Ethical hacking and pentesting from beginners to advance are given below:
- Introduction
- Hackers Hierarchy
- Hackers Keyword
- Virus
- Types of Virus
- Protect from virus
- IP and MAC
- Concept of IP
- Types of IP
- MAC Spoofing
- Anonymous Surfing
- Steganography
- Tools of Steganography
- Detecting Steganography
- Cryptography
- Types of Cryptography
- Email Hacking
- Password Cracking
- Rar Password Cracking
- PDF Password Cracking
- Windows Password Cracking
- Information Gathering
- Android
- Rooting Andoid Device
- Lock Screen Bypass of Android Device
- Pentesting Android Device
- Some Useful Android Stuff
- iOS
- Jailbreak iOS Device
- Jailbreak tools for iOS Device
- SSH For iOS
- Keylogger
- Virtualization
- Benefits of Virtualization
- Setup Virtual Machine
- Install ubuntu via virtual machine
- Backtrack
- Command For Backtrack
- Information Gathering Via NMAP
- Backtrack Payload
- Kali
- Wifi Hacking
- Crack WEP Encryption
- Crack WPA/WPA2 Encryption
- How to speed up the hacking process
- Desktop Phishing
- Cross site scripting
- Remote attack
- SQL Injection
- Click Jacking Attack
- How to hack facebook account
- Spoof Call
- Spoof SMS
- Fake/Spoof mail
- Kill Wifi Of Entire Network
- Bypass Applocker In Android
- Dual WhatsApp Without Root
- Use WhatsApp on PC and Android Simultaneously
- Multi User in Android
- Create an Undeletable Folder using CMD
- Run Multiple Window On Any Android Device
- Share Internet without Wifi Router
- Increase Swap Space In Android
- Increase Internal Storage in Android
- Cydia Tweaks For iOS
- Optimize Download Speed of IDM
- Download Torrent File Using IDM
- Bypass Phone and Sms Verfication of Any Website
- Windows Tricks
- Trace IP Address of Victim
- Kali Linux Nethunter for Android Device
- Install Android Lollipop
- Install Kali Linux on Android Device
- Install Windows in Android Device
- Download Youtube Playlist Via IDM
- Use Android Device As WebCam
- Firefox Addons For Pentest
- Windows Shortcut
- Notepad Tricks
- Lock & Unlock Windows PC with USB
- Restore Usb Drive Back to Full Capacity
- Send Messages on Facebook When Blocked
- Download Apk Files Via Browser
- Share PC Internet with Android Device via USB
- Delete Files Permanently Using CMD
- How to run linux in windows.
Ethical hacking : which encompasses formal and methodical penetration testing, white hat hacking, and vulnerability testing — involves the same tools, tricks, and techniques that criminal hackers use, but with one major difference: Ethical hacking is performed with the target’s permission in a professional setting.
The intent of ethical hacking is to discover vulnerabilities from a malicious attacker’s viewpoint to better secure systems. Ethical hacking is part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
Hackers: A type of person interested in exploration,usually of a computer.
Hack (v): Cut with rough or heavy and blows. Eg:Hack of the dead branches
In other words,manage or cope .Lots of people leave because they can't hack it.
List Of Some Notable Hackers:
Kevin Mitnick: Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”
Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science – into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.
Vladimir Levin: This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.
Kevin Poulsen: Today he may be a journalist and collaborates with authorities to track paedophiles on the Internet, but Poulsen has a dark past as a cracker and phreaker. The event that brought him the most notoriety was taking over Los Angeles phone lines in 1990. A radio station was offering a Porsche as a prize for whoever managed to be caller number 102. It goes without saying that Poulsen was the winner of the contest.
Timothy Lloyd:In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year.
Robert Morris: Son of one of the forerunners in the creation of the virus, in 1988 Morris managed to infect no fewer than 6,000 computers connected to the ArpaNet network (one of the precursors to the internet) He did it from the prestigious Massachusetts Institute of Technology (MIT) and for his criminal activities he earned a four year prison sentence, which was finally reduced to community service.
David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe – David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.
Kevin Poulsen: Today he may be a journalist and collaborates with authorities to track paedophiles on the Internet, but Poulsen has a dark past as a cracker and phreaker. The event that brought him the most notoriety was taking over Los Angeles phone lines in 1990. A radio station was offering a Porsche as a prize for whoever managed to be caller number 102. It goes without saying that Poulsen was the winner of the contest.
Timothy Lloyd:In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year.
Robert Morris: Son of one of the forerunners in the creation of the virus, in 1988 Morris managed to infect no fewer than 6,000 computers connected to the ArpaNet network (one of the precursors to the internet) He did it from the prestigious Massachusetts Institute of Technology (MIT) and for his criminal activities he earned a four year prison sentence, which was finally reduced to community service.
David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe – David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.
MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad deed to his classmates at school.
Masters of Deception (MoD): MoD was a New York cyber-gang that reached its apogee in the early 90s. Under the cover of different aliases, its biggest attacks involved taking over telephone lines and centres of the Internet, then still in its infancy. During this time McD starred in the historic “battles of the hackers,” along with other groups like the Legion of Doom (LoD), as they sought to destroy each other until the computers couldn’t take it anymore.
Richard Stallman: Since the early 80s when he was a hacker specializing in artificial intelligence, this hippie-looking New Yorker has been one of the most active militants in favor of free software. At MIT he firmly opposed the privatization of the software used by the institute’s laboratory, so much so they he created what today is known as GNU and the concept of CopyLeft. Popular systems like Linux utilize the GNU mode and Stallman is currently one of the gurus of software democratization.
List of some Hacker Groups:
1984 network liberty alliance:is a loose group of software programmers, artists, social activists and militants, interested in computers and networks and considering them tools to empower and link the various actors of the social movement around the world.
List of some Hacker Groups:
1984 network liberty alliance:is a loose group of software programmers, artists, social activists and militants, interested in computers and networks and considering them tools to empower and link the various actors of the social movement around the world.
Anonymous: originated in 2003 ,is a loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives".[2] The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites.
Chaos Computer Club: is based in Germany and other German-speaking countries. Famous among older hackers.
Cult of the Dead Cow: also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 inLubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members.
Cult of the Dead Cow: also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 inLubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members.
Decocidio: is an anonymous, autonomous collective of hacktivists which is part of Earth First!,a radical environmental protest organisation, and adheres to Climate Justice Action. In their hacks the group shows affiliation with the autonomous Hackbloc collective.
Jester: is a computer vigilante who describes himself as grey hat hacktivist. He claims to be responsible for attacks on WikiLeaks, 4chan, Iranian President Mahmoud Ahmadinejad, and Islamist websites. He claims to be acting out of American patriotism. The Jester uses a denial-of-service (DoS) tool known as "XerXeS", that he claims to have developed.One of The Jester's habits is to tweet "TANGO DOWN" on Twitter whenever he successfully takes down a website.
LulzSec: a black hat computer hacker group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was a computer security specialist who used the online moniker Sabu. The man accused of being Sabu has helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. British authorities had previously announced the arrests of two teenagers they allege are LulzSec members T-flow and Topiary.
milw0rm: is a group of "hacktivists best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998.The group conducted hacks for political reasons, including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites. The group's logo featured the slogan "Putting the power back in the hands of the people.
Telecomix: is a decentralized cluster of net activists, committed to the freedom of expression. Telecomix is a name used by both WeRebuild and Telecomix. WeRebuild is a collaborative project used to propose and discuss laws as well as to collect information about politics and politicians. The Telecomix is the operative body that executes schemes and proposals presented by the WeRebuild. On September 15, 2011, Telecomix diverted all connections to the Syrian web, and redirected internauts to a page with instructions to bypass censorship.
If u have any queries...or want any other info , then join our facebook group Or inbox me your question.