Independent Security Researcher


|| HACKING IS MY PASSION BECAUSE WE BELIEVE IN SECURITY ||
 
Specialists :Ethical Hacking and Cyber Security Session hijacking,Advance SQL Injection,Cross site scripting,Social Engineering,Ajax injection,LDAP injection,CSRF,Brute force attack,user Enumeration,i-fame busting,Remote Command execution,MobileTesting methodology,Cyber Crime Investigation,Cyber Forensics,Cyber Law,SEO.

 

Introduction Now Let's Start Brief in Ethical Hacking:-

 

  • Know your enemy
  • History and Trends
  • Anatomy of a hack
  • System Hacking
  • Sniffers
  • Denial of Service
  • Buffer Overflows
  • Social Engineering 

 

Know your enemy


● Hacker – refers to a person who enjoys learning the details
  of computer systems and stretch their capabilities.

● Hacking – describes the rapid development of new
   programs or reverse engineering of already existing software to
   make the code better and efficient.

● Cracker – refers to a person who uses his hacking skills for
   offensive purposes.

● Phreak – a hacker variant with an interest in telephones and
   telephone systems.

● Hactivism – refers to an act of hacking in order to
   communicate a politically or socially motivated message. An
   Internet enabled way to practice civil disobedience and protest.

● Ethical Hacker – refers to security professional who apply
   their hacking skills for defensive purposes on behalf of its
   owners.

● Ethical Hacking – is also known as penetration testing,
   intrusion testing, red teaming.

● Ethical hacker looks for the following four basic questions:
● What information/locations/systems can an intruder gain
   access?
● What can an intruder see on the target?
● What can an intruder do with available information?
● Does anyone at the target system notice the attempts?


Anatomy of a hack (Gaining Access):-

● Gaining access refers to the true attack phase.
● The exploit can occur over a LAN, locally, Internet, offline, as a
deception or theft.
● System Hacking
● Sniffers
● Social Engineering
● Denial of Service
● Session Hijacking
● Buffer Overflows
● Rootkits
● Hacking Web servers
● Web application vulnerabilities
● Web based password cracking
● SQL injection
● Hacking Wireless networks
● Virus and Worms
● Evading IDS, firewalls, Honeypots
● Cryptography

 

System Hacking


● Remote password guessing
● Privilege escalation.
● Password cracking
● Dictionary and Brute force attack
● Social engineering and Shoulder sniffing
● Dumpster Diving
● Key loggers
● Hiding files
● Steganography

 

Maintaining Access


● Maintaining access refers to the phase when the attacker tries to
   retain his 'ownership' of the system.
● Install tools such as
● Rootkits.
● Trojans and its backdoors.

 

Social Engineering


● It is an art of using influence and persuasion to deceive people
   for the purpose of obtaining information or to perform some
   action.
● Even with all firewalls, authentication processes, VPN,
   companies are still wide open to attacks.
● Humans are the weakest link in the security chain.
● It is the hardest form of attack to defend against.

 

 

!-- Born To Win--!

!--Hacking Is a Lifestyle--!