Skip to main content

Posts

Showing posts from January, 2018

What is Facebook Phishing

facebook Phishing Phishing is the act of fooling a computer user into submitting personal information by creating fake websites that looks like a real (and trusted) sites it is a hacker technique of fishing for password and other secret financial information Phishing is a type of online identity theft. It uses email and fake website  that are designed to steal your personal data or information such as password, account data, or other information the facebook phishing page example is given below Look this is the real facebook page URL but after creating phishing page of the website the website look like same but the URL will change which is redirect the today we create a facebook phishing page which look similar to a facebook page but it’s not actually a facebook page when victim enter his username and password the phishing page will redirect to the other url after creating phishing you can see the facebook page look like real facebook page but the url is changed yo...

What is Cybercrime?

Cybercrime Cybercrime is characterized as a wrongdoing in which a PC is the question of the wrongdoing or is utilized as an instrument to carry out an offense. Cybercriminals may utilize PC innovation to get to individual data, business exchange insider facts or utilize the web for exploitive or noxious purposes. Hoodlums can likewise utilize PCs for correspondence and archive or information stockpiling. Lawbreakers who play out these illicit exercises are regularly alluded to as programmers. Normal kinds of cybercrime incorporate online bank data robbery, wholesale fraud, online savage wrongdoings and unapproved PC get to. More genuine violations like cyberterrorism are additionally of noteworthy concern. Cybercrime includes an extensive variety of exercises, however these can for the most part be broken into two classes: Wrongdoings that objective PC systems or gadgets. These kinds of violations incorporate infections and dissent of-benefit (DoS) assaults. Wrongdoings...

Introduction to Block chain

Introduction to Block chain Block chain is the peer to peer fund transfaring system that  typically managed by a peer-to-peer network, Block chain can be called the spine of the entire crypto-currency system. Block chain technology not only helps with the users perform transactions using crypto-currencies but also ensures the security and anonymity of the users involved It is a continuously growing list of records called blocks, which are linked and secured using cryptographic techniques   the main advantage of block chain  is the Transactions once stored in the Block chain then the transaction will be permanent. They cannot be hacked or manipulated Block chain can be known as the spine of the whole digital money framework. Block chain innovation not just assists with the clients perform exchanges utilizing cryptographic forms of money yet additionally guarantees the security and obscurity of the clients included. It is a ceaselessly deve...

What is Enumeration?

Certified Ethical Hacker(CEH) Official (CEH) Training and Certification Course

Certified Ethical Hacker (CEH) Official (CEH) Training and Certification Course Certified Ethical Hacker  (CEH)  Training  is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a black hate hacker, but Certified Ethical Hacker (ceh)   is work with a lawful  manner to assess the security posture of a target system(s). the  ethical hacking  certification (ceh)  have the power to provide you to better understating  of  ethical hacking  and it’s course (CEH)Certified Ethical Hacker summer Internship  Contents Introduction to Ethical Hacking Foot printing and reconnaissance Foot-printing Active (Tool Based Practical) Foot-printing Passive (Passive Approach) In-depth Network Scanning Enumeration User Identification System Hacking Password Cracking & Bypassing Viruses and Worms Trojan a...

SQL Injection

SQL Injection Many web applications take user input from a form so the user input is used literally in the construction of a SQL query submitted to a database. For example SELECT productdata FROM table WHERE productname = ‘user input product name’ so SQL injection attack involves placing SQL statements in the user input the SQL injection is the type of attack to get login acces from the any website without having password and user name the sql is a special-purpose programming language designed for managing data held in a relational database management systems (RDBMS) we can modifiy these data using sql injection we can also modifiy insert, query, update and delete, schema creation and modification, and data access control Other injection possibilities Using SQL injections, attackers can: Add new data to the database Modify data currently in the database Perform an UPDATE in the injected SQL Often can gain access to other user’s system capabilities by obtaining their pass...

Cross Site Scripting

Cross Site Scripting XSS is a vulnerability when which present in websites or web applications, allows malicious users (Hackers) to insert their client side code (normally JavaScript) in those web pages. When this malicious code along with the original webpage gets displayed in the web client (browsers like chrome IE, Mozilla etc), and it is allows Hackers to gain greater access of that page.The goal of the CSS attack is to steal the client cookies, or any other sensitive information, which can identify the client with the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site – specifically, impersonate the user Example : in corsss site scrpting we can gether credit card number and private information using a CSS attack. This was achieved by running malicious Javascript code at the victim (client) browser with the access privileges of the web site These are the very limited Javascript priv...

Cloud Security and Penetration Testing Services

Cloud Security and Penetration Testing Services What is Cloud, why do We need Cloud Security and Penetration Testing. Cloud services are rapidly increasing popularity in the field of IT, Cloud therefore throws a whole range of unique security concerns into the IT field. These are the common cloud service provider Infrastructure as a Service (Iaas) Platform as a Service (PaaS) Software as a Service(SaaS) Mostly service provider expect that the customer is amenable for implementing security on the services they are providing, Meanwhile customers may believe that security is an included or integral part of the cloud solutions they are purchasing, however this is a completely myth. Since data and services are managed by a third party, Security must be implemented. What security is required for different data, how much security do you need to secure your information, how much security is too much? Cloud Security and Penetration Testing Services Secure against virus, ...

User Enumeration

User Enumeration User Enumeration in the enumeration phase attacker creates and performs activities connections to system and perms directed queries to gain more information about the taget attackers use extracted information to identify system attack point and perform password attacks to gain unauthorized access to information system resources. Enumeration pen testing Enumeration Pen Testing in order to enumerate important servers find the network range using tools such as “whoise lookup” calculate the subnet mask required for the ip range using subnet mask calculators that can be given as an input to many of the ping sweep and port scanning tools perform port scanning to check for the open ports on the nodes using such as nmap

Cyber Attack

Cyber Attack computer to computer attacks is called cyber attack Cyber attack is the type of attack which is targeted by the hacker for stealing sensitive information or data now days we can see that the cyber attack is the common thinks when you are on the internet the cyber attacker may be a professional or unprofessional so they may be work for the money or personal benefits the cyber attacker is attacks you when you are on the internet or transferring data on the internet like online banking ,online shopping the cyber attacker my stealing your password card number, account number information for personal benefit the cyber attack is the type of crime which is done by the human for personal benefit as well as for earning purpose so the cyber attacker my damage your hardware or system infrastructure or remote access or monitoring on the system the cyber attacker have some extra skills to find out the vulnerabilities on the system Who launches cyber attacks?  Class...

Footprinting Scanning

Footprinting Scanning Sam Spade Download Sam Spade from this web site and install it. Sam Spade is a graphical tool which allows you to do DNS interrogation and many other things. See a tutorial here. The features which make Sam Spade a key security tool are: Advanced DNS – DIG tool requests all the DNS records for a host or domain Zone Transfer – ask a DNS server for all it knows about a domain SMTP Relay Check – check whether a mail server allows third party relaying Scan Addresses – scan a range of IP addresses looking for open ports Crawl Web site – search a Web site, looking for email addresses, offsite links, download a Web site Search IP block – finds the IP block for an organization Sam Spade also does whois, traceroute, finger and dns lookup. SuperScan Download SuperScan from its new location and install it. SuperScan allows you to scan a range of IP addresses and do TCP port scanning. It can check all ports, or the ones you select. It is a very fast and p...

Computer Hacking Forensic Investigator

                Computer Hacking Forensic Investigator what is CHFI(computer hacking forensic investigator) ? the CHFI is the crime branch department for detecting the cyber attacks and investigation of cyber attack or protecting the feature attack's so we can say that this is the special team for cyber crime  today cyber crime is the big problem to the people because the number of people use computer or internet so the block hate hacker are try to find out the vulnerabilities or weakness of your system  Certification Target Audience? Police and other law enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies IT managers Electronic evidence is critical in the following situations: Disloyal employees Computer break-ins Possession of pornography Bre...