnfwwfuRrf;rI Skill t& cGJjcm;wmawGvnf;
&Sdygao;w,f/ 'DrmS awmh tJonftaMumif; xnfo h Gif;rajymawmhygbl;/
wu,fvdYkrsm; urÇmay:rSm Hacker awGom &Sdraebl;qdk&if ,aeY
uRefawmfwdYk toH;k jyKaewJh pepfawG[m ckvdk cdkifrmvHjk cHKvmr,frxifygbl;/ Black
Hat hacker awGu tm;enf;csufawG &SmazGwu dk fcdkufw,f/ White Hat Hacker
awGu tm;enf;csufawGudk &SmazGumuG,fw,f/ 'Dawmh pepfrsdK;pHktwGuf
aumif;usdK;jyKwJh White Hat Hacker awG[m vdt k yfcsufwpf&yf
jzpfvmygawmhw,f/
,aeYacwfudk jyefMunfhr,fqdk&if uRefawmfwYdEk dkifiHrSm tifwmeuf
toH;k jyKrIawG rsm;jym;vmw,f/ uGefysLwm toH;k jyKrIawGeJY uGef,uftoH;k csrIawG?
Website zefwD;toH;k jyKrIawG pwmawG[m vufzuf&nfqidk fupvdkY
ukrÜPDawGtxd wd;k wuftoH;k jyKrIawGudk jrifawGUvm&jyDjzpfygw,f/ tifwmeuf
toH;k jyKrIawG ydkrdrk sm;jym;vmwmeJt Y rQ tifwmeufqidk f&m qdu k fbmvHjk cHKa&;awG
ta&;ygvmovdk bPfvkyfief;awG? EdkifiHwumeJY ywfoufqufqHwJh aiGay;aiG,l
udpöawGudak wmifrS zke;f av;wpfv;Hk ay:uae vkyfaqmifEkid faewJah cwfrSm
qdu k fbm&mZ0wfrIawGvnf; ydkrrdk sm;jym;vmaewmaMumifh Cyber Security &JU
tcef;u@[m tvGefta&;ygvmygw,f/
Hacking udk pdwfr0ifpm;vsifawmifrS rdrw d Yd&k JU vHjk cHKa&;twGuf
Knowledge awG &SdzdYk vdt k yfvmygawmhw,f/ Hacking udk raumif;wJhtvkyfvdkY
w&m;ao owfrSwf,lqxm;wwfMuwJh tcsdKUaomolawGudk uRefawmfwYdk
ywf0ef;usifrSm jrifawGzY ;l Muygvdrrfh ,f/ uRefawmfaqG;aEG;cJhovdyk gyJ/
aumif;wJb h ufrSm toH;k csr,fh hacker awG uRefawmfwYdEk idk if HrSm ta&;ay:
vdt k yfvdkYaeygjyD/ rMumrD umvawGtwGif;rSm rjzpfraevdt k yfcsufwpf&yf
jzpfvmygawmhr,f/
Hacking ay: tjrifrMunfolrsm;udk ajymjyvdkwmwpfcu k Hacking qdw k m
vufeufwpfckygyJ/ aoewfwpfvuf &Sdw,fqdkygpdY/k tJonfaoewfu
vlqd;k vufxJrSm &Sdae&if vlaumif;awGtwGuf pdk;&drpf dwfypl &mjzpfaeayr,fh
tJonfaoewfuyJ &JawGvufxJrSm&Sad e&ifawmh vlaumif;awG pdwfylp&m
rvdkawmhygbl;/ aoewfonf vludk aoapEdik af yr,fh xdak oewfudk
udik fpGx
J m;olay:rSm rlwnfjyD; oufa&mufrI uGmjcm;oGm;ygw,f/
aumif;qkom pmay 22
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
1. Introduction to Linux
Linux qdwk mudk roH;k zl;&ifawmif Linux qdw k pJh um;vH;k udkawmh
uRsefawmfwdYk Mum;odz;l Muygw,f/ Operation System wpfckv;Hk udk &nf&, G fjyD;
uRefawmfwdYk ac:avh&SdwJh Linux qdw k m wu,fawmh BIOS/UEFI eJY Boot Loader
uae pwifwJh Operation System Kernel wpfckjzpfygw,f/
Linux udk 1991 ckEp S frmS Finish student wpfa,mufjzpfwJh Linus
Torvalds u pwifcJw h mjzpfjyD; olU&JU &nf&G,fcsufuawmh Free OS kernel wpfcu k dk
zefwD;ay;vdkwJh &nf&, G fcsufeJY pwifchJwmjzpfygw,f/ Linux ay:aygufvmyHkudk
tusOf;csKyf aqG;aEG;cJhwmjzpfygw,f/ ordkif;aMumif;udk razmfvdkawmhygbl;/
a&;xm;wJh pmayawGvnf; trsm;BuD;&Sv d Ydk jzpfygw,f/
GNU taMumif;av; qufvu dk f&atmif/ GNU qdw k mu Unix udk
qdv k m r[kwfygbl;/ trSwfrSm;Edkifwmav;awG&SdvdkY xnfah jymjcif;yg/ GNU u
k dw
Unix r[kwfayr,fh Unix-like Operating system wpfrsdK;jzpfjyD; 1984 ckEp S rf Sm
launch h mjzpfygw,f/ Free Software wpfrsdK;jzpfjyD; Kernel
vkyfcJw
yg0ifjcif;r&Sdygbl;/ tMurf;zsif;ajym&&if GNU qdw k mu Application awG?
Library awGeJY developer tool awG pwmawGudk aygif;pkxm;wJh software
collection wpfrsdK;om jzpfygw,f/ OS wpfc[ k m resource awGqDudk allocate
jyKvkyfzdYkeJY hardware awGudk ajymjyEdkifzYdt k wGuf tjcm; program wpfck
vdtk yfygw,f/ tJonf program uawmh kernel ygyJ/
Kernel rygcJhwJh GNU [m Linux udk ol& Y JU Kernel tjzpf
toH;k jyKxm;ygw,f/ 'gaMumifh GNU/Linux vdYk ac:qdMk uwm jzpfygw,f/ uJ
uRefawmfwdYkrSm Linux qdw k Jh Kernel eJY GNU qdw k Jh Operating System &SdaejyD
qdMk uygpdk/Y uRsefawmfwdYku ck tvG,fq;Hk ac:aeMuwm Linux qdak yr,fh wu,fu
GNU/Linux jzpfjyD; toH;k jyKol oef;aygif;rsm;pGm &SdaejyDjzpfygw,f/ GNU rSmvnf;
the Hurd vdYk ac:wJh ud, k fyidk f Kernel wpfc&k dSjyD; ,aeYcsdefxdtoH;k jyKrI
rwGiu f s,fao;yg/ yGJOD;xGufyif rawGzY ;l ao;yg/ quf&atmifaemf/
'DpmtkyfxJrSmawmh Linux Distro awG trsm;BuD;xJurS Kali Linux udk
t"duxm;jyD; toH;k jyKaqG;aEG;oGm;rSmjzpfw,fqw dk mav; xyfrHajymMum;yg&ap/
Kali Linux udk install jyKvkyfvdkygu vma&muf aqG;aEG;Edkifwt Jh aMumif; a&SUrSm
aumif;qkom pmay 43
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
azmfjycJhjyD;jyDaemf/ rdrw
d dYktaeeJY avhvmvkyfaqmifMunfch sifyguvnf; rdrw d Ydk
toH;k jyKr,fh Browser &JU address bar rSm bit.ly/kali-aio vkYd &dkufxnfhvdkuf&eHk YJ
Kali Linux udk &,lykH? Install jyKvkyfenf;trsdK;rsdK;ESifh tjcm;aom
odrSwfz, G f&mrsm;udk avhvmEdkifygao;w,f/
Kali Linux udk Install jy;D jyDvYdy
k J oabmxm;&atmif/ Linux eJY
ywfoufwJh tajccH odoifhodxu dk fwmav;awGudk 'Dae&mrSm qufvuf
aqG;aEG;oGm;rSmjzpfygw,f/
aumif;qkom pmay 45
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
txufyg yHkt& Desktop ay:u test directory xJrSm test two qdw
k Jh
emrnfeJY folder wpfck wnfaqmufwmjzpfygw,f/ 'gayr,fh ckcsdefrSm Desktop
ay:rSm&SdwJh test folder udk zGihfMunfrh ,fq&dk ifawmh
aumif;qkom pmay 48
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 49
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 50
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 52
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
cke command line xJrSmyJ echo "I am learning Ethical Hacking." >
test2.txtvdYk &dkufxnfv k fwmyg/ oabmu test2.txt zdkifudk txJu
h du
pmom;ae&mrSm I am learning Ethical hacking vdYk jyifr,faygh/
aumif;qkom pmay 53
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 54
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
txufygyHkudk Munfrh ,fq&dk if uRefawmfwYdt k aeeJY test2.txt zdkifudk
system wpfcv k fw,f/ /root/Desktop/test/test2.txt vdYk jywJt
k H;k rSm &Smvdu h wGuf
Desktop ay:u test qdw k Jh directory xJrSm&Sw
d ,fqw
dk mudk odEdkifjyD jzpfygw,f/
'Dae&mrSm xyfrHjznfhpGuf ajymvdw k mu Linux system onf Case Sensitive
jzpfw,fvdkY qdck Jw h ,faemf/ pmvHk; tBuD;tao; vG&J ifvnf; &Smwm
awGYrmS r[kwfygbl;/ tJonfawmh uRefawmfwYdk &Smr,fh zdkifu T tBuD;vm;?
tao;vm; *&kpkduf a&;&ygr,f/ tBuD;vm; tao;vm; rod&ifawmh
zdkifemrnfae&mrSm [Tt]est2.txt qdjk yD; tppmvH;k tBuD;jzpfjzpf tao;jzpfjzpf
jyygvdkY qdv
k du
k fjcif; jzpfygw,f/
Update
apt-get onf app & dependency awGudk install ay;Edki& H mru install
f ko
xm;wJh package awGtwGuf update &&SdEdkifrI tajctaeudyk g azmfjyay;Edkifovdk
update vnf; jyKvkyfay;Edi k yf gao;w,f/ sources list xnfo h Gif;jyD;onfhtcg jzpfap?
source wpfcc k k ajymif;vJonft h cgjzpfap? jznfo
h Gif;vdu k fwJh source topfudk
uRefawmfwdYk&JU pepfeJY csdwfqufEdkifzdkYtwGuf apt-get update command udk
toH;k jyK&ygw,f/ xdYktwlygyJ/ uRefawmfwYd&k JU pepfxJrSm&SdwJh package awGtwGuf
upgrade &&SdEdkir I wGufvnf; apt-get update eJY ppfaq;Edkifygao;w,f/
f t
(rSwfcsuf/ / apt-get tpm; apt udyk J toH;k jyKEdkifygw,f/Oyrm apt update,
apt install gimp, ...)
Upgrade
rnfonfh pepfrQ tNrJwrf; jyD;jynfph rHk aeyg/ t"du Operating System
udk wd;k wufatmif jyKvkyfwm? oH;k &ydrk kv
d G,fulatmif zefwD;wm?
wd;k wufaumif;rGeaf tmifvkyfwm? patch management awG? new feature awG
xnfo h Gif;wm? bugs awGudk rSeaf umifatmif jyKjyifwm pwmawGtwGuf tpOftjrJ
development state rSm &Sdaeygw,f/
uRefawmfwdYk&JU Kali Linux rSm xnfo h Gif;toH;k jyKxm;wJh package
awGtwGuf new version awG&&Sdwt Jh cg upgrade jyKvkyfEidk rf ,fh command
udvk nf; apt-get (or) apt eJY toH;k jyK&ygw,f/ upgrade jyKvkyfp&m&Sad ewJt h cg
(qdv k mu application wpfck Am;&Sif;topf xGufwt
k dw Jh cg) apt-get update (or)
apt update vkyfMunf& h if 'Dvdk ay:ygr,f/
apt-get install (or) apt install command udk toH;k jyKwt Jh cg tcsdKUaom
package awGrSm install vkyf rvkyf twnfjyK&ygw,f/ tcsdKUtwGufawmh
rvdktyfygbl;/ Do you want to continue? [Y/n] qdjk yD; ar;avh&ySd gw,f/ y udk
tBuD;jzpfap tao;jzpfap &dkufxnfhjyD; enter Edkifygw,f/ Y/n rSm Y udk
tBuD;pmvH;k eJY azmfjyxm;wmu default u Y vdYk qdv dk myg/ N udk tBuD;eJY
k w
azmfjyxm;&ifawmh Default u N vdYk od&ygr,f/ ckykHt&awmh install vkyfrmS rdkY Y
udk ajz&ygr,f/ xdo k dYk Y/n ar;aomtqifhudk ausmfvydk gu toH;k jyKr,fh command
&JU aemufrSm -y vdYk xnfah y;vdu k f&yHk gyJ/ Oyrm gimp udk Y/n rajz&bJ install
aumif;qkom pmay 58
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
vdyk gu apt install gimp -y (odYrk [kwf) apt-get install gimp -y qdjk yD; command
&dkuf&rSm jzpfygw,f/ install progress 100% jynfjh yD; command line
aemufwpfaMumif; ay:ygu install jyD;qH;k jyDjzpfygw,f/
Distribution Upgrade
'Dtydkif;uawmh apt upgrade wdYv k dk rMumcP &&SdEidk fwmawmh
r[kwfygbl;/ Kernel Version jrifhoGm;wmrsdK;? 'grSr[kwf system version topf
xyf&wmrsdK; (Oyrm- Android Version 5 uae 6, 7 xd jriS Efh kdifwmrsdK;) awGtwGuf
rSom vkyfaqmiftoH;k jyKEdkifrSmjzpfygw,f/ Oyrm - uRefawmfwYdu k Kali Linux
2016.2 udk Install jyKvkyfxm;w,f/ ck ('Dpma&;aewJc h sdefrmS ) Kali Linux Version
u 2017.1 xd a&muf&So d Gm;ygjyD/ 'Dawmh uRefawmfwYdt k aeeJY topfjyefwif
&rSmvm;/ rvdkygbl;/ tJonf tajctaetwGuf uRefawmfwYdk toH;k jyKEdik fr,fh
command av;wpfck &Sdygw,f/ tJ'guawmh apt dist-upgrade (or) apt-get
dist-upgrade yJ jzpfygw,f/
ajymzdkY arhoGm;w,fAsm/ apt command (apt update, apt upgrade, apt
install, apt dist upgrade) awGudk toH;k jyKr,fq& dk if tifwmeufawmh
vdt
k yfygw,f/ tifwmeufvidk f; csdwfqufxm;rSom vkyfaqmifvYdk &ygr,fAs/
Removing Packages
install taMumif; odjyDqdkawmh uninstall udk qufaqG;aEG;ygr,f/ install
& remove yJ uGmjyD; vkyfaqmif&wmawmh wlnDygw,f/ Oyrm - gimp udk
jyefjzKwfcsif&if apt remove gimp (or) apt-get remove gimp qdjk yD;
toH;k jyKEdik fygw,f/ yHkeJaY wmh vkyfrjyawmhbl;aemf/
Auto-removing
uRefawmfwdYk&JU Operating System xJu package (application) awGudk
upgrade h cg xdk package awG&JU old version awG[m rvdktyfbJ
jyKvkyfvdkufwJt
aumif;qkom pmay 59
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
usef&Sad eygawmhw,f/ 'gawGudk z,f&Sm;ay;zdYk vdt k yfygw,f/ upgrade (or)
dist-upgrade jyKvkyfjyD;wdi h ,f qdyk gawmh/ ay;&r,fh command u
k f; vkyfoifw
awmh apt autoremove jzpfygw,f/ autoremove udk cGJra&;ygbl;/
Purge
purge udak wmh linux user tcsdKUu rodMuovdk tcsdKUu
a&SmifMuygw,f/ remove eJY purge rwlnDygbl;/ bmuGmvJqadk wmh apt remove
pkg u package wpfckudkom uninstall vdu k fwmjzpfjyD; configuration file awGudk
zsufroGm;ygbl;/ aemufwpfBudrf vdt k yfwJhtcg jyefvnftoH;k jyKapEdkifzdkY
pufxJrSmyJ xm;xm;cJhygw,f/ purge uawmh configuration file awGuydk g tm;vHk;
zsufvdu k fygw,f/ 'gqdk bmvdYk purge udk oH;k aeao;vJ vdYk ar;p&m
&Sdaumif;&Sdygr,f/
oluY dk app wpfckudk vH;k 0 reinstall jyefvnfjyKvkyfvdkwJhtcg oH;k ygw,f/
configuration file xJrSm rSm;,Gif;oGm;wm? jyifrdvu dk fjyD; arhoGm;vdYk program
tvkyfrvkyaf wmhwm pwJhtajctaersdK;twGufvnf; apt purge pkg-name udk
toH;k jyKygw,f/ Oyrm gimp udk tm;vH;k ukefpifatmif jzKwfjyD; jyefxnfhoHk;csif&if
apt purge gimp eJYjzKwfjyD; apt install gimp eJY jyefoGif;aygh/
Clean
uRefawmfwdYkawG apt install pkg eJY install jyKvkyfwjJh zpfpOfrSm package
awGudk oufqdik &f m sources uae download &,lygw,f/ jyD;wJt h cg unpackage
vkyfjyD; install w,faygh/ install jyD;oGm;wJhtcg rvdktyfawmhwJh package awG[m
uRefawmfwdYk&JU system xJrSm usefae&pfcyJh gw,f/ tJovdek YJ rsm;jym;vmwJh
tcgrSmawmh HDD space awG avsmhenf;ukefygawmhw,f/ 'gaMumifh olwYdu k dk
clean vkyfay;zdYk vdt
k yfjyD; tJonftwGuf apt clean (or) apt-get clean udk
aumif;qkom pmay 60
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
toH;k jyKEdik fygw,f/
Auto clean
clean eJY vkyfaqmifykc
H sif; wlwJh autoclean udak wmh apt upgrade eJY apt
dist-upgrade awG vkyfjyD;wJhtcsdea f wGrSm oH;k ygw,f/ app wpfck version opf
upgrade jyD;wJt h cg version ta[mif;udk &Si;f ay;w,fvYdk rSwfxm;Edkifygw,f/ olu Y dk
k awmh apt autoclean (or) apt-get autoclean jzpfygw,f/
toH;k jyKyHu
Tarballs
uRefawmfwdYk odMuwJh zip, rar wdYkvdk file archives vkyfwJh program
wpfcyk g/ Tape Archives udk twdak umufjyKjyD; TAR vdYk ac:qdyk gw,f/ zdkifawG
h wGuf zip wdYk rar wdYkvydk J tarball format udv
trsm;BuD;udk pkpnf;EdkifwJt k nf;
toH;k jyKMuygw,f/ Linux package awGrSm t"du toH;k jyKMuygw,f/
toH;k jyK&r,fh command u tar -cf name.tar.gz file1 file2 file3 qdw k Jh
yHkpHrsdK; jzpfygw,f/ tar -cf u tar zdkifwpfck zefwD;r,fvYdk qdvk ydk gw,f/ name.tar.gz
rSm emrnfu rdrEd Spo f uf&m ay;vdYk&ayr,fh no space jzpf&ygr,f/ .tar.gz eJY
qH;k &ygr,f/ file1,2,3,.. awGuvnf; rdrw d Ydk xnfo
h Gif;vdw
k Jh zdkifawG jzpf&ygr,f/
vuf&Sd directory xJrSm &Sdae&ygr,f/ ckaerSm ls eJY list vkyfMunfrh ,fq&dk ifawmh
vuf&Sd terminal rSmyJ rm udk oH;k jyD; 1.txt eJY 2.txt qdw
k Jh zdkifawGudk
zsufvduk fygw,f/ ls eJYMunfw Jh cg rawGaY wmhygbl;/ cke tar awGudk
h t
jyefjznf&atmif/
aumif;qkom pmay 62
vG,fulavhvm tajccH Hacking enf;ynm acwfrif;ndK
aumif;qkom pmay 64