Posts

Showing posts from January, 2017

What is sniffing?

Image
Wiretapping is a process of monitoring the telephone and internet conversations by a third party attackers connect a hardware or software or combination of both to the switch carrying information between two phones or hosts on the internet. Types of wire taping 1. Active wire taping : It only monitors, records the traffic (silently) and also alters the traffic. 2. Passive wire taping : It only monitors and records the traffic. Sniffing attacks are vulnerable to following protocols. 1. Telnet 2. FTP 3.SMTP 4. HTTP 5. POP3 6. NTP 7. IMAP 8. SNMP 9. RDP In network sniffing attacks are mostly done on data link layer and network layer of OSI reference model based switches Recommended sniffing tool is Wireshark.  Wireshark is available for both windows and Linux , it is the best tool for sniffing and it's absolutely free . You can download Wireshark from their official site  Wireshark download . Session Hijack

How to do Scanning?

Image
Scanning refers to a set of procedures for identifying active hosts , ports and services in a network. Scanning is one of the components of intelligence gathering an attacker uses to create a profile of the target organization. Types of Scanning 1. Network Scanning. 2. Vulnerability Scanning. Network Scanning  Objectives of Network Scanning are Identifying live hosts and MAC Addresses.  List of Network Scanning Softwares. 1. NMAP. 2. Angry IP Scanner. 3. Advanced IP Scanner. 4. Pingtester. Vulnerability Scan It is a proactive method for analyzing vulnerabilities on target network with help of vulnerability scanning. vulnerabilities can be classified as severe,high,medium,low and information based on risks found on the target. List of commercial vulnerability scanners used in coperate companies. 1. Nessus VS 2. Saint VS 3. Qualys VS 4. Nexpose VS 5. GFI Languard VS 6. Coreimpact VS 7. Solar winds engineers toolset VS Scanning Counter Mea

Footprinting

Image
Footprinting is the first step in the hacking process. In this method, hacker tries to gain as much information as possible about target which may lead to compromise the target. Types of footprinting 1. Open source information gathering. 2. Information gathering with hacking tools. Google Hacking It is an open source information gathering technique where hacker try to find important information about targets, like companies subdomains, IP addresses, email ID's, Employee's database, passwords and sites of the company which are vulnerable to hacking attacks through the help of special keywords used in google search engine is known as Google hacking. List of Google Dorks 1. inurl: login.asp or (php,aspx) 2. filetype: ppt ethical hacking    ( instead ppt you can also put doc,xls etc) 3. intitle: ethical hacking 4. inurl: ac.in filetype:xls name 5. inurl: view/index.shtml (unprotected cameras) and there are lots of keywor

Networking Fundamentals

Image
Network A network is a group of two or more computers linking together for sharing information with each other. Types of Networks 1. LAN (Intranet). 2. WAN (Internet). 3. MAN (LAN + WAN). 4. CAN (campus area network). 5. PAN (personal area network). 6. SAN (storage area network). 7. HAN (home area network). 8. SAN (space area network). Classes of IP Address             Class                                              IP Range               A                                          0.0.0.0 - 126.255.255.255               B                                      128.0.0.0 - 191.255.255.255               C                                      192.0.0.0 - 223.255.255.255               D                                      224.0.0.0 - 239.255.255.255                       E                                      240.0.0.0 - 254.255.255.255 Note   " Class A IP address range 127.0.0.0 - 127.255.255.255 i

Cyber War

Image
Information Warfare or InfoWar     source: " http://map.norsecorp.com " Definition "The term info war refers to use of information and communication technologies (ICT) to take competitive advantages over an opponent." Example Suppose there is a mobile company say, Samsung, Samsung has developed a new android with lots of features and options in that particular phone. The phone has not yet released it's just in the testing stages, and another company named ABC, tries to hack the Samsung database to steal the information about that particular project. This is called info war. Defensive Info War It refers to all the strategies  and actions to defend against attacks on ICT assets (properties). It includes prevention, alerts, detection, emergency preparedness and incident response for cyber attacks coming through the internet. Offensive Info War It refers to all strategies and actions to attack against ICT assets. It i

Ethical Hacking General Steps

      Steps of Hacking Sounds cool right? Finally getting into the matter! Anyways you must have observed that I haven't used the term ethical while in this heading, it's because this is the common procedure for all the types of hackers to hack someone. I will be using little technical terms so don't get confused it will be explained in the upcoming posts on my blog. So, coming to the point there are in total 11 steps, these all steps are mandatory if want to hack someone and to not to get caught. steps: 1. Footprinting. 2. Network Scanning. 3. Port Scanning. 4. Version Detection Scan. 5. OS Fingerprinting. 6. Vulnerability Scanning. 7. Search and Build Exploit. 8. Social Engineering. 9. Attacking. 10. Maintaining access with Trojans. 11. Covering Tracks or cleaning Evidence. so, guys, these are the steps to be followed for the task. You must be having a question about what these all are, trust me later on you

Ethical Hacking Basic Terms

Image
Ethical hacking " Ethical Hacking " when I heard this word for the 1st time I completely ignored the word " Ethical " and focused on " Hacking ".  So, almost all are very interested to know about hacking or I can say password cracking. So what is Ethical Hacking anyway? In a general term, I would like to call ethical hacking a process in which a person gets paid for messing up with your stuff online or offline. wait! wait! we do have a definition for it also! " It is a process of checking and testing the organization network for the possible loopholes and vulnerabilities. The individuals or experts(of course they are.) who perform ethical hacking are called white hats .They perform hacking in ethical ways without causing any damage to the computer system thereby increasing the security perimeter of an organization. " Hackers ! Most of the individuals think that a hacker is a person who actually k