Skip to main content

Posts

Showing posts from May, 2020

How to Hack a Website with Basic HTML Coding| Websites

Today i will teach you how to access a website's source HTML in order to attempt to find login information. While you can access HTML for most websites in most browsers, virtually no websites store administrator passwords or other login details in the HTML, and any website which does is most likely still in the early stages of development. Warning - This Method doesn't work most of the Websites because they are advanced now. If it is vulnerable for this then you can only use this method.  Step 1. Open the site you want to  hack . Step 2. Go to the "Login" section. If the website has a dedicated login section, click the Log In or Sign In link to go to it.  Step 3. Open the website's source code. Each browser has a different way of doing this from the menu, but the easiest way to view your website's HTML code is by pressing either Ctrl+U (Windows) or ⌘Command+U (Mac). This will open a new tab with the website's source code displayed. Step 4. Open the &quo

How to Guess any Password like Hackers Do | Password Cracking | Ethical Hacking |

In this article, I am going to tell you how Hackers and Crackers crack the password by Guessing. After reading this, you will be able to start think like a hacker. They use some methodologies while guessing and cracking passwords. So let's dive into it:  1. Guess the most common passwords At the end of every year, a list of the 25 most common passwords is released. These passwords are the easiest to guess and thus the most commonly hacked. Though you should avoid picking any of these passwords for yourself, try guessing from this list of passwords: 123456@  12345678  abc123  qwerty  monkey  letmein  dragon  baseball iloveyou  trustno1 1234567  sunshine  master  123123  welcome  shadow  Ashley  football  Jesus  Michael  ninja  mypassword  password1 2. Use some common password tricks  Other than guessing the most obvious passwords, there are a some tricks that are used by hackers. They know, for example, that there's at least a 50% chance that a victim's password will have on

Perform Information Gathering | Basic Ethical Hacking Course |

Reconnaissance denotes the study of information gathering before any actual attacks are planned. The purpose is to gather as much interesting information as possible about the victim. To accomplish this, many other publicly available sources of information are employed. The extracted information would often already allow a detailed insight into the affected organizations. Information Gathering is the first and foundation step in the success of penetration testing.  The more useful information you have about a target, more you able to find vulnerabilities in the target and hence able to find more serious problems in the target by exploiting them (to demonstrate). In this article, I am discussing ten information gathering techniques for penetration testing of IT infrastructure. 1. Whois Lookup (http://whois.domaintools.com) It helps in identifying the owner of a target, hosted company, and location of servers, IP address, Server Type etc. 2. Identify technologies of the target web applic

Phases Of Penetration Testing | Basic Ethical Hacking Course |

Like most things, the overall process of penetration testing can be broken  down into a series of steps or phases. When put together, these steps form a  comprehensive methodology for completing a penetration test. Careful review  of unclassified incident response reports or breech disclosures supports the  idea that most black hat hackers also follow a process when attacking a target.  The use of an organized approach is important because it not only keeps the  penetration tester focused and moving forward but also allows the results or  output from each step to be used in the ensuing steps. The use of a methodology allows you to break down a complex process into a  series of smaller more manageable tasks. Understanding and following a meth- odology is an important step in mastering the basics of hacking. Depending  on the literature or class you are taking, this methodology usually contains  between four and seven steps or phases. Although the overall names or num- ber of steps can v

Stay Anonymous while surfing on Internet | Basic Ethical Hacking Course

Nowadays, almost everything we Surf On Internet is tracked. We all know that everyone is being surveillanced in this Modern Era. The most Valuable thing in this modern world is Data . The regular users and Cybersecurity experts everyone wants to see how to determine the tracking and remain relatively anonymous on the internet and limit the ubiquitous surveillance. Before further proceeding in hacking and penetration testing, the very first and most important step in a hacker's path is to Stay Anonymous while using Internet. In this tutorial, we are going to be anonymous by using proxychains and tor. We are going to learn how to change your IP address. We will perform this tutorial by using Kali Linux if you haven't installed Kali Linux on your PC then read our article on how to install kali linux in your PC . Install Tor On Kali Linux First lets install tor on our Kali Machine. Tor is free open network that enables anonymous communication. In Kali, open Terminal

Role Of Kali Linux in Ethical Hacking | How to Install Kali Linux in PC | Basic Ethical Hacking Course

INTRODUCTION Welcome to Our Second Article of  'How to be an Ethical Hacker' . We are on the way to becoming Ethical Hackers. In the first article, we learned about Ethical Hacking. Today, We are going to discuss Kali Linux Operating System. If you want to be an Ethical Hacker then you need to learn about Kali Linux. Basically Kali Linux is an Operating System On top of the Greatest Linux system for Penetration Testing is Kali Linux. Kali Linux is Debian-based Linux Distribution (Distro) for safety auditing and primarily for penetration Examination. Kali Linux is the world's most powerful and popular Operating system used for penetration testing.Kali Linux is meant to applied for Security-related jobs. This Operating System is used by security professionals in a broad range of specializations, including penetration testing, reverse engineering, digital forensics and Vulnerability Assessment. Kali Linux earns more quality and keeps growing since MR. ROBOT scene

What Actually the Ethical Hacking is? | Ethical Hacking | Penetration Testing |

Hacking Every coin has two sides likewise Hacking. Hacking can be used to exploit other people or it can also be used to protect them from the Evils of Internet. So Hacking has two sides i.e, White Hat Hacking and Black Hat Hacking . The way to differentiate between them is Authorization . Authorization is the process of asking for approval from an Organization or a Company before Conducting any Tests or Attacks. The White Hat is the legal way of Hacking by obtaining approval from organization while the Black Hat is purely illegal. We are going to talk about White Hat Hacking in this article. Disclaimer - This is for educational purpose only! Please don't try to exploit or harm other people as it may sends you behind the bars. You may be thinking that these are the basic things which i know already but i started this course keeping those people in my mind who have zero knowledge about hacking! So Without further talking let's come to the point. White Hat Hacking is