Posts

Showing posts from February, 2020

P4- Stages of Ethical Hacking

Image
Hi, Today we are starting to learn the actual course content that we are here for, "Ethical Hacking". let's begin! There are five stages of ethical hacking: Reconnaissance Scanning & Enumeration Gaining Access Maintaining Access Covering tracks Reconnaissance: Reconnaissance aka information gathering. There are two types of Reconnaissance, Active and Passive Reconnaissance. Passive Reconnaiosece is where an ethical hacker google about any company, gather the information by going through different search engines, by going through the Facebook page of the company or by visiting the profile of the employees, making a list of the email of the employees by going through their twitter or FB account, etc, etc, so not doing anything directly, the company does not know about this. Whereas Active Rconnaisence is where an ethical hacker goes through the network of any company by any means. In this, the ethical hacker actually discovers the hosts Ip, servers,

P3- Basic Bash Scripting

Image
Hi Everyone! Today we are learning basic bash scripting. So let's begin. We will learn about the following commands grep cut tr scripting with bash for loop grep : it will narrow down our results, for example, if we ping any IP, and we want to gather info, if ping was valid or not, so for that, we will use grep to narrow down, let say we have a list of pings of different IP addresses, and we want to get only those pings that were valid, we will use grep on that list and so narrowing our results. cut, tr, both also narrow down our results. let's get started First, I am gonna ping my very own machine with my IP address If we wanna send only one packet to see if the host machine is alive or not, we will use "-c 1" to send only one packet to the host. Now as you can see, if I write -c 3, it will send only 3 packets, so it depends. I am gonna put the ping results into a text file, and after placing the results in i.txt file, I cat the file, so it

P2- Intro to Kali Linux

Image
Hi Everyone! Today we are recalling some Kali Linux commands, So let's begin. ============================== Navigate to File System ============================== ·     Command:   ls -la It shows hidden folders. mkdir  For making a new folder. cd cd for changing the folders or going in other folders or directories.  cd .. For going backward in the folder in the same directory. man command e.g man ls it now gives a manual guide of the command, man is like a help command, both are pretty close but man gives more detailed guide. also, ls --help can be used echo "hi" > test.txt This command makes a txt file with name "test" and writes "hi" inside of it cp test.txt downloads/ This command  means copy "test.txt" to "downloads" folder rm Downloads/test.txt remove command, so it removes the "test.txt" command that we just made. mv test.txt Downloads/ move command, it moves the "tes

Part 1-Networking Concepts

Image
Hi Everyone! Today we are recalling some basic networking concepts, we don't need to go very deeply into these concepts, so we are touching the basics. So let's begin. ============================== IP Addresses ============================== ·          Layer 3 Protocol Layer 3 Protocol IP Address is a sequence of number that indicates the host or network identification and location addressing , means it located that which devise has which ip address to send or receive data. There are two types of IP Address, IPv4 and IP v6 E.g IPv4: 192.168.32.19 (inet) It has 8 bits octet each so a total of 32 bit = 4 bytes an IPv4 network can have 2 raised to power 32, possible addresses E.g IPv6 (inet6) 2 raised to power 128 but it's not yet used so we have IPv4 and then we use NAT with IPv4 adress, means Network Address Translation, whenever there is a network, we have multiple devices attached to a single router and that router is providing us the