I know you are interested in ethical hacking!! . Whether you are here out of curiosity, career goals , or you wanna know how hacking works.this is the right place.
Learning how linux works & command line :
NOTE: The content on this blog is for educational purposes only. The tools and techniques discussed are intended for ethical hacking, penetration testing, and cybersecurity research. Unauthorized use of these tools on systems without permission is illegal and may result in legal consequences.
By using this information, you agree to use it responsibly and comply with all applicable laws. Cyber Cap does not promote, support, or encourage any illegal activities.
what is black-hat hacking:
Black-hat hackers are the one you hear everyday in news paper. like the we can say a dark side of hacking . unlike white hat hackers (works legally). Black hat operates outside the law . hacking into systems for money, data , or just power . so learning this course doesn't mean you have to be a cyber-criminal . this course is helpful to learn how is their method of hacking . and how be The best hacker.
1) what we will learn this full course:
Learning how linux works & command line :
- Every hacker ethical or not should know this
- Learn how to navigate in linux terminal
- Understanding file permissions & user privileges
- Bash scripting
- know common hacking tool (n-map , netcat , Wireshark)
NOTE:If you are serious download kali-linux . our all work done using kali after this
2) Network and wifi hacking:
Most hacking done through this so you will need a solid grasp in this :
- Ip address & ports
- Packet sniffing
- Man-in-the-middle attack
- Wifi-hacking : cracking weak password using Aircrack-ng
3) Recconnaissance & information gathering:
Before an attack hackers gather intel called reconnaissance :
- OSIND
- Google Dorking
- Map scanning
- Shodan
4) understand the cybersecurity vulnerabilities:
Black hat looks vulnerabilities to gain unauthorised access:
- Exploiting software bugs
- Privilege escalation
- SQL injection
- Cross-site scipting (xss)
5) knowing Malware, trojan , reverse engineering for cybersecurity:
Black normally create their own malware :
- Keylogging
- Remote access trojans (Rat's)
- cryptojacking
- Randsomeware
6) Social-Engineering & phishing
Some times humans are the weakest link:
- Phishing
- Pretexting
- Baiting
- Deepfake attacks (New type)
7) Covering your tracks:
Importent to clean all:
- Clearing logs
- Tor & vpn
- Proxy chain
- Antivirus evasion
and many more......
all the topics mentioned will discuss in next chapter so stay tuned and submit email to get messages when I upload
Post a Comment