Author � Leo Harsha
Click Here To Follow
What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creators original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and its not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.
There are three types of hackers :-
1. White hat hacker (WHH)
1. White hat hacker (WHH)
2. Black hat hacker (BHH)
3. Gray hat hacker (GHH)
4. Script Kiddie
4. Script Kiddie
Here is some Professional hacking attacks, Hope every beginner will like to read this article.
I created a list call it as a Pro hack attack (PHA)
Download This Complete List From here
- Session One Getting the basics right
- TCP/IP Fundamentals
- System Fundamentals
- Firewall Technologies
- Programming & Database Fundamentals
- Session Two - Network Cartography
- Advanced Google Hacking
- Fingerprinting
- Nmapping the network
- Footprinting
- Session Three - Exploitation
- Hacking networks
- Hacking servers
- Hacking databases
- Backdooring
- Session Four - Advanced Exploitation
- Hacking WLANs
- Evading IDS, Firewalls and Detecting Honey Pots
- Web Application Hacking
- Advanced Web Hacking
- Hacking Web Browsers (Firefox, IE)
- Session Five - Black-belt Hacking
- Buffer overflows
- Metasploiting the universe
- Reverse Engineering
- Covert Hacking
- Session Six - Social Engineering
- What is Social Engineering?
- Common Types of Attacks
- Social Engineering by Phone
- Dumpster Diving
- Online Social Engineering
- Reverse Social Engineering
- Policies and Procedures
- Employee Education
- Session Seven - Cryptography
- Encryption and Decryption
- Cryptographic Algorithms
- . DES
- . RC
- . RC
- . Blowfish
- . MD
- . SHA
- Government Access Key - GAK
- Digital Signature
- Cryptography Tools
- Code Breaking Methodologies
- Cryptography Attacks
- Session Eight - Honeypots
- What is Honeypot?
- Honey net Project
- Types of Honey Pot
- Honey Pot Replacement
- Various Open Source and Commercial Honey Pots
- Session Nine - Esoteric Hacking
- link download
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.