Tor project

Tor project When looking to remain anonymous while deep-diving through what the dark web has to offer, The Onion Router (Tor), is your safest bet. The Tor browser is a powerful free tool used for browsing the Internet anonymously, where you can discover varying websites utilizing the onion domain.  Anonymity is seemingly fading nowadays with […]

Read More Tor project

Is it Black Net or Dark Web?

Is it Black Net or Dark Web? Is it Black Net or Dark Web? Explore the uses of global information networks by social activists, hackers, whistleblowers, political campaigners, and those wishing to build an independent online public sphere.The Dark web. It was known as the Black Net initially, back at 1992. It was a new […]

Read More Is it Black Net or Dark Web?

Nmap

Introduction First step in the process of penetration testing is “Information gathering”, the phase where it is useful to get as much information about the target(s) as possible. While it might be different for the different type of penetration tests, such as web application or mobile application pentest, network scanning is a crucial step in […]

Read More Nmap

Metasploit

Metasploit Metasploit is one of the most powerful exploit tools. Most of its resources can be found at: https://www.metasploit.com. It comes in two versions − commercial and free edition. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit. As an […]

Read More Metasploit

Sniffing

Sniffing Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of “tapping phone wires” and get to know about the conversation. It is also called wiretapping applied to the computer networks. There is so much possibility that if a set of […]

Read More Sniffing

Sniffing Tools

Sniffing Tools There are so many tools available to perform sniffing over a network, and they all have their own features to help a hacker analyze traffic and dissect the information. Sniffing tools are extremely common applications. We have listed here some of the interesting ones − BetterCAP − BetterCAP is a powerful, flexible and […]

Read More Sniffing Tools

Terminologies

Terminologies Terminologiess Following is a list of important terms used in the field of hacking. Adware − Adware is software designed to force pre-chosen ads to display on your system. Attack − An attack is an action that is done on a system to get its access and extract sensitive data. Back door − A […]

Read More Terminologies

Hacker Types

Overview Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat. White Hat Hackers White Hat […]

Read More Hacker Types

Process

Process Like all good projects, ethical hacking too has a set of distinct phases. It helps hackers to make a structured ethical hacking attack. Different security training manuals explain the process of ethical hacking in different ways, but for me as a Certified Ethical Hacker, the entire process can be categorized into the following six […]

Read More Process

SQL Injection Attack

SQL Injection SQL injection is a set of SQL commands that are placed in a URL string or in data structures in order to retrieve a response that we want from the databases that are connected with the web applications. This type of attacks generally takes place on webpages developed using PHP or ASP.NET. An […]

Read More SQL Injection Attack

Hacking Skills

Skills As an ethical hacker, you will need to understand various hacking techniques such as − Password guessing and cracking Session hijacking Session spoofing Network traffic sniffing Denial of Service attacks Exploiting buffer overflow vulnerabilities SQL injection In this chapter, we will discuss some of the skills that you would require to become an expert […]

Read More Hacking Skills

Famous Hackers

Famous Hackers In this chapter, we will have a brief synopsis of some of the famous Hackers and how they became famous. Jonathan James Jonathan James was an American hacker, illfamous as the first juvenile sent to prison for cybercrime in United States. He committed suicide in 2008 of a self-inflicted gunshot wound. In 1999, […]

Read More Famous Hackers

DNS Poisoning

DNS Poisoning DNS Poisoning is a technique that tricks a DNS server into believing that it has received authentic information when, in reality, it has not. It results in the substitution of false IP address at the DNS level where web addresses are converted into numeric IP addresses. It allows an attacker to replace IP […]

Read More DNS Poisoning