Posts

P5- Reconnaisance (part-1)

Image
Hi everyone! let's just get straight to the lecture. ============================== Passive Reconnaissance ============================== There are types of Passive Reconnaisssance as explained below: 1)Physcial/social reconnaissance: In physical reconnnaisance, we may go through the company and try to gather information, maybe we have the location informatrion of the compoany and we search for the badge photos , we may be flying a drone and seeing that what the building layout is? where are the doors? how can a person enter into the building? where is the security in the building etc etc. Whereas the social reconnaissance is that we can do social engineering or phishing kind of things to gather information, we may be looking at the pictures of the employees that they post on their social sites and try to gather information, maybe we are looking at the badge photos, desktop photos, computer photos, etc,  For instance, a person posted his photo with his laptop a

P4- Stages of Ethical Hacking

Image
Hi, Today we are starting to learn the actual course content that we are here for, "Ethical Hacking". let's begin! There are five stages of ethical hacking: Reconnaissance Scanning & Enumeration Gaining Access Maintaining Access Covering tracks Reconnaissance: Reconnaissance aka information gathering. There are two types of Reconnaissance, Active and Passive Reconnaissance. Passive Reconnaiosece is where an ethical hacker google about any company, gather the information by going through different search engines, by going through the Facebook page of the company or by visiting the profile of the employees, making a list of the email of the employees by going through their twitter or FB account, etc, etc, so not doing anything directly, the company does not know about this. Whereas Active Rconnaisence is where an ethical hacker goes through the network of any company by any means. In this, the ethical hacker actually discovers the hosts Ip, servers,

P3- Basic Bash Scripting

Image
Hi Everyone! Today we are learning basic bash scripting. So let's begin. We will learn about the following commands grep cut tr scripting with bash for loop grep : it will narrow down our results, for example, if we ping any IP, and we want to gather info, if ping was valid or not, so for that, we will use grep to narrow down, let say we have a list of pings of different IP addresses, and we want to get only those pings that were valid, we will use grep on that list and so narrowing our results. cut, tr, both also narrow down our results. let's get started First, I am gonna ping my very own machine with my IP address If we wanna send only one packet to see if the host machine is alive or not, we will use "-c 1" to send only one packet to the host. Now as you can see, if I write -c 3, it will send only 3 packets, so it depends. I am gonna put the ping results into a text file, and after placing the results in i.txt file, I cat the file, so it

P2- Intro to Kali Linux

Image
Hi Everyone! Today we are recalling some Kali Linux commands, So let's begin. ============================== Navigate to File System ============================== ·     Command:   ls -la It shows hidden folders. mkdir  For making a new folder. cd cd for changing the folders or going in other folders or directories.  cd .. For going backward in the folder in the same directory. man command e.g man ls it now gives a manual guide of the command, man is like a help command, both are pretty close but man gives more detailed guide. also, ls --help can be used echo "hi" > test.txt This command makes a txt file with name "test" and writes "hi" inside of it cp test.txt downloads/ This command  means copy "test.txt" to "downloads" folder rm Downloads/test.txt remove command, so it removes the "test.txt" command that we just made. mv test.txt Downloads/ move command, it moves the "tes