Advertisement
joelnazarene

Untitled

Apr 16th, 2018
153
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.50 KB | None | 0 0
  1. ---
  2.  
  3. Mobile Hacking
  4.  
  5. -> Android and iOS
  6.  
  7. Security
  8.  
  9. -> Never Ever install apks from outside playstore.
  10.  
  11. -> Always check permissions while installing applications on android.
  12.  
  13. -> Install Unhack - Gadget Guru
  14.  
  15.  
  16.  
  17. https://www.flexispy.com
  18.  
  19.  
  20.  
  21.  
  22.  
  23. Introduction to Ethical Hacking
  24.  
  25. -------------------------------
  26.  
  27. Hacking : Hacking is an art of exploring technology to its extent to find any loophole inside it.
  28.  
  29.  
  30.  
  31. Types of Hackers
  32.  
  33. ----------------
  34.  
  35. Black Hat Hat :  These are high class cyber criminals with having minimum 10 years of experience in computer field i.e they have No no word in their dictionary.
  36.  
  37. -> Langauge
  38.  
  39. -> Operating SYtem
  40.  
  41. -> Web Application Technology
  42.  
  43. -> Databases
  44.  
  45. For Example: Unix Terrorist
  46.  
  47.  
  48.  
  49.  
  50.  
  51. White Hat Hackers: These are good people having same skill sets like black hat but they help govt , private sectors banks to protect their infrastructure from cyber attacks for criminals.
  52.  
  53.  
  54.  
  55. Grey Hat Hackers : These are half devil and half angel kind of hackers who works as white hat in day and black hat in night.
  56.  
  57. For Example: Shadow008 Hacker from Pakistan.
  58.  
  59.  
  60.  
  61. Script Kiddies: These are kids having no idea about hacking, but still they hack bcz of the following very important reasons.
  62.  
  63. -> Mood
  64.  
  65. -> Revenge
  66.  
  67. -> Impress
  68.  
  69.  
  70.  
  71. Learn The Art of Hacking
  72.  
  73. www.hackforums.net
  74.  
  75. -> Do not register with your real name
  76.  
  77. -> Never say that you are male or female
  78.  
  79. -> Never do any live chat with any member no MATTER WHAT.
  80.  
  81. -> WHile talking to people there make sure ur webcam and mic is protected by a tape.
  82.  
  83.  
  84.  
  85. Network Basics
  86.  
  87. --------------
  88.  
  89. IP Address: Its like your phone number to you.
  90.  
  91. IPV4 and IPV6 X
  92.  
  93. Home WOrk 1: What is IPV5?
  94.  
  95.  
  96.  
  97. Type of IP address
  98.  
  99.  
  100.  
  101. Local IP address : LAN and MAN
  102.  
  103. 192.168.1.1
  104.  
  105. 172.16.1.1
  106.  
  107. 10.0.0.1
  108.  
  109.  
  110.  
  111. How to see your IP address ???
  112.  
  113. WIndows: command prompt -> ipconfig
  114.  
  115. Linux/Mac: terminal-> ifconfig
  116.  
  117.  
  118.  
  119.  
  120.  
  121. Global IP address : WAN (Wide Area Network)
  122.  
  123. Global IP is given by your ISP(Internet Service Provider)
  124.  
  125. As you on your data connection you request the DHCP server to avail an IP address and then DHCP release an IP address free in the IP pool table list. and then with that IP address you surf the internet.
  126.  
  127. Airtel : 122.0.0.1-122.255.255.254
  128.  
  129. Releince: 112.0.0.1-112.255.255.254
  130.  
  131. Tata : 14.0.0.1-14.255.255.254
  132.  
  133. Vodafone: 1.0.0.1-1.255.255.254
  134.  
  135.  
  136.  
  137. VSNL -->TATA Communication
  138.  
  139.  
  140.  
  141. whatismyip.com
  142.  
  143.  
  144.  
  145. Veg People : www.ipcow.com
  146.  
  147. Non Veg People: www.ipchicken.com
  148.  
  149.  
  150.  
  151. Cyber Terrorism : Steganography
  152.  
  153. -------------------------------
  154.  
  155. Video : https://www.youtube.com/watch?v=xEfzJgRN2o4
  156.  
  157.  
  158.  
  159. Cryptography : Its a method of scrambling the data in such a format so that no one will be able to understand what was sent.
  160.  
  161.  
  162.  
  163. rahul123 ---> !@#$%^& --> rahul123
  164.  
  165.  
  166.  
  167. Steganography : Where as the goal of the cryptography is to scrambled the data from the third party here the goal of the steganography is to HIDE the data from the third party.
  168.  
  169.  
  170.  
  171. Example: 9-11 Attack
  172.  
  173.  
  174.  
  175.  
  176.  
  177. Social Networking Insights
  178.  
  179. -> How to Delete Fake facebook profiles in 24 hours without police help
  180.  
  181. Step 1: Identify the fake profile link.
  182.  
  183. www.facebook.com/profile=1123123213
  184.  
  185.  
  186.  
  187. Step 2: Click on teh report abuse.
  188.  
  189. -> Spam<---
  190.  
  191. -> Adult Content<---
  192.  
  193. -> Hrassment
  194.  
  195. -> Illegal/ Copyright content
  196.  
  197.  
  198.  
  199. Group : https://www.facebook.com/groups/deletefakeprofiles/
  200.  
  201.  
  202.  
  203.  
  204.  
  205.  
  206.  
  207.  
  208.  
  209. Information Gathering
  210.  
  211. -> Adhar Card Problem
  212.  
  213.  
  214.  
  215. -> Getting remote IP of Criminals from Skype,Facebook, Whatsapp, for identity check.
  216.  
  217.  
  218.  
  219. Website : www.fuglekos.com/ip-grabber
  220.  
  221.  
  222.  
  223. Open : https://goo.gl/Nyq7Qe
  224.  
  225.  
  226.  
  227. Target IP : 137.97.5.218
  228.  
  229. iplocation.net --> Add 137.97.5.218
  230.  
  231.  
  232.  
  233. jantakhoj.com
  234.  
  235. -> Rs 1999
  236.  
  237.  
  238.  
  239. Cyber Forenics
  240.  
  241. -> How to recover deleted data from smartphones,hard drives, pendrives , laptops.
  242.  
  243.  
  244.  
  245. Primary : RAM
  246.  
  247.  
  248.  
  249. Secendory : HDD and so on.
  250.  
  251.  
  252.  
  253. Formatting
  254.  
  255. Quick Format   : 15 Seconds : No data In pendrive
  256.  
  257.  
  258.  
  259. Complete Format : 1.2Hours : No data in Pendrive
  260.  
  261.  
  262.  
  263. 1GB : 1024MB ???
  264.  
  265. Can you have the entire 1024MB to use ???
  266.  
  267. 850MB
  268.  
  269.  
  270.  
  271. 1000MB -> 250MB will be reserved as the hardware drivers for communication.
  272.  
  273.  
  274.  
  275. 200MB : Kerenl
  276.  
  277. 800MB: User Level
  278.  
  279.  
  280.  
  281. Index  data          size
  282.  
  283. 10101  movieHD.mp4   700MB
  284.  
  285. 11111  setup.exe      50MB
  286.  
  287. 11100  Pikapi.pdf     50MB
  288.  
  289.  
  290.  
  291. -> secret about factory reset.
  292.  
  293. http://www.androidcentral.com/securely-wiping-your-android-phone-makes-it-just-fine-sell-fud
  294.  
  295.  
  296.  
  297.  
  298.  
  299.  
  300.  
  301.  
  302.  
  303. System Hacking
  304.  
  305. -> Cracking Windows 7, 8, 10.1 passwords
  306.  
  307. Windows: Windows stores its login password in afile known as SAM file (Security Accounts Manager) which is placed on the path such as c:/windows/system32/config/sam
  308.  
  309.  
  310.  
  311. sam --> password(hashvalue)
  312.  
  313.  
  314.  
  315. Active Password Changer : Will help us to reset the admin password of any windows platform operating system.
  316.  
  317.  
  318.  
  319. Hiren Boot CD: 700MB toolkit
  320.  
  321. Disaster Recovery Toolkit
  322.  
  323. 450+ Softwares
  324.  
  325. Windows XP Live
  326.  
  327.  
  328.  
  329. Download: http://www.hirensbootcd.org/files/Hirens.BootCD.15.2.zip
  330.  
  331.  
  332.  
  333. Make Bootable Pendrives
  334.  
  335. -----------------------
  336.  
  337. unetboot application : Download
  338.  
  339. Pendrive Linux : Download
  340.  
  341.  
  342.  
  343. Home WOrk 2: How to protect SAM file from being hacked?
  344.  
  345. Windows 10 10.1 : To crack 10 and 10.1 we have new version of active password changer
  346.  
  347.  
  348.  
  349.  
  350.  
  351. -> Cracking Mac OS in 10 Seconds
  352.  
  353.  
  354.  
  355. -> How we can secure
  356.  
  357.  
  358.  
  359. 11111/  "view.shtml"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement