Ethical Hacking “A DEFENCE DIET”


 This Video Explains about :
1. Introduction to Ethical Hacking “Overview”
– Category of Hackers, Ethical Hacking, Warnings.
– Penetration Test,Testing Models
2. Revealing Asterisk
– Hacking Passwords Behind ‘dots/asterisk’ from Facebook Login Page.
3. KeyLogging Attack
– Local Attack with Software
– Recording each keystrokes of pressed keys/text
– Effective if used brilliantly
– Can be used to hack all kind of emails and passwords.
4. Phising Attack
– Fake Link Creation and Phising Users.
– Getting all login credential of targeted users.
– ‘Must Have Knowledge’ for all Internet users.
5. Virtual Lab for Hacking Research
– Detail Explanation of Requirements
– Virtual Box|VmWare Concept.
6. NMAP – Kali Linux Basics
– Network Mapper
– Some Commands
– Operating System Fingerprint
7. Cracking|Hacking Wireless Key
– Backtrack 5R3 Basics
– Reaver Tool in action

*Everything here is for awareness concept. Don’t try these methods for bad purpose. Apply these knowledge for good purpose and prepare yourself for DEFENCE from these kind of attacks.
– Bijay Acharya

*Note : I used Trial Version of Camtasia Recorder to record this video. Camtasia I downloaded from : http://www.techsmith.com/camtasia.html

Image of Backtrack and Kali Linux was downloaded from : https://www.kali.org/

I used Paid version of Word 2013 to create PDF shown in Video.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s