Professional Documents
Culture Documents
Ethical Hacking Training
Ethical Hacking Training
Ethical Hacking Training
Phishing Attack
RAT (Remote Access Trojan)
Sniffing
Footprinting
CIA Model | Information Security
Confidentiality,
Integrity,
Availability
Confidentiality
Integrity
Availability
Authenticity: This means that authorized users have timely and easy access to
information services. IT resources and infrastructure should remain robust and fully-
functional at all times even during adverse conditions, such as database
conundrum or fall-overs.
LOGIN Roshan
USER@Pass
Mobile Threats : Mobile security threats include everything from mobile forms
of malware and spyware to the potential for unauthorized access to a device s data,
particularly in the case of accidental loss or theft of the device.
Viruses, Worms & Malware : A worm is a standalone piece of malicious software
that reproduces itself and spreads from computer to computer. A virus is a piece of
computer code that inserts itself within the code of another standalone program, then
forces that program to take malicious action and spread itself.
Cloud Computing : Cloud computing is the delivery of different services through the
Internet, including data storage, servers, databases, networking, and software. Cloud-
based storage makes it possible to save files to a remote database and retrieve them on
demand.
Knowing OS (Linux,Windows,Android
MAC,IP,IPV4,IPV6,PORT,DNS,NAT
Cryptography
(PAN) BT Tool
MAC,IP,IPV4,IPV6,PORT,DNS,NAT
Cryptography
Mirroring Websites
Traceroute, Email Tracking
Footprinting & Information Gathering
Ping : Ping is a computer network administration software utility used to test the
reachability of a host on an Internet Protocol network. It is available for virtually all operating
systems that have networking capability, including most embedded network administration
software.
Wayback Machine : The Wayback Machine is a digital archive of the World Wide Web,
founded by the Internet Archive, a nonprofit library based in San Francisco. It allows the user to go “back in
time” and see what websites looked like in the past.
Shodan : Shodan is a search engine that lets the user find specific types of computers connected to
the internet using a variety of filters. Some have also described it as a search engine of service banners,
which are metadata that the server sends back to the client.
Scanning Networks
A port scanner is an application designed to probe a server or host for open ports. Such an
application may be used by administrators to verify security policies of their networks and by attackers to identify
network services running on a host and exploit vulnerabilities.
Banner Grabbing is a technique used to gain information about a computer system on a
network and the services running on its open ports. Administrators can use this to take inventory of the systems
and services on their network
Sublist3r is a python tool designed to enumerate subdomains of websites using
OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are
targeting.
CMSScan provides a centralized Security Dashboard for CMS Security scans. It is powered by
wpscan, droopescan, vbscan and joomscan. It supports both on demand and scheduled scans and has the ability to
sent email reports.
The purpose of network scanning is to manage, maintain, and secure the system using
data found by the scanner. Network scanning is used to recognize available network services, discover and
recognize any filtering systems in place, look at what operating systems are in use, and to protect
the network from attacks.
Nmap is a free and open-source network scanner created by
Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and
analyzing the responses. Nmap provides a number of features for probing computer networks, including host
discovery and service and operating system detection.
Sniffing
Wireshark : Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting,
analysis, software and communications protocol development, and education. Originally named Ethereal, the
project was renamed Wireshark in May 2006 due to trademark issues.
HTTP Network Sniffer : HTTP Network Sniffer is a packet sniffer tool that captures all HTTP requests/responses
sent between the Web browser and the Web server and displays them in a simple table.
ARP Spoofing : In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a
technique by which an attacker sends Address Resolution Protocol messages onto a local area network.
MAC Spoofing : MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC)
address of a network interface on a networked device. The MAC address that is hard-coded on a network interface
controller (NIC) cannot be changed.
Web Cookies Sniffer : WebCookiesSniffer is a packet sniffer tool that captures all Web site cookies sent
between the Web browser and the Web server and displays them in a simple cookies table.
WpScan : WPScan is an open source WordPress security scanner. You can use it to scan your WordPress website
for known vulnerabilities within the WordPress core, as well as popular WordPress plugins and themes.
Sparta Scanner : SPARTA is a python GUI application that simplifies network infrastructure penetration
testing by aiding the penetration tester in the scanning and enumeration phase.
Skipfish Scanner : Skipfish is an active web application security reconnaissance tool. It prepares an
interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes.
Nmap Security Scanner : Nmap is a free and open-source network scanner created by Gordon Lyon.
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the
responses. Nmap provides a number of features for probing computer networks, including host discovery
and service and operating system detection.
Vega Vulnerability Scanner : Vega is a free and open source web security scanner and web security
testing platform to test the security of web applications.
Acunetix Web Vulnerability Scanner : Acunetix is an application security testing solution for securing
your websites, web applications, and APIs
OWASP Zed Scanner : OWASP ZAP is an open-source web application security scanner. It is intended to be
used by both those new to application security as well as professional penetration testers. It is one of the most
active Open Web Application Security Project projects and has been given Flagship status.
Burp Suite Scanner : Burp Scanner automates the task of scanning web sites for content and vulnerabilities.
Hacking Website
System Hacking
Port Forwarding : In computer networking, port forwarding or port mapping is an application
of network address translation that redirects a communication request from one address and
port number combination to another while the packets are traversing a network gateway, such
as a router or firewall.
Windows Remote Hacking : The Remote Access Trojan (RAT) can almost be considered the
“legacy” tool of hackers. The RAT is a malware program that uses a back door for
administrative control over the targeted computer.
Windows Login Password Hacking : Reset Administrator & User Passwords on Any Windows
without Reformatting or Reinstalling System. 100% Success Rate!
“iSeePassword Windows Password Recovery Pro”
Windows Cookies Password Hacking : Windows that allows you to view the user names and
passwords stored by Web browser.
Hacking Android
Android Remote Hacking : The Remote Access Trojan (RAT) can almost be considered the
“legacy” tool of hackers. The RAT is a malware program that uses a back door for
administrative control over the targeted computer.
Network Scanning : Network scanning refers to the use of a computer network to gather
information regarding computing systems. Network scanning is mainly used for security
assessment, system maintenance, and also for performing attacks by hackers.
Social Engineering
In the context of information security, social engineering is the psychological
manipulation of people into performing actions or divulging confidential
information. This differs from social engineering within the social sciences,
which does not concern the divulging of confidential information.
Evading IDS, Firewalls, and Honeypots
Evading IDS : Intrusion detection system Some IDS evasion techniques involve deliberately
manipulating TCP or IP protocols in a way the target computer will handle differently from
the IDS. For example, the TCP urgent pointer is handled differently on different operating
systems.
Firewalls : To provide better protection, your networks should have multiple layers of firewalls,
both at the perimeter and separating different assets on your network. For example, you could
have a hardware or cloud firewall at the perimeter of your network, then individual
software firewalls on each of your network assets.
Honeypots : The honeypot looks like a real computer system, with applications and data, fooling
cybercriminals into thinking it's a legitimate target. For example, a honeypot could mimic a
company's customer billing system - a frequent target of attack for criminals who want to find
credit card numbers.
Hacking Wireless Networks
What Is WPS : Wi-Fi Protected Setup (WPS) is a feature supplied with many routers. It is
designed to make the process of connecting to a secure wireless network from a computer or
other device easier.
WIFI NETCUT | Network Hacking : NetCut is a solution that is helping you to admin your
network based only on ARP protocol . It can execute several tasks as list IP-MAC table in
seconds, turn off & on network on any computer on your LAN including any device like router
or switcher. Also, NetCut can protected users from ARP SPOOF attacks.
Introduction Arduino uno mcu esp8266 : Arduino is an open-source electronics platform based
on easy-to-use hardware and software. Arduino boards are able to read inputs - light on a
sensor, a finger on a button, or a Twitter message - and turn it into an output - activating a
motor, turning on an LED, publishing something online.