In a previous article, we discussed termux in detail. It answered all the necessary questions about termux. Including what is termux, how it works, how it’s used in hacking, and many more. We also showed how to install hacking tools termux. Metasploit was also one of them. But the process we discussed in the article […]
Learn basic concepts of Ethical Hacking/Penetration Testing and Information Security.
In this category, you’ll find all the basic information you need to get started with Ethical Hacking or Penetration Testing. You can do further research on these topics and learn the art of Penetration testing. Our series is divided into 2 parts. The first part is completely for beginners. Where we’ll discuss the basic ways to gain access over a targeted victim. We’ll discuss techniques like phishing, social engineering and others used to scam/trick a victim. The second phase/part will include the proper concept of penetration testing including vulnerability assessment, exploitation, reverse engineering, and other stuff.
Here is the overview of our series:
Basic Concepts of Ethical Hacking:
Access through stealing Login credentials.
- Login and Access
- Authorized and Unauthorized Access
- How passwords are stored
- Gaining Unauthorized access
- Information Gathering
- Some common techniques
- Social Engineering
- Password stealing
Access through Vulnerabilities:
- Concept of Vulnerability
- Understanding vulnerabilities
- Vulnerability assessment and Exploitation
- Vulnerability Assessment
- Exploit Development
- Reverse Engineering
Stored XSS in a Social Media website through Sign up Malicious Code Executed as XSS What is XSS? Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual […]
We’ve so far discussed the login process, and how the passwords are stored. We’ve also touched a little bit about types of access and definition of unauthorized access. Now let’s move further. And look at some ways of gaining unauthorized access over a targeted user/system. Such access depends on particular circumstances. Maybe it’s a developer’s […]