Professional Documents
Culture Documents
Basic Hacking Techniques PDF
Basic Hacking Techniques PDF
pma&;ol
Disclaimer
uRefawmf a&;om;aom Basic Hacking Guide (vG,fulavhvm tajccH
Hacking enf;ynm) pmtkyo f nf uRefawmfwdYk EdkifiHwGif rMumrD vdt
k yfcsufwpfck
jzpfvmrnfh Security ydkif;qdik &f mtwGuf taxmuftyHh&&Sad p&ef Penetration
Tester tjzpf 0goemtavsmuf vkyfaqmifvdo k nfh enf;ynm pdwf0ifpm;olrsm;
twGufom &nf&G,fa&;om;xm;jcif;jzpfygonf/
odYkjzpfí þpmtkyyf g taMumif;t&mrsm;ESihf tajccH enf;ynmrsm;onf
Educational Purpose Only omjzpfjyD; rnfonfh Cyber Security Breaches udr k Q
tm;ray;yg/ tu,fí vkyfaqmifyguvnf; þpmtkyfEiS hf roufqidk fygaMumif;
BudKwif today;tyfygonfcifAsm/
pma&;ol
CHAPTER 1: Introduction to Hacking
1. Hacking qdw
k m
Hacking qdw
k m bmvJqdw k mawGeJyY wfoufjyD; uRefawmfwYdk Budrfzefrsm;pGm
odzl;zwfz;l jyD;jzpfaewmrdYk 'Dae&mrSm vd&k if;awGudkcsnf; azmfjyoGm;ygawmhr,f/
Hacking u ]]hack = ckwfxpfonf/ jzwfawmufonf/}} qdw k Jh English Word
wpfcu k ae qif;oufvmwmjzpfjyD; uGefysLwme,fy,frSmawmh ]]gaining
unauthorized access to data in a system or computer }} vdYk zGihfqMdk uygw,f/
'gaMumifh enf;ynme,fy,frmS awmh Hacking qdw k m[m euf0yf
(odYrk [kwf) uGefysLwm (odYkr[kwf) pepf wpfckck\ cGihfjyKcsufay;rxm;aom
tcGiht f a&;udk &,l oH;k pGJjcif;/ wpfenf;tm;jzifh tqdyk g euf0yfjzpfap?
uGefysLwmjzpfap? pepfwpfcck kjzpfap twGif;odkY cGihfjyKcsufr&SdbJ 0ifa&mufjcif; vdYk
qdv
k ydk gw,f/
Cambridge Dictionary t&qd&k ifawmh Hacking qdw k monf
uGefysLwmpepfwpfckcktwGif; odak vSmifxm;aom tcsuftvufrsm;udk
&,l&efjzpfap? xdu k GefysLwmpepfrsm;twGif; Adkif;&yfrsm; jyefYyGm;ap&efjzpfap ponfh
&nf&, G fcsufrsdK;jzifh uGefysLwmudk w&m;r0if toH;k jyKjcif; vdYk zGihfqydk gw,f/
2. Hacker qdw
k m
Hacking udk vkyfaqmifol vdYk tvG,fq;Hk ajymvd&kY ygw,f/
pepftrsdK;rsdK;twGif;udk xGif;azmuf0ifa&mufol? tjcm;olawG&UJ uGefysLwmpepfawG
xJu ta&;ygwJh information (data) awGudk w&m;r0if &,l^zsufqD;ol?
qufoG,fa&;pepftrsdK;rsdK;udk Mum;jzwfem;axmifol (tcsuftvuf Mum;jzwf&,l
ol) ponfjzifh Hacker udk t"dyÜg,fzGifhqdkMuygw,f/
3. Hacker trsdK;tpm;rsm;
vkyfaqmifykHeJY cH,lcsufawGay:rlwnfjyD; Hacker awGudk trsdK;tpm;
cGJjcm;Muygw,f/ t"dutkyfpk oH;k pkuawmh Black Hat Hacker, White Hat Hacker
eJY Grey Hat Hacker wdYk jzpfMuygw,f/
Black Hat Hacker awGrSmawmh aumif;rGefus,fjyefYwJh uGefysLwmqdi k f&m
todynmawG &SdaeMujyD; olwdYk&JU todynmA[kokwawGudk Internet Security udk
ausmfjzwfcsdK;azmuf (Breach or Bypass) wJah e&mrSm toH;k jyKMuygw,f/ Black
Hat Hacker awGudk Cracker (or) Dark-site-hacker awGvYdv k nf;
ac:qdMk uygao;w,f/ uGefysLwmeJY euf0yfawGxJudk csdK;azmuf0ifa&mufol?
uGefysLwmAdik ;f &yfawGudk zefwD; ysHUyGm;apolawG[m Black Hat Hacker awG
jzpfMuygw,f/ olwYd[ k m olwdYk&JU vkyfaqmifrIaMumifh wpfbufrSm jzpfoGm;r,fh
qH;k &IH;epfemrIawGudk xnfah wG;avh r&Syd gbl;/ rdrw d Ydt
k usdK;pD;yGm;udo k m Munfw h Jh
vkyf&yfawGrsdK; vkyfaqmifavh&SMd uygw,f/ 'gaMumifh Black hat hacker awG[m
pdwfxm;raumif; vkyf&yfraumif;wJh vlqd;k awGvdkY rSwf,lEidk yf gw,f/
Black Hat, White hat qdw k mawGu ]]The bad guys usually wore black
hats and the good guys wore white ones.}} qdw k Jh taemufwidk f; a&S; qd&k dk;pum;
wpfcu k ae qif;oufvmwm jzpfygw,f/ oabmu vlaumif;rsm;onf OD;xkyfjzL
aqmif;MujyD; vlq;dk rsm;u OD;xkyfteuf aqmif;Muonf aygh/
White Hat Hacker awGuvnf; Black Hat Hacker awGvy dk J
uGefysLwmpepfawG&JU tm;enf;csuf ,dak ygufawGudk &SmazGygw,f/ Black Hat
Hacker awGeJY rwlwmuawmh White Hat Hacker awGu &SmawGv Y mwJh
tm;enf;csufawGay: tcGihfaumif;,ljyD; wdu k fcu
dk fwmrsdK; rvkyb f J
tJonftm;enf;csufawGudk b,fvdjk yefvnfjyKjyifjyD; aumif;rGefatmifzefwD;rvJ
qdw k mudk BuHpnfvkyfaqmifygw,f/ olwdYk&JU prf;oyfvkyfaqmifrIaMumifh rnfou lY rdk Q
xdcu dk fepfemaprIr&Sdapatmif BuHpnfvkyfaqmif&jcif;rdkY White Hat Hacker awG&JU
vkyfaqmif&rIawGu vufawGrY Sm ydkcufcJygw,f/ jyD;awmh White Hat Hacker
awG[m pepfwpfckudk prf;oyfppfaq;zdkY vdt k yfwt Jh cg xdpk epf&JU ydkif&SifxH
cGihfawmif;jyD;rS xdpk epfudk xdcdu
k fapjcif;r&Sbd J Security t& tm;enf;csufawGudk
&SmazG&ygw,f/ tm;enf;csufawG &SmazGawG&Y Syd guvnf; ydkif&Six f H today;jcif; eJY
umuG,fEidk frnfh enf;vrf; &SmazGjcif;awGudk vkyfaqmifMuygw,f/
av;pm;twk,lzG,f pdwfxm;eJY vkyf&yfrsm;udk vkyfaqmifMuolawGaygh/
Grey Hat Hacker uawmh white rus Black rus Hacker awG
jzpfygw,f/ Black hat awGvdk pepfawGudv k nf; rzsufqD;Muovdk White Hat
awGvdk ydkif&SifxHcGiafh wmif;wmrsdK;vnf; rvkyw f wfMuygbl;/ White Hat awGvdk
cGihfrawmif;&ifawmifrS Black Hat awGvdk pepfawGudk xdcu dk fysufpD;aprIr&Sdatmif
vkyfaqmif&ifawmh Grey Hat vnf; rqdk;wJt h xJrSm yg0ifvmEdkifygw,f/ 'gayr,fh
Grey Hat Hacker tawmfrsm;rsm;uawmh rdrw d dYk&JU prf;oyfrIaMumifh wpfbuf
System awG ysufpD;oGm;vnf; *&kpdkufavhr&SdMuygbl;/ 'gaMumifh pmzwfolu
White hat tjzpf r&yfwnfEdi k &f ifawmif rdrpd rf;oyfrItwGuf wpfzufpepfawG
ysufpD;roGm;apzdkY *&kpkdufvkyfaqmifr,fqd&k ifawmh vlq;dk pm&if;xJrSm yg0ifrSm
r[kwfawmhbl;aygh/
'gawGuawmh Hacker awG&JU cH,lcsufeJY tjyKtrlawGay: rlwnfjyD;
cGJjcm;jcif;om jzpfygw,f/ em;vnfwwfuRrf;rI Skill t& cGJjcm;wmawGvnf;
&Sdygao;w,f/ 'DrmS awmh tJonftaMumif; xnfo h Gif;rajymawmhygbl;/
wu,fvYdrk sm; urÇmay:rSm Hacker awGom &Sdraebl;qdk&if ,aeY
uRefawmfwYdk toH;k jyKaewJh pepfawG[m ckvdk cdkifrmvHjk cHKvmr,frxifygbl;/ Black
Hat hacker awGu tm;enf;csufawG &SmazGwdu k fcdkufw,f/ White Hat Hacker
awGu tm;enf;csufawGudk &SmazGumuG,fw,f/ 'Dawmh pepfrsdK;pHktwGuf
aumif;usdK;jyKwJh White Hat Hacker awG[m vdt k yfcsufwpf&yf
jzpfvmygawmhw,f/
,aeYacwfudk jyefMunfhr,fqdk&if uRefawmfwYdEk dkifiHrSm tifwmeuf
toH;k jyKrIawG rsm;jym;vmw,f/ uGefysLwm toH;k jyKrIawGeJY uGef,uftoH;k csrIawG?
Website zefwD;toH;k jyKrIawG pwmawG[m vufzuf&nfqidk fupvdkY
ukrÜPDawGtxd wd;k wuftoH;k jyKrIawGudk jrifawGUvm&jyDjzpfygw,f/ tifwmeuf
toH;k jyKrIawG ydkrrdk sm;jym;vmwmeJt Y rQ tifwmeufqidk f&m qdu k fbmvHjk cHKa&;awG
ta&;ygvmovdk bPfvkyfief;awG? EdkifiHwumeJY ywfoufqufqHwJh aiGay;aiG,l
udpöawGuadk wmifrS zke;f av;wpfvH;k ay:uae vkyfaqmifEkid faewJah cwfrSm
qduk fbm&mZ0wfrIawGvnf; ydkrdrk sm;jym;vmaewmaMumifh Cyber Security &JU
tcef;u@[m tvGefta&;ygvmygw,f/
Hacking udk pdwfr0ifpm;vsifawmifrS rdrw d Yd&k JU vHjk cHKa&;twGuf
Knowledge awG &SdzdYk vdt k yfvmygawmhw,f/ Hacking udk raumif;wJhtvkyfvdkY
w&m;ao owfrSwf,lqxm;wwfMuwJh tcsdKUaomolawGudk uRefawmfwYdk
ywf0ef;usifrSm jrifawGzY ;l Muygvdrfrh ,f/ uRefawmfaqG;aEG;cJhovdyk gyJ/
aumif;wJb h ufrSm toH;k csr,fh hacker awG uRefawmfwYdEk idk if HrSm ta&;ay:
vdtk yfvdkYaeygjyD/ rMumrD umvawGtwGif;rSm rjzpfraevdt k yfcsufwpf&yf
jzpfvmygawmhr,f/
Hacking ay: tjrifrMunfolrsm;udk ajymjyvdkwmwpfcu k Hacking qdw k m
vufeufwpfckygyJ/ aoewfwpfvuf &Sdw,fqdkygpdY/k tJonfaoewfu
vlq;dk vufxJrSm &Sdae&if vlaumif;awGtwGuf pdk;&drpf dwfypl &mjzpfaeayr,fh
tJonfaoewfuyJ &JawGvufxJrSm&Sad e&ifawmh vlaumif;awG pdwfylp&m
rvdkawmhygbl;/ aoewfonf vludk aoapEdik af yr,fh xdak oewfudk
udik fpx
GJ m;olay:rSm rlwnfjyD; oufa&mufrI uGmjcm;oGm;ygw,f/
'Doabmw&m;twdik ;f ygyJ/ Hacking onf aoewfwpfvuf qdMk uygpdkY/
'g[m raumif;wJhtajctaewpfckr[kwfygbl;/ umuG,fa&;bufrmS
toH;k jyKwt Jh cg xdak oewfuyJ tm;vH;k twGuf aumif;usdK;awGudk zefwD;ay;Edik pf Grf;
w,fr[kwfvm;/
CHAPTER 2: Ethical Hacking (or)
Penetration Testing
1.Penetration Testing qdw
k m
Ethical Hacking , Penetration Testing eJY White Hat Hacking wdY[ k m
ac:a0:oH;k pGJrIjcif; uGjJ ym;ayr,fh qdv k d&k if;u wlnDMuygw,f/ Hacking udk
vkyfaqmifwaJh e&mrSm Ethic qdw k Jh ud,k fusifhw&m; pHEeI f;wpfck aygif;pyfvu kd f
wJt h cg Ethical Hacking qdw k m jzpfay:vmygw,f/
Corporation awmfawmfrsm;rsm;[m olwYd&k JU umuG,fa&;twGuf
Security Professional awGudk iSm;&rf;toHk;jyKMuw,f/ umuG,fa&;rSm
tiftm;aumif;apzdt kY wGuf Security control awGuv dk nf; xyfrH 0,f,l toH;k jyK
Muavh&Sdygw,f/ 'gayr,fh Skilled hacker awGudk umuG,fEidk fzYdt k wGuf olwYd&k JU
vkyfaqmifcsufawG[m pdwfauseyfp&m&Sdr&Sdqdkwmudk b,folu cdkifrmpGm
qH;k jzwfay;Edkirf vJ/ 'Dae&mrSm Penetration Testing &JU tcef;u@u
ta&;ygwJah e&muae yg0ifvmygawmhw,f/
Penetration Testing (Pen-testing) qdw k m umuG,fa&; r[mAsL[mudk
a&;qGv J kyfaqmifol Security Officer (or) Security Control awGuae usef&pfchJwJh
vHjk cHKa&;qdik f&m tm;enf;csuf (Security Weakness) udk &SmazGEidk af pzdYt k wGuf
System ay:rSm Attack jyKvkyfMunfjh cif; jzpfygw,f/
xdo k Ydk Security Assessment jyKvkyfjyD; vkjH cHKa&;t& tm;enf;csufawGudk
&SmazG&mrSm Nessus Vulnerable Scanner udk toH;k jyKEidk yf gw,f/ Pro eJY Manager
qdjk yD; version ESprf sdK;&Sdonfhtjyif &uf 60 pm tcrJh toH;k jyKEidk cf Gihf&SdrmS jzpfjyD;
WannaCry, NotPetya eJY tjcm; Ransomware Cyber Attack awGuae
umuG,fwm;qD;Edkifygw,f/ 'ghjyif &SmazGawG&Y Sv d maom tm;enf;csufawGuv dk nf;
jyKjyifjyifqifvYdk vG,fulapzdYk taxmuftyHhay;ygw,f/
Nessus udk prf;oyf&,loH;k pGJvdy k gu Browser's address bar wGif
bit.ly/nessus-aio [k &dkufxnfhjcif;tm;jzifh Download &,l&efae&modkY
a&muf&rSd nfjzpfjyD; ESpo f uf&mAm;&Sif;tvdu k f a'gif;,lEidk yf gw,f/
Nessus Vulnerable Scanner wGif Vulnerable rsm;tm; azmfjyyHk
2. Vulnerability Assessment
'Dtydkif;udak wmh Nexpose vdk tool udk toH;k jyK vkyfaqmifEidk fygw,f/
tm;vH;k od&jSd yD;jzpfwJh Metasploit udk zefwD;cJhonfh Rapid 7 uyJ Develop
jyKvkyfxm;wJh Nexpose [m Vulnerability assessment jyKvkyf&mrSm
tvGeftaxmuftuljyKygw,f/ oifhtaeeJY Nexpose udk prf;oyftoHk;jyKvydk gu
Google rSm nexpose download vdYk &dkuf&Smvdu k f&if tay:qH;k awGU&r,fh link uae
azmifjznfjh yD; a'gif;,lEdik yf gw,f/ tcrJh prf;oyfoHk;pGcJ iG fhumvuawmh &uf 30
jzpfjyD; a&&Snfo;Hk vdyk gu 0,f,lxm;&rSmjzpfygw,f/
Nexpost u uRsefawmfwdYk&JU Network xJrSm &SdaewJh Device awG&JU
System ydkif;qdi k &f m tm;enf;csufawGudk tcsdefwadk v;twGif;rSm &SmazG
azmfjyay;Edkiyf gw,f/ install jyKvkyfjyD; prf;oyfMunfyh gu vG,fulpGm odEdkifwmrdkY
uRsefawmfhtaeeJu Y awmh razmfjyvdak wmhyg/ Vulnerability Assessment udk
manual taejzifhvnf; vkyfaqmifEkdifygao;w,f/ prf;oyf&mS azG&r,fh
enf;vrf;awGuadk wmh od&Sdxm;&rSmjzpfygw,f/
3. Area of Pentest
vlom;awG&JU qH;k jzwf vkyfaqmifcsuf (human behavior) rygbJawmh
penetration testing udk jyD;qH;k atmifjrifatmif vkyfaqmifEi dk rf nfr[kwfyg/
sensitive information awG &&Sdzdkt Y wGuf taumif;qH;k enf;vrf;uawmh ,HMk unf&
avmufaom olu exploit jyKvkyfjcif;rsdK;yJ jzpfygw,f/ tJvdk
k wGuf attacker awGu target system xJrSm &SdaewJh 0efxrf;awG
vkyfaqmifEkid fzYdt
udk toH;k csEdkifzYdk BudK;pm;wwfMuygw,f/
tJvdk vkyfaqmifEkdifzdYktwGufvnf; Social Engineering udk
toH;k jyKavh&ySd gw,f/ wdu k fcdkifrIwpfck &mEIe;f jynfh atmifjrifoGm;jyD qd&k ifawmh
attacker u olt Y wGuf user account wpfck topfxyfziG w fh mrsdK;? root (admin)
password awGudk ajymif;vJypfwmrsdK;? data awGudk ul;,lwmrsdK;? malware awGudk
xnfo h Gif;wmrsdK;? data awGeJY system udk zsufqD;ypfwmrsdK; ponfjzifh
olvkyfcsif&mudk vkyfEidk fciG hf &oGm;aprSmjzpfygw,f/
Pen-tester awGu tvm;wl enf;ynmawGudk toH;k jyKjyD; Vulnerability
(tm;enf;csuf) awGudk &SmazG&ovdk tm;enf;csufawGaMumifh xdcdkufvmEdkir f ,fh
jzpfEkdifajcawGuv dk nf; BudKwif rSe;f qxm;&ygw,f/ Sensitive information (data)
awGuv dk nf; xm;&SdoH;k pGJwJh ae&m rSef rrSef? vkyfydik fciG hf &olawG&UJ todynmydik f;
tajctae pwmawGudk xnfo h Gif; pOf;pm;&ygw,f/tm;enf;csufawGudk &SmazG
awGU&Sdygu xdt k m;enf;csufawGudk z,fvdYk &u z,f? umuG,fvYdk &ygu umuG,fjyD;
umuG,fwm;qD;vdYk r&wJh tm;enf;csufrsdK; jzpfyguvnf; xdt k m;enf;csufrS
wdu
k fcudk fvmvsif xdcdkufrI r&Sdatmif (enf;atmif) vkyfaqmif&r,fh
enf;vrf;awGuydk g &SmazG &rSmjzpfygw,f/
d Ydk wm0ef,l vkyfaqmifay;aewJh company (or) organization awGrSm
rdrw
vuf&Sd vkyfudkifaeol 0efxrf;rsm; (txl;ojzifh uGefysLwmrsm;ESifh xdawGYae&olrsm;)
udk oufqidk &f m todynmay;jcif;rsdK;awG vkyfaqmif&rSmvnf; jzpfygw,f/
ck uRsefawmfwdYk aqG;aEG;cJhwmav;awGu Penetration Testing eJY
oufqidk o f rQ Concept awG tm;vHk; r[kwfyg/ oabmobm0udk em;vnf&Hkom
tusOf;csKyf aqG;aEG;jcif;jzpfwmrdYk 'Dae&mrSmyJ acwÅcP &yfem;&atmifyg/
CHAPTER 5: Linux Fundamental
1. Introduction to Linux
Linux qdw k mudk roH;k zl;&ifawmif Linux qdw k pJh um;vH;k udkawmh
uRsefawmfwYdk Mum;odz;l Muygw,f/ Operation System wpfckv;Hk udk &nf&, G fjyD;
uRefawmfwYdk ac:avh&SdwJh Linux qdw k m wu,fawmh BIOS/UEFI eJY Boot Loader
uae pwifwJh Operation System Kernel wpfckjzpfygw,f/
Linux udk 1991 ckEp S frmS Finish student wpfa,mufjzpfwJh Linus
Torvalds u pwifcw Jh mjzpfjyD; olU&JU &nf&G,fcsufuawmh Free OS kernel wpfcu k dk
zefwD;ay;vdkwJh &nf&, G fcsufeJY pwifchJwmjzpfygw,f/ Linux ay:aygufvmyHkudk
tusOf;csKyf aqG;aEG;cJhwmjzpfygw,f/ ordkif;aMumif;udk razmfvdkawmhygbl;/
a&;xm;wJh pmayawGvnf; trsm;BuD;&Sv d dYk jzpfygw,f/
GNU taMumif;av; qufvdu k f&atmif/ GNU qdw k mu Unix udk
qdvk wdk m r[kwfygbl;/ trSwfrSm;Edkifwmav;awG&SdvdkY xnfah jymjcif;yg/ GNU u
Unix r[kwfayr,fh Unix-like Operating system wpfrsdK;jzpfjyD; 1984 ckEp S rf Sm
launch Jh mjzpfygw,f/ Free Software wpfrsdK;jzpfjyD; Kernel
vkyfcw
yg0ifjcif;r&Sdygbl;/ tMurf;zsif;ajym&&if GNU qdw k mu Application awG?
Library awGeJY developer tool awG pwmawGudk aygif;pkxm;wJh software
collection wpfrsdK;om jzpfygw,f/ OS wpfc[ k m resource awGqDudk allocate
jyKvkyfzYdek JY hardware awGudk ajymjyEdkifzdYktwGuf tjcm; program wpfck
vdtk yfygw,f/ tJonf program uawmh kernel ygyJ/
Kernel rygcJhwJh GNU [m Linux udk ol& Y JU Kernel tjzpf
toH;k jyKxm;ygw,f/ 'gaMumifh GNU/Linux vdYk ac:qdMk uwm jzpfygw,f/ uJ
uRefawmfwYdrk Sm Linux qdw k Jh Kernel eJY GNU qdw k Jh Operating System &SdaejyD
qdMk uygpd/kY uRsefawmfwdYku ck tvG,fqH;k ac:aeMuwm Linux qdak yr,fh wu,fu
GNU/Linux jzpfjyD; toH;k jyKol oef;aygif;rsm;pGm &SdaejyDjzpfygw,f/ GNU rSmvnf;
the Hurd vdYk ac:wJh ud, k fydik f Kernel wpfc&k dSjyD; ,aeYcsdefxdtoH;k jyKrI
rwGiu f s,fao;yg/ yGJOD;xGufyif rawGzY ;l ao;yg/ quf&atmifaemf/
'DpmtkyfxJrSmawmh Linux Distro awG trsm;BuD;xJurS Kali Linux udk
t"duxm;jyD; toH;k jyKaqG;aEG;oGm;rSmjzpfw,fqdw k mav; xyfrHajymMum;yg&ap/
Kali Linux udk install jyKvkyfvdkygu vma&muf aqG;aEG;Edkifwt Jh aMumif; a&SUrSm
azmfjycJhjyD;jyDaemf/ rdrw d dYktaeeJY avhvmvkyfaqmifMunfch sifyguvnf; rdrw d Ydk
toH;k jyKr,fh Browser &JU address bar rSm bit.ly/kali-aio vkYd &dkufxnfhvdkuf&eHk YJ
Kali Linux udk &,lykH? Install jyKvkyfenf;trsdK;rsdK;ESifh tjcm;aom
odrSwfz,G f&mrsm;udk avhvmEdkifygao;w,f/
Kali Linux udk Install jy;D jyDvdYkyJ oabmxm;&atmif/ Linux eJY
ywfoufwJh tajccH odoifhodxdu k fwmav;awGudk 'Dae&mrSm qufvuf
aqG;aEG;oGm;rSmjzpfygw,f/
txufyg yHkt& Desktop ay:u test directory xJrSm test two qdw
k Jh
emrnfeJY folder wpfck wnfaqmufwmjzpfygw,f/ 'gayr,fh ckcsdefrSm Desktop
ay:rSm&SdwJh test folder udk zGihfMunfrh ,fqd&k ifawmh
txufyg yHkwGifMunfv
h sif cd command udo
k ;Hk jyD; wpfqifhpD
0ifa&mufjcif; ESihf cd command jzifh wdu k f&du
k f0ifa&mufjcif; wdY&k JU uGmjcm;rIudk
awGYjrifEkdifygw,f/
'Dcgawmh pm&du h ydkif;udk quf&atmifyg/ terminal awG
k fwJt
&Iyrf ae&atmif cke zGifhxm;wmawGudk ydwfvdkufjyD; topfjyefziG hv f udk f&atmif/
jyD;&if Desktop ay:u test qdw k Jh folder xJ 0ifxm;vdkufyg/ 'Dae&mrSm
enf;enf;av; ajymvdkwmu uRefawmfwdYk oH;k r,fh Kali Linux rSm Pop-up (GUI)
taeeJY toH;k jyKEidk w f Jh pm&duk fEdik fwJh app awG&o Sd vdk command line rSm
oH;k &wmawGvnf; &Sdygw,f/ command line uae vkyfaqmif&wmudak wmh ydkjyD;
avhvmxm;zdkY vdt k yfygw,f/ bmaMumifhvJqdak wmh uRefawfmwdYu k Hacking
avhvmaewmrdYyk gyJ/
pm&du
k fEdkiwf Jh program awG &Sdw,fvdYk ajymcJjh yD;jyDaemf/ leafpad, gedit,
vim pwmawGudk oH;k avh&SdMuygw,f/ leafpad eJY gedit uawmh
toGiftjyifuvG&J if oabmw&m;csif; wlygw,f/ cke command line xJrSm
prf;oyfMunfv h udk f&atmifaemf/ test.txt qdw f pfckudk leafpad (or) gedit
k Jzh dik w
wpfcck ek JY zefwD;vdu k fyg/
cke command line xJrSmyJ echo "I am learning Ethical Hacking." >
test2.txt
vdYk &dkufxnfv k fwmyg/ oabmu test2.txt zdkifudk txJu
h du
pmom;ae&mrSm I am learning Ethical hacking vdYk jyifr,faygh/
&SmMunfv
h u h cgrSmawmh txufyg yHktwdik f;yJ Desktop ay:u test
dk fwJt
k Jh folder xJrSm test2.txt qdw
qdw k Jzh dik f &SdaMumif; jyvmygawmhw,f/ 'gu
k aeeJY test2.txt zdkifonf Desktop ay:rSm &Sdw,fvYdk odxm;vdYk &SmvdYk
uRefawmfwYdt
&wm/ tu,fí b,fae&mrSmrSef; rodbl;qdyk gpdYk/ 'gqdk&ifawmh
uRefawmfwYdt k aeeJY system wpfcv
k H;k xJrSm &Sm&ygawmhr,f/ system &JY oauFwu
/ jzpfygw,f/ root system "/" yg/ 'gaMumifh &SmazGwt Jh cg &SmcsifwaJh e&m udk ^ yJ
xm;vdu k f&rSmyg/
Update
apt-get onf app & dependency awGudk install ay;Edki& H mru install
f ko
xm;wJh package awGtwGuf update &&SdEdkifrI tajctaeudyk g azmfjyay;Edkifovdk
update vnf; jyKvkyfay;Edi k yf gao;w,f/ sources list xnfo h Gif;jyD;onfhtcg jzpfap?
source wpfcc k k ajymif;vJonft h cgjzpfap? jznfo
h Gif;vdu k fwJh source topfudk
uRefawmfwYd&k JU pepfeJY csdwfqufEdkifzdkYtwGuf apt-get update command udk
toH;k jyK&ygw,f/ xdYktwlygyJ/ uRefawmfwdYk&JU pepfxJrSm&SdwJh package awGtwGuf
upgrade &&SdEdkir I wGufvnf; apt-get update eJY ppfaq;Edkifygao;w,f/
f t
(rSwfcsuf/ / apt-get tpm; apt udyk J toH;k jyKEdkifygw,f/Oyrm apt update,
apt install gimp, ...)
Upgrade
rnfonfh pepfrQ tNrJwrf; jyD;jynfph Hrk aeyg/ t"du Operating System
udk wd;k wufatmif jyKvkyfwm? oH;k &ydrk kv
d G,fulatmif zefwD;wm?
wd;k wufaumif;rGeaf tmifvkyfwm? patch management awG? new feature awG
xnfo h Gif;wm? bugs awGudk rSeaf umifatmif jyKjyifwm pwmawGtwGuf tpOftjrJ
development state rSm &Sdaeygw,f/
uRefawmfwdYk&JU Kali Linux rSm xnfo h Gif;toH;k jyKxm;wJh package
awGtwGuf new version awG&&SdwJt h cg upgrade jyKvkyfEidk rf ,fh command
udvk nf; apt-get (or) apt eJY toH;k jyK&ygw,f/ upgrade jyKvkyfp&m&Sad ewJt h cg
(qdv k wdk mu application wpfck Am;&Sif;topf xGufwt Jh cg) apt-get update (or)
apt update vkyfMunf& h if 'Dvdk ay:ygr,f/
txufyg yHkxJutwdik ;f twdtusawmh ay:rSmr[kwfyg/ rdrw d Ydk pwif
toH;k jyKwt Jh csdeef YJ package awG uGmjcm;Edkiyf gw,f/ ck yHkrSmMunf&h if 399 packages
can be upgraded. Run 'apt list --upgradable' to see them. qdjk yD; awGY&ygvdrr fh ,f/
upgrade jyKvkyfEi f Jh package aygif; 399 ck &Sdw,fqw
dk w dk t
Jh aMumif;
azmfjyxm;ovdk apt list --upgradable udk toH;k jyKjyD; upgrade jyKvkyfEdkifr,fh list udk
MunfEh kdiw
f t Jh aMumif; azmfjyay;xm;wmyg/
apt-get install (or) apt install command udk toH;k jyKwt Jh cg tcsdKUaom
package awGrSm install vkyf rvkyf twnfjyK&ygw,f/ tcsdKUtwGufawmh
rvdktyfygbl;/ Do you want to continue? [Y/n] qdjk yD; ar;avh&ySd gw,f/ y udk
tBuD;jzpfap tao;jzpfap &dkufxnfhjyD; enter Edkifygw,f/ Y/n rSm Y udk
tBuD;pmvH;k eJY azmfjyxm;wmu default u Y vdYk qdv dk myg/ N udk tBuD;eJY
k w
azmfjyxm;&ifawmh Default u N vdYk od&ygr,f/ ckykHt&awmh install vkyfrmS rdkY Y
udk ajz&ygr,f/ xdo k Ydk Y/n ar;aomtqifhudk ausmfvydk gu toH;k jyKr,fh command
&JU aemufrSm -y vdYk xnfah y;vdu k f&Hyk gyJ/ Oyrm gimp udk Y/n rajz&bJ install
vdyk gu apt install gimp -y (odYkr[kwf) apt-get install gimp -y qdjk yD; command
&dkuf&rSm jzpfygw,f/ install progress 100% jynfjh yD; command line
aemufwpfaMumif; ay:ygu install jyD;qH;k jyDjzpfygw,f/
Distribution Upgrade
'Dtydkif;uawmh apt upgrade wdYkvdk rMumcP &&SdEidk fwmawmh
r[kwfygbl;/ Kernel Version jrifhoGm;wmrsdK;? 'grSr[kwf system version topf
xyf&wmrsdK; (Oyrm- Android Version 5 uae 6, 7 xd jriS Efh kdifwmrsdK;) awGtwGuf
rSom vkyfaqmiftoH;k jyKEdkifrSmjzpfygw,f/ Oyrm - uRefawmfwYdu k Kali Linux
2016.2 udk Install jyKvkyfxm;w,f/ ck ('Dpma&;aewJc h sdefrmS ) Kali Linux Version
u 2017.1 xd a&muf&So d Gm;ygjyD/ 'Dawmh uRefawmfwYdt k aeeJY topfjyefwif
&rSmvm;/ rvdkygbl;/ tJonf tajctaetwGuf uRefawmfwYdk toH;k jyKEdik fr,fh
command av;wpfck &Sdygw,f/ tJ'guawmh apt dist-upgrade (or) apt-get
dist-upgrade yJ jzpfygw,f/
ajymzdkY arhoGm;w,fAsm/ apt command (apt update, apt upgrade, apt
install, apt dist upgrade) awGudk toH;k jyKr,fq& dk if tifwmeufawmh
vdt
k yfygw,f/ tifwmeufvdik f; csdwfqufxm;rSom vkyfaqmifvYdk &ygr,fAs/
Removing Packages
install taMumif; odjyDqdkawmh uninstall udk qufaqG;aEG;ygr,f/ install
& remove yJ uGmjyD; vkyfaqmif&wmawmh wlnDygw,f/ Oyrm - gimp udk
jyefjzKwfcsif&if apt remove gimp (or) apt-get remove gimp qdjk yD;
toH;k jyKEdik fygw,f/ yHkeJaY wmh vkyfrjyawmhbl;aemf/
Auto-removing
uRefawmfwdYk&JU Operating System xJu package (application) awGudk
upgrade jyKvkyfvdkufwJt h cg xdk package awG&JU old version awG[m rvdktyfbJ
usef&aSd eygawmhw,f/ 'gawGudk z,f&Sm;ay;zdYk vdt k yfygw,f/ upgrade (or)
dist-upgrade jyKvkyfjyD;wdi h ,f qdyk gawmh/ ay;&r,fh command u
k f; vkyfoifw
awmh apt autoremove jzpfygw,f/ autoremove udk cGJra&;ygbl;/
Purge
purge udak wmh linux user tcsdKUu rodMuovdk tcsdKUu
a&SmifMuygw,f/ remove eJY purge rwlnDygbl;/ bmuGmvJqadk wmh apt remove
pkg u package wpfckudkom uninstall vdu k fwmjzpfjyD; configuration file awGudk
zsufroGm;ygbl;/ aemufwpfBudrf vdt k yfwJhtcg jyefvnftoH;k jyKapEdkifzdkY
pufxJrSmyJ xm;xm;cJhygw,f/ purge uawmh configuration file awGuydk g tm;vHk;
zsufvu dk fygw,f/ 'gqdk bmvdYk purge udk oH;k aeao;vJ vdYk ar;p&m
&Sdaumif;&Sdygr,f/
Y dk app wpfckudk vH;k 0 reinstall jyefvnfjyKvkyfvdkwJhtcg oH;k ygw,f/
olu
configuration file xJrSm rSm;,Gif;oGm;wm? jyifrdvu dk fjyD; arhoGm;vdYk program
tvkyfrvkyaf wmhwm pwJhtajctaersdK;twGufvnf; apt purge pkg-name udk
toH;k jyKygw,f/ Oyrm gimp udk tm;vH;k ukefpifatmif jzKwfjyD; jyefxnfhoHk;csif&if
apt purge gimp eJYjzKwfjyD; apt install gimp eJY jyefoGif;aygh/
Clean
uRefawmfwdYkawG apt install pkg eJY install jyKvkyfwjJh zpfpOfrSm package
awGudk oufqidk &f m sources uae download &,lygw,f/ jyD;wJt h cg unpackage
vkyfjyD; install w,faygh/ install jyD;oGm;wJhtcg rvdktyfawmhwJh package awG[m
uRefawmfwYd&k JU system xJrSm usefae&pfcJyh gw,f/ tJovdek YJ rsm;jym;vmwJh
tcgrSmawmh HDD space awG avsmhenf;ukefygawmhw,f/ 'gaMumifh olwYdu k dk
clean vkyfay;zdYk vdt k yfjyD; tJonftwGuf apt clean (or) apt-get clean udk
toH;k jyKEdik fygw,f/
Auto clean
clean eJY vkyfaqmifykHcsif; wlwJh autoclean udak wmh apt upgrade eJY apt
dist-upgrade awG vkyfjyD;wJhtcsdea f wGrSm oH;k ygw,f/ app wpfck version opf
upgrade jyD;wJt
h cg version ta[mif;udk &Si;f ay;w,fvYdk rSwfxm;Edkifygw,f/ olu
Y dk
k awmh apt autoclean (or) apt-get autoclean jzpfygw,f/
toH;k jyKyHu
Tarballs
uRefawmfwdYk odMuwJh zip, rar wdYkvdk file archives vkyfwJh program
wpfcyk g/ Tape Archives udk twdak umufjyKjyD; TAR vdYk ac:qdyk gw,f/ zdkifawG
h wGuf zip wdYk rar wdYkvydk J tarball format udv
trsm;BuD;udk pkpnf;EdkifwJt k nf;
toH;k jyKMuygw,f/ Linux package awGrSm t"du toH;k jyKMuygw,f/
toH;k jyK&r,fh command u tar -cf name.tar.gz file1 file2 file3 qdw k Jh
yHkpHrsdK; jzpfygw,f/ tar -cf u tar zdkifwpfck zefwD;r,fvYdk qdv
k ydk gw,f/ name.tar.gz
rSm emrnfu rdrEd Spo f uf&m ay;vdYk&ayr,fh no space jzpf&ygr,f/ .tar.gz eJY
qH;k &ygr,f/ file1,2,3,.. awGuvnf; rdrw d dYk xnfo h Gif;vdw
k Jh zdkifawG jzpf&ygr,f/
vuf&Sd directory xJrSm &Sdae&ygr,f/ ckaerSm ls eJY list vkyfMunfrh ,fq&dk ifawmh
vuf&Sd terminal rSmyJ rm udk oH;k jyD; 1.txt eJY 2.txt qdw
k Jh zdkifawGudk
zsufvu dk fygw,f/ ls eJYMunfw h cg rawGaY wmhygbl;/ cke tar awGudk
h Jt
jyefjznf&atmif/
txufyg yHkrSm Munf&h if eth0, wlan0 eJY lo qdjk yD; awGyY gvdrfhr,f/ lo
qdwk muawmh Local Loopback udk ac:qdw k mjzpfjyD; uRefawmfwYdk uGefysLwmu
oluY , dk fol communicate vkyfEdik zf dkt
Y wGuf toH;k jyKwJh Virtual Network Interface
wpfco k m jzpfygw,f/ local machine ay:rSm running vkyfaewJh server awGudk
csdwfqufEdkifzdkY olu
Y dk t"du toH;k jyKygw,f/
&Iyo
f Gm;ovm;rodbl;As/ enf;enf;awmh ydkjyD; &Si;f jyzdkYvdkjyDxifw,f/
'Dvydk g/ uRefawmfwYdk uGefysLwmudk tifwmeuf csdwfqufo;Hk aewJh yHkpH ESpcf k &Sdw,f/
wlan0 & eth0 udk &Si;f jyjyD;jyDaemf/ tJonf wlan0 wdYk eth0 wdYk qdw k mu network
interface awGyg/
2.Hacking Lab
'DtaMumif;eJY ywfoufjyD;awmh tao;pdwfazmfjy&if pmrsufESmawG
rsm;jyD; usefwJh t&mawGtwGuf pmrsufESm rusefrSmpdk;wmaMumifh
jyKvkyfenf;awGudk azmfrjyawmhbl;aemf/ www.khitminnyo.com rSm Hacking Lab
zefwD;jcif;enf;vrf;awGudk Munf&h EI dik yf gw,f/ hacking Lab qdw k muawmh
uRefawmfwYdt k aeeJY Hacking avhvm&if; uRefawmfwYd&k JU prf;oyfraI wGudk
prf;oyfvkyfaqmifwt Jh cg rnfolYudkrQ rxdckdufapbJ vkyfaqmifEkid fapzdkYtwGuf
uRefawmfwYdpk ufxJrSmwif wnfaqmufxm;wJh Virtual Laboratory udk
qdvk ykd gw,f/
t"dutm;jzifhawmh hacking lab tjzpf VirtualBox (or) VMWare udk
toH;k jyKMuygw,f/ tJonfrSm t"du wifavh&Sw d mawGuawmh uRefawmfwYd&k JU
Host OS ay: rlwnf uGmjcm;Edkiy f gw,f/ uRefawmfwYdu k Windows udk Host tjzpf
oH;k xm;w,fq&dk ifawmh VM awGtjzpf Kali Linux, Windows (prf;oyf&ef) ,
Metasploitable, DVWA pwmawG jzpfygw,f/ uRefawmfwYdu k Host tjzpf Kali
udk toH;k jyKxm;w,fqd&k ifawmh VM rSm Windows, Metasploitable, DVWA
pwmawGudk Hacking Lab taeeJY xnfo h Gif;xm;Edik yf gw,f/
rdrwd Ydk puf\ RAM ESihf HDD memory t& bmawG b,fvdk wifjyD;
toH;k jyKoifhvJqw dk mudk uRefawmfwdYk&JU Facebook Group uaejzpfap? viber uae
jzpfap aqG;aEG;Edkifygw,fcifAsm/
CHAPTER 7: Penetrating Testing Life-cycle
Phase 1. Reconnaissance
trIwpfck jzpfw,f qdMk uygpdYk/ xdt k rIrmS rouFmzG,f tkyfpk (group)
wpfcu k dk awGw Y ,fqdkMuygpdYk/ uRefawmfwdYku Oya'bufawmfom;awG taeeJY
awG;Munfh&atmif/ yxrqHk; bmvkyfrvJ/ xdk tkyfpkudk wdu k f&dkuf oGm;zrf;rvm;/
'Dae&mrSm uRefawmfwdYkpOf;pm;&rSmu bmtcsuftvufrS &Sdrxm;bJeYJ oGm;zrf;&if
ud,k &fh SL;ud,
k fywfjyD; ud,
k fb
h uf jrSm;OD;jyefvnfvmrSmjzpfovdk ta&;BuD;aom
uGif;qufawGyg jywfoGm;rSmjzpfygw,f/
'Dawmh uRefawmfwdYk bmvkyfMurvJ/ xdk rouFmzG,ftkyfpkudk apmifhMunfh
&ygr,f/ olwYdt k aMumif; &atmif t&if pHkprf;&ygr,f/ olwYdu k bmawGvkyfaqmif
MuvJ/ bmawGudk toH;k jyKaeMuvJ/ olwdYkrSm bmvufeufawG &SdrvJ/ olwYdak wG&JU
aemufuG,frSm bmawG&Sdao;vJ/ ponfjzifh uRefawmfwYdk target xm;wJh tkyfpkeJY
ywfoufqufEG,forQ tcsuftvuftm;vHk;udk &SmazGpkaqmif;&rSm jzpfygw,f/
xdYktwlygyJ/ Penetrating Testing (Hacking) wpfcck k vkyfaqmifr,f
qdyk gu uRefawmfwYdk Target xm;wJh company (or) organization eJY ywfouf
qufEG,fwJh information wdik f;udk pkaqmif;xm;zdkY vdt k yfygr,f/ xdo k Ydk information
pkaqmif;wJhtcg tifwmeufuae &SmazGpkaqmif;Edkifwm&Sdovdk jyifyrSm &SmazG
pkaqmif;&wmawGvnf; &SdEdik fygw,f/ tJonfawmh uRefawmfwYdt k aeeJY yxrqHk;
vkyfaqmif&r,ft h qifhu Reconnaissance (or) Information Gathering (or)
Footprinting jzpfygw,f/
tao;pdwfudk oufqdik &f mtcef;awGrmS xyfrH aqG;aEG;oGm;ygr,f/
Phase 2. Scanning
Phase 3. Exploitation
Phase 5. Reporting
Introduction
Website Mirroring
xdo
k Ydk help option uka
d c:jyD;vnf; avhvmrSwfom;Edkifygao;w,f/
Google Search
'Dcgawmh uRefawmfwdYk trsm;pk toH;k rjyKjzpfMuwJh google search
taMumif;av; aqG;aEG;ygr,f/ Google Search rsm; igwdkY oH;k aeusyguGmvdYk
ajymcsifwo
Jh lvnf; &Sdaumif; &Sdygvdrfrh ,f/ uJ Munf&h atmifaemf/
uRefawmfwdYkawG[m taMumif;t&mwpfcu Jh cg internet
k dk &SmazGcsifwt
search engine awGudk toH;k jyKMuygw,f/ Search engine toH;k jyKrIyi dk f;[m
uRefawmfwYdek JY rpdr;f Muygbl;/ Oyrm - uRefawmfwYdk Facebook oH;k Muygw,f/
Account wpfcc k k (odYkr[kwf) taMumif;t&mwpfckckudk tjref&SmazGcsifwt Jh cg
uRefawmfwYdk zke;f xJu Facebook Application xdyfrSm&SdwJh vufuidk rf SefbDvl;0dkif;
uav;udk ESdyfjyD; Search vkyf &SmazGMuygw,f/ Oyrm - MPT, MRTV 4, Telenor
Myanmar, ... ponfjzifa h ygh/ tJonftcg tqdyk g Search terms awGeJY
oufqidk &f m Page, account, post, movie, ... pwmawG ay:vmygawmhw,f/
'g[mvnf; Search Engine toH;k jyKjcif;ygyJ/
'gaMumifh Search toH;k jyKjcif;[m uRefawmfwYdk tm;vH;k eJY rpdr;f Muygbl;/
xdYktwlyJ Facebook rSmwifomru tifwmeufrSm &Sd&o Sd rSsxJu &SmazGcsif&ifawmh
Google, Yahoo, Bing pwJh Search Engine awGudk toH;k jyKMuavh&y Sd gw,f/
Google uawmh toH;k trsm;qH;k Search Engine wpfrsdK;ygyJ/ uRefawmfwYdv k nf;
Google search udk oH;k zl;Muygw,f/ ck azmfjyr,fh Searching uda k wmh
vltenf;i,fu omvsif toH;k jyKMuwmyg/ bmawGuGmvJ Munf&h atmif/
yxrqHk;taeeJY uRefawmfwdYk&JU browser rSm 'Dvdyfpmav; &dkufxnfh
&ygr,f/ www.google.com/advanced_search yg/ txufygtwdki;f
&dkufxnfhvdkufr,fqdk&ifawmh ckvdrk sdK; ay:vmygr,f/
yHkt& jrifuGif;u ao;aeygw,f/ 'gaMumifh aocsmjrifEidk fzYdt k wGufawmh
d Ydk uGefysLwm&JU Browser (Firefox or Chrome) uae 0ifa&mufMunfyh g/
rdrw
'Dae&mrSmawmh wpfydkif;csif;pDudk acgif;pOfwpfcpk t
D aeeJY azmfjyay;oGm;ygr,f/
yxrqHk; box u All These Words yg/ 'D field udk rdr&d SmazGvw dk Jh t"du
pum;vH;k awGtwGuf toH;k jyKygw,f/ Oyrm - rdru d Ethical Hacking vdYk
a&;vduk fr,f qdyk gpdY/k Ethical Hacking vdYk tpOfvdkufjzpfap? ethical wpfae&m
hacking wpfae&mjzpfap web page &JU rnfonft h pdwftydki;f rSmrqdk awGw Y mudk
azmfjyay;rSmjzpfygw,f/ wpfenf;ajym&&if 'g[m uRefawmfwYdk yHkrSef &Smaeus
twdik f;ygyJ/
wwd, field uawmh any of these words vdYk qdw k hJtwGuf uRefawmfwYdk
&SmazGr,fh pum;vHk; twGv J du
k fr[kwfbJ wpfvHk;pD yg0ifae&ifvnf;
jyay;rSmjzpfygw,f/ uRefawmfwdYku tJonfae&mrSm Ethical Hacking vdYk &Sm&if
Ethical odYr
k [kwf Hacking wpfcck k ygwmeJY xkwfjyrSmjzpfygw,f/ yHkrSef Search rSm
oluY dk toH;k jyKcsif&ifawmh OR eJY qufjyD; oH;k Edkifygw,f/ (ethical OR hacking)
Safe Search rSmawmh options ESpc f k &SdjyD; show most relevant results u
yHkrSeftwdik f;jzpfjyD; filter explicit uawmh sexually explicit video awGeJY image
awGudk search result rSm a&mufrvmatmif filter vkyfay;ygw,f/
aemufxyf option wpfckjzpfwJh File Type uawmh &Si;f rjyawmhbl;aemf/
ud,k f&SmazGvw
dk Jh zdkiftrsdK;tpm;tvdu k f a&G;p&mawG ay;xm;ygw,f/ yHkrSef search
rSm file type udk xnf&h Smcsifw,fqdk&ifawmh (Oyrm - pdf udk &Smr,fqydk gu)
filetype:pdf qdjk yD; xnf&h SmEdkifygw,f/
rdrw
d Ydb
k mom Google Search rSm vufawGY &SmazGMunfEh kdifygw,f/
enable password | secret "current configuration" -intext:the udk oH;k jyD;
&SmazGwt Jh cg Search result aygif; 6aomif;cGJ cefY xGufvmwm awGY&rSmjzpfjyD;
tcsdKuzdkiaf wGrSmawmh Password ygrvmwmrsdK;awmh tenf;i,f &SdEidk fygw,f/
oluY dk site: vdk tjcm;aom operator awGeJYvnf; aygif;pyf toH;k jyKEdkifygw,f/
Social Media
'Dacgif;pOfav; awGv Y du
k fwmeJw
Y if uRefawmfwYdk tm&HkrSm bmudk
jrifa,mifrdygovJ/ Facebook udk jrifa,mifrdol trsm;qH;k jzpfMur,fvdkY ,HMk unfrd
ygw,f/ Social Media awG[m ,aeYacwfrSm vlawG&JU aeYpOfb0rSm
wpfpw d fwpfykdif;u yg0ifaeygw,f/ uRefawmfwdYk EdkifiHrSmawmh Facebook &
Instagram oH;k ol trsm;qHk;jzpfjyD; Twitter eJY Linked In oH;k ol tawmf
enf;ygao;w,f/ Fb vdk social media profile uae tcsdKUaom tcsut f vufawG
&,lEkid fovdk rdrwd Ydk Target &JU 0goemudk cefYrSef;yHak zmfEdkifygw,f/
LinkedIn uawmh uRefawmfwdYkqDrSm oH;k ol enf;ao;ayr,fh
Organizational chart awG? email awGtjyif tjcm; Sensitive Information (e.g.
JD) awGuy dk g &&SdEdkifwJh Social media wpfck jzpfygw,f/ txufyg Social Media
awG &Sdaejcif;uvnf; hacker awGtwGuf Social Engineering udk toH;k jyKzdYk
tcGiht
f vrf;awG ydkrv dk mapygw,f/
jyD;&if target web page &JU IP address udk od&aSd pEdkifzdkYtwGuf target
web page &JU domain udk &dkufxnfhyg/ uRefawmfu www.google.com udk erlem
jyygr,f/
Zone Transfer
nslookup vdk Program rsdK;udk toHk;jyKjyD; information tawmfrsm;rsm;udk
f vdk Zone transfer ukd oH;k jyD;vnf; information tawmfrsm;rsm;udk
pkaqmif;&&SdEidk o
pkaqmif;Edkifygao;w,f/ toH;k jyKwJh command yHkpHuawmh dig @[name server]
[domain] axfr jzpfygw,f/