You are on page 1of 4

https://breachdirectory.

org/

Types of hacker=84

Types of hackers:

1. Neophyte Hacker-beginners
2. Script kiddies-Copy Pasters
3. Elite – Not Professional, They will be like professional
4. Sate/nation sponsore d
5. Hactivist- Anonymous

Basic Terminologies

6. Vulnerability-Loopholes
7. Exploit
8. Social Engineering-Tech to manipulate to a person to get the sensitive info
9. Payload- Carries the exploit
10. Daisy Chaining-low previlaged users-high, teacher,hod,dean
11. Malware-Malicious Software
12. Trojan-S/W entering a comp, executes its malware code, software
13. Hack Value-
14. Doxing
15. Zero Day Attack- attaker attacks the patchs(beta version)
16. Phising-
17. Vishing
18. Smishing
19. Spearphising

Phases of hacking

Information gathering-social med ia bios, communication

Scanning-Finding vulnerability

Gaining access-

Maintaining access

Covering tracks
Cyber Kill chain concept

Phase 1- Reconnaissance

Phase 2-Weaponization

Phase 3-Delivery

Phase 4-Exploitation

5-Installation

6-Command and control (C2C)

7-Action on objective

Proxy – its like a middle man b/w client and server

Proxies:

Network

Networking

IP Addresses- IPv4-32bits , IPv6-128bits address

MAC Address-Bits are based on user-alphanumerical

Layer of network:7

PAN

LAN

CAN

MAN

WAM

OSI Reference model


Number of ports=65,535

Categories

1.well known port 0-1023

2.Registered ports 1024-49151

3.Dynamic/Private 49152-65565

Post Request -sending data

and Get Request-fetching datas

Three handshaking

CLIENT SERVEER

SYN SYN

100 SERIES- INFORMATIONS

200 -SUCCESS

300- REDIRECT

400-UNAUTHORIZED

500-SERVER SIDE ERROR


Today-=================================

Stegnography .bmp

Cryptograoogy

Downloading ebooks

Syntax

Drive: <book name>

Session highjacking

Mimt- mam in middle attack

Hints-ch 7/9

https://www.xplg.com/windows-server-security-events-list/

You might also like