Skip to main content

Posts

Windows Hacking | Fast Track |

This is just another way of hacking Windows, and there are many more ways to do this. This is a video posted for educational purposes only. Metasploit was used for this video. First, we need to create a payload for windows. We then send it to the victim's computer and take control of that computer. (Must be sent by email or software.)  

How to deceive targets - 16

A good hacker is an expert. Being under the radar enables him to remain undetected By pretending to be a network administrator. He uses it to make a hacker do this method of cheating or disguise. Spoofing As you have read in the previous chapter, deception is the use of deception techniques by hackers Mimic or pretend to be another person, organization, software, or website. This is the same as Intent to bypass the target’s security protocol to access the target’s information Hackers want it. Here are some of the most common deception techniques used by hackers: 1. IP spoofing This technique is to mask the IP address of the computer that the hacker is using in order to To trick the network into thinking that a legitimate user is communicating with the target computer. arrive In doing so, hackers will imitate another IP address or range to satisfy the Network administrator. This spoofing hacker technique works by looking up the IP addresses used by trusted hosts. After finishing Therefo

Hacking Tools - 15

Both ethical hackers and criminal hackers can use a large number of hacking tools, which can be used to Attack or protect specific systems. These tools can be crowd-sourced from the Internet through forums And other online centers specifically for hackers. As a beginner ethical hacker, it is very important to learn the most commonly used detection tools Possible vulnerabilities, test and manage actual hacking attacks. Here are 8 most popular tools Used by hackers today: 1. Angry IP Scanner (ipscan) Most often referred to by experienced hackers as ipscan, this tool is used to track computers in the following ways Their IP address and listening port to check the gateway that can direct them directly Enter the target computer system. This tool is also often used by system engineers and Administrators to check for possible vulnerabilities in the systems they serve. This tool is open source, can be used across platforms, and is known as one of the best tools. Effective hacking tools are ava

About The Attack - 14

When you deeply understand the thinking of hackers, you may realize that there are two types of hackers You will definitely encounter-passive and active. Know the types of attacks they carried out Will prepare you to install the correct way to protect the system you are trying to protect Security Protocol. What is a Passive Attack? A passive attack is an attack wherein the hacker waits for the perfect opportunity to penetrate your system. This type of attack is typically done in order for a hacker to observe your networking structure, the type of software you use, or any security measures that you have already installed. Passive attacks typically happen when a hacker monitors possible system vulnerabilities without making any changes to the data that he targets. You can think of this attack as a hacker’s means of researching his target in order to launch a more effective attack. Passive attacks are classified into: 1. Active reconnaissance This happens when an intruder listens right in

Look at System Vulnerabilities -13

Once you can see how people can hack into your computer’s security system, you will Be able to figure out what an attacker might want to target on your computer. If you don't know Different vulnerabilities on most computer systems, you can find information about vulnerabilities Database such as 1. US-CERT Vulnerability Description Database ( kb.cert.org ) 2. Common vulnerabilities and exposures ( cve.mitre.org/cve ) 3. NIST National Vulnerability Database ( nvd.nist.gov ) These websites document all known system vulnerabilities, which will enable you to make the right assessment for your system. Once you are making the assessment, you can use different tools to administer vulnerability management. Depending on what vulnerabilities that you managed to find, you can use the information you found about the system and identify what attack is most likely to happen. These attacks can be done to do the following:         1. Take a screenshot while opening a confidential file         2. Ac

System Scanning - 12

Once you know how to proactively collect information about your network, you will know how Criminal hackers may launch attacks on your network. Here are some You can do the following to see how vulnerable your system is: 1. Use the data you find in the Whois search to see the correlation between the hostname and IP address Layout. For example, you can verify information about certain internal hostnames, operating protocols, Running services, open ports, and applications are displayed in the web search, which may give you some idea About how criminal hackers quickly penetrate into your system. 2. Scan your internal hosts and understand what malicious users might access. Remember, the attacker May come from within your organization and set up a shop on one of your hosts, which may be very difficult Pointed out. 3. Check the ping utility of the system, or use a third-party utility to ping different addresses at the same time. You can use things like NetScan Tools, fping (if you are using

Mapping the Network - 11

When you want to make a solid plan on how to make an ethical hacking plan, one of them The first thing you need to know is how much other people know about your network. Although you might think that you are completely anonymous on the Internet, and your computer keeps leaving footprints at that point For you and the system, you are using. To better understand how much information about you or your domain is available to the public, you can You may want to look at the following: Whois Whois is an online tool that you can use to check whether a domain name is available. However, it can also be Used to view registration information about existing domains. This means it is very likely Your email address and contact information are being broadcast online. Whois also provides information about the DNS server your domain is using and information about Technical support from your service provider. It also has a tool called DNSstuff, which does the following. Show which hosts handle emails for