You are on page 1of 2

three types of hackers

1.white hand
2.black
3.grey
white hat-who hack legal purose who work for police
black hat -illigal hackers
grey-politicians
->script ed-most dangerous hackers
->hactivist-politically syred hackers(ic's)
->5 steps of hacking
1.information gathering
2.scanning
3.gaining access
4.maintaining access(mostly performes by black hat hackers)
5.covering tracks
->laptop has 65535 ports(65535 ways of hacking it)
->hackers clear event logs
1.vulnarability
2.payload
3.exploid
vunarability-weaknes of our target system
virtualization
kali linux (os to the hacker- by the hacker- for the hacker)
beacuse 500 preinstalled tools
#-route-for admin
->ifconfig for checking ip address
pwd-present working directory
for changing folder "ls/folder name/
cd -change directory
cd ..- to exit
echo is used to print in kali linux
linux is case sensitive....
rm "file name" to delete
there is no need for extension in linux
to create file touch "file name"
->cat "filename" to see where there is something in file or not
echo commannd is used to add some thing into the file
->nano is text editor like notepad but notead is GUI
nano "filename" for changing something in file
echo "something">>file name=for writing into file
ech0 ".......">filename=whole data will change to "........"
top command is used to something.....
PID for firefox is 2195
then for stopping any app press KILL PID
to filter some thing command is "grip"
preloaded help command man nano for discription
or we can use help command like like.h
ls .la for seeing hidden files
.files are hidden files
MALWARES
MAL-malicious(any thing which cause harm to our device)
WARES-software
subdivision of malwares
1.virus(they are .exe files)
2.worms
3.trojan
4.rootkit
5.adware
6.spyware
7.rat
8.ransomware
in windows everey thing is exeutable fire and in linus all are files
exe-executable file
limitation of virus is they need to clicked (double click)
worms are also a type of virus but which they multiply them selves rapidly
TROJAN-it seems to be important but it scans many software
ROOTKIT-affects ur mother board(system crashes.....)
ADWARE-advertisement software-unintentionally we visit a website which gives u pop
ups
SPYWARE-mostly used by inelligence to spy on softwares
RANDSOMEWARE-malware which complete hacks your device
software to download....JPS VIRUS MAKER
TERA BIT VIRUSMAKER
for rat-NJRAT
DARK COMET
with the help of social engineering we can hack
before downloading any virus file to check any malware virustoal.com
WEB APPLICATION SECURITY
=============
BUG BOUNTING
with the help of kali linux hacking metasploitable2
website--collection of web pages
static and dynamic are 2 types of websites
static-no database-doesnt change with user
dynamic-with database
2 types of accessing internet
1.get-easier to exploit(www.hihihaha.com/login.php?id=5353)
2.post(www.hihihaha.com/login.php)
XSS(cross site scripting)
2 types....1.reflected-the bug which is detected by the user only
2.stored-any one who is visiting can see
DVWA-damp vulnarable web app
manish bhardwaj-quora-linkedin
ipaddress is the name given to particular device just like home address
ip address provided by home router is private ip
|| internet is public ip
ranges of ip
1..A.1-126 (we can use 2'24 devices)foe bigger network
2..B.128-191(2'16)
3..C.192-223(2'8)for weak devices
4..D.224-239=for multitasking tv channel
5..E.240-255 =for reasearch
we are not allowed to use 127.0.0.1 because its local address

You might also like