VMWare – http://www.vmware.com/ or Virtual Box – https://www.virtualbox.org/
Kali Install Directions – http://docs.kali.org/category/installation
Kali Downloads – http://www.kali.org/downloads/
Kali Repositories – http://docs.kali.org/general-use/kali-linux-sources-list-repositories
Metasploitable 2 – http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
Microsoft Evaluation Software – http://technet.microsoft.com/en-us/evalcenter
Continue reading “Installing and Basic Overview of Kali linux”
Lets don’t bother about the formal introduction of
- What is hacking ?
- What are the skills and programming languages required for a hacker ?
- And finally the types of hackers and Hacking Techniques
Many of you are familiar with all of these and these will not update on regular basis, and you can find a more detailed information by Googling and watching some videos in Youtube.
Continue reading “Introduction of Kali Linux”
Scan for Vulnerabilities
Vulnerability scanning identifies vulnerabilities and weaknesses of a system and network in order to determine how a system can be exploited
In the previous post, we studied and gathered information about Banner Grabbing Technique and how to prevent our web server from being attacked by Hackers.
Continue reading “Scan for Vulnerabilities – Vulnerability Scanning”
Banner grabbing or OS fingerprinting is a method to determine the operating system running on a remote target system. Banner grabbing is important for hacking as it provides you with a greater probability of success in hacking. This is because most of the vulnerabilities are OS specific. Therefore, if you know the OS running on the target system, you can hack the system by exploiting the vulnerabilities specific to that operating system.
Continue reading “Banner Grabbing Technique and How to prevent your web-server – Network Scanning”
So far we discussed how to check for live systems. Open ports are the doorways for an attacker to launch attacks on systems. Now we will discuss scanning for open ports.
In this topic, we are going to cover the three-way handshake, scanning IPv6 networks, and various scanning techniques such as FIN scan, SYN scan, and so on.
Continue reading “Check for open ports – Part 1”
Overview on Network Scanning
As we already discussed, footprinting is the first phase of hacking in which the attacker gains information about a potential target. Footprinting alone is not enough for hacking because here you will gather only the primary information about the target. You can use primary information in the next phase to gather much more details about the target. The process of gathering additional details about the target using highly complex and aggressive reconnaissance techniques is called scanning.The idea is to discover exploitable
Continue reading “Network Scanning”
We already discussed the footprinting concepts and footprinting methodologies, those are some ways attacker go through for finding sensitive data without your knowledge.
To prevent such actions here are some list of precautions that every company or organization should take care of.
Continue reading “How to secure your company from getting Hacked – Footprinting Countermeasures”
This is the 2 part of the concept Footprinting.
Footprinting methodologies are as follows
- Footprinting through search engines
- Footprinting Using Advanced Google Hacking Techniques
- Footprinting through social networking sites
- Website footprinting
- Email Footprinting
- Competitive Intelligence
- WHOIS Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting Through Social Engineering
Continue reading “Footprinting Methodology”