HackingSchool
Saturday, 17 December 2016
Saturday, 3 December 2016
Friday, 10 June 2016
The Five Stages of Ethical Hacking
Following are the steps of ethical hacking process.
Phase 1—Reconnaissance
Phase 2—Scanning
Phase 4—Maintaining Access
Phase 5—Covering Tracks
Phase 1: Passive and Active Reconnaissance
Passive reconnaissance involves gathering information regarding a potential target without
the targeted individual’s or company’s knowledge. Passive reconnaissance can be as simple as
watching a building to identify what time employees enter the building and when they leave.
However, it’s usually done using Internet searches or by Googling an individual or company
to gain information. This process is generally called information gathering. Social engineering and dumpster diving are also considered passive information-gathering methods.
Sniffing the network is another means of passive reconnaissance and can yield useful information
such as IP address ranges, naming conventions, hidden servers or networks, and other
available services on the system or network. Sniffing network traffic is similar to building
monitoring: A hacker watches the flow of data to see what time certain transactions take place
and where the traffic is going.
Active reconnaissance involves probing the network to discover individual hosts, IP addresses,
and services on the network. This usually involves more risk of detection than passive reconnaissance
and is sometimes called rattling the doorknobs. Active reconnaissance can give a hacker an
indication of security measures in place (is the front door locked?), but the process also increases
the chance of being caught or at least raising suspicion.
Both passive and active reconnaissance can lead to the discovery of useful information to
use in an attack. For example, it’s usually easy to find the type of web server and the operating
system (OS) version number that a company is using. This information may enable a hacker
to find a vulnerability in that OS version and exploit the vulnerability to gain more access.
Phase 2: Scanning
Scanning involves taking the information discovered during reconnaissance and using it to
examine the network. Tools that a hacker may employ during the scanning phase can include
dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are
seeking any information that can help them perpetrate attack such as computer names, IP
addresses, and user accounts.
Phase 3: Gaining Access
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
Phase 4: Maintaining Access
Once a hacker has gained access, they want to keep that access for future exploitation and
attacks. Sometimes, hackers harden the system from other hackers or security personnel by
securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns
the system, they can use it as a base to launch additional attacks. In this case, the owned system
is sometimes referred to as a zombie system.
Phase 5: Covering Tracks
Once hackers have been able to gain and maintain access, they cover their tracks to avoid
detection by security personnel, to continue to use the owned system, to remove evidence of
hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files
or intrusion detection system (IDS) alarms. Examples of activities during this phase of the
attack include steganography, the use of tunneling protocols, and altering log files.
for continues update on Ethical Hacking visit and like
Wednesday, 8 June 2016
There are lot's of people are there who want to become a hacker or
ethical hacker.Befer becomming a hackwr you need to study what actually
mean by hacker and ethical hacker.Hacker is a person with stong
knowledge of cyber security ,which he use to make harm to system.on
other side ethical hacker is a person with same skillset bt whos aim is
to secure a system from hacking.his main goal is to make secure system.
There are Three to four Type of Hacker.
1)Black Hat Hacker .
2)White hat Hacker.
3) Gray Hat Hacker.
4) Script kiddies.
5)Phlickers
There are Three to four Type of Hacker.
1)Black Hat Hacker .
2)White hat Hacker.
3) Gray Hat Hacker.
4) Script kiddies.
5)Phlickers
To become as an Hacker is not easy as studyng an subject.it need lot's of knowldge ,logic.and that kind of mindset.
It will require Following knowlede topsi.
1)Hardware
2)Networking.
3)OS.
4)Programming.
etc.
For more info visit.
www.hackingschool.inwww.abhaybhosale.com
It will require Following knowlede topsi.
1)Hardware
2)Networking.
3)OS.
4)Programming.
etc.
For more info visit.
www.hackingschool.inwww.abhaybhosale.com
Thursday, 1 October 2015
How to save Laptop Battery Power without any Software
Today we will see how to save laptop battery and increase the standby time of your
laptop without any software.
Till today you have used many application to save battery but you may found that
no any software can really reduce the energy consumption . So before the solution i will tell you how laptop uses your battery.when you start your laptop at that time all you hardware part uses you battery to run.
At the same time there are many processes are working in the background for it .some of the processes are started automatically on system start up by default which are not you uses every day.already you have installed many apps in you system and for every app there at least one or more services are running .so some services are started on you manual app start or some start on system start up.
So among this all services or processes many processes are not required by you this time .and this unwanted processes consume you battery.so to save battery you need to stop them when not required.You can also again start them when you required.by doing this only required processes will run and automatically your battery consumption will reduced.
How to Stop Unwanted services.
To stop services there is an easiest way for windows 7 and windows 8 users is given below.
Just go to start menu and in search box type "services.msc" one item will appear in search result with the setting symbol.open that file which will show list of all services.Inthis list of all services you can see th list of all services.at same time open open "Task Manager" and under processes tab see which processes are using how much memory .now you can stop that processes from task manager and you can stop services from "services " window.
Below i i have given the screenshot of Services and Task manager .
Remember Services and Processes are somewhat different from each other.


laptop without any software.
Till today you have used many application to save battery but you may found that
no any software can really reduce the energy consumption . So before the solution i will tell you how laptop uses your battery.when you start your laptop at that time all you hardware part uses you battery to run.
At the same time there are many processes are working in the background for it .some of the processes are started automatically on system start up by default which are not you uses every day.already you have installed many apps in you system and for every app there at least one or more services are running .so some services are started on you manual app start or some start on system start up.
So among this all services or processes many processes are not required by you this time .and this unwanted processes consume you battery.so to save battery you need to stop them when not required.You can also again start them when you required.by doing this only required processes will run and automatically your battery consumption will reduced.
How to Stop Unwanted services.
To stop services there is an easiest way for windows 7 and windows 8 users is given below.
Just go to start menu and in search box type "services.msc" one item will appear in search result with the setting symbol.open that file which will show list of all services.Inthis list of all services you can see th list of all services.at same time open open "Task Manager" and under processes tab see which processes are using how much memory .now you can stop that processes from task manager and you can stop services from "services " window.
Below i i have given the screenshot of Services and Task manager .
Remember Services and Processes are somewhat different from each other.
Subscribe to:
Posts (Atom)