Ethical Hacking tutorial for beginners
Hackers feel smart on hearing this name and we think that I wish we were hackers too. If you all visit such websites which tell advanced things of hacking, then you do not understand.There are many such web sites in Google search which teach hacking but in advanced level. In this article, we are posting specially for Beginners so let's start.
What is ethical Hacking
1. Penetration testing & Cyber security
2. Legally breaking into systems & service
3. Securing the organization
4. Defeating bad hackers
Types Of Attack On a System
1. Operating System Attack
Operating system attacks very harm full attacks for Linux,Mac, windows,os to settings issues than attack system.
2. Misconfiguration Attack
Misconfiguration attack this attack software and application settings isused or feature isused than attack hacker.
3. Application Level Attack
This attack only for web application and website. Devloper create a webpage than some isused and attacks hacker.
4. Shrink Wrap Code Attack
A device that has already been hacked and restores its data after being hacked but does not fix its deficiency
Types ( Kinds ) of Hacker
1. White hat
This hacker work to all testing legally on Cyber work. Give permission for owner and start work and testing.
2. Gray hat
This hacker work to legal and elegal work in your Cyber testing for a reason to big money amount or crace data.
3. Black hat
This hacker work to only elegal testing and frowd task for uses owner data lick and crace.
Cyber Lows ( Low of technology )
India :- The patent ( Amendment ) act ,1999
Trade marks act ,1999
The copyright act ,1957
Information technology act
information :- http://www.ipindia.nic.in
Networking Concept
1. Communication
sharing of information and connect device one and connect device two than communicate device.
2. sharing software
3. sharing file
4. sharing information
5. information poesertation
6. security sharing hardware
7. sharing hardware
8. sharing data
Kinds of network in networking
1. LAN ( local area network )
Local area network sharing simple home PC
mobile and any gadgets.
2. MAN ( metropolitan area network )
MAN area network sharing a network to office, company, society than call MAN area network.
3. WAN ( wide area network )
This internet is a wide area network We can only call ISP as Wide Area Network.
IP ADDRESS ( internet provider )
IP = Internet protocol address
IP address 4 ( four ) page digit
example :- 17.172.224.47
17 172 224 47
8 Bit 8 Bit 8 Bit 8 Bit
Totally 32 bits = 4 bytes
IP ADDRESS INFORMATION
17. 172. 224. 47
contory state ISP Device
Different IPV4 and IPV6
IPV4
1. Address size : 32- bit number
2. Address format : Dotted Decimal Notation
192.159.252.76
3. Prefix Notation : 192.149.00.124
4. Number Of Address : ( 2^32 ) 4.37 billion address
IPV6
1. Address size : 128-bit number
2. Hexadecimal Natation : 3ffe:f200:0234:ab 00:0123:4567:8901:abcd
3. Prefix Notation : 3ffe:200:0234:148
Number Of Address
( 2^128 ) 34° trillion address
Kinds of IP ADDRESS
1. Public
2. Private
3. Static
4. Dynamic
what is OSI Model
1. Open system interconnection model
2. Defines function
3. 7 layer
4. Standardized communication
5. Bottom to up
Working 7 Layer
Application
Presentation
Session
Transport
Network
Data Layer
Physical
( CLIENT ) - ( SERVER )
1. Physical :- Transfer data bestreming
2. Data Layer :- Error ganreted worked
3. Networking :- Define a address for data transfer.
4. Transport :- Worked check for data transfer and reply.
5. Session :- Check a to system connection and worked.
6. Presentation :- Manipulate the data and covert to ZIP file incode the date compress the data.
7. Application :- This high level layer sharing to data resource.
TCP/IP MODEL
1. Transmission control protocol internet protocol
2. OSI Model version
3. 4/5 layers
4. Practical model
5. Over wan
This is a practical version of OSI model.
Working TCP/IP
TCP/IP-4 TCP/IP-5
Application Application
Transport Transport
Internet Internet
Network Data link
physical
Combined to physical layer and data layer
How TCP works?
1. URG ( urgent )
Data contained in the packet should be processed immediately.
2. FIN ( Finish )
There will be no farther transmission
3. REST ( Rest )
Rest a connection
4. PSH ( push )
Sends all buffered data immediately
5. ACK ( acknowledgement )
Acknowledge the receipt of a pocket
6. Syn ( synchronize )
Initiates a connection between hosts
TCP vs UDP
Syn Request
Syn Ack Response
ACK Response
Domain name DNS and Zone files
Domain name
1. Name of IP :- Easy to remember
Example :- Google.com , facebook.com
What is DNS
1. Domain name system
a. Address book of Internet
b. Translate domain to IP
c. Store all data in form of records in zone file
Records in DNS & there use
A :- IP of domain name
CNAME :- Forward domain and subdomain
MX :- Directs mail to email server
TXT :- Any text by admin
NS :- Name server of DNS entry
SOA :- Admin info about a domain
SRV :- Specify port for specific server
PTR :- Provides domain name in reverse lookup
What is zone file
1. A text file of DNS
2. Records of domain
3. IP mapping
4. Name server zone
Request & Response
Request
A packet asking to load a website includes GET/POST header and body
Response
Packet providing permission to access website and content.
Includes GET/POST header and body. Complete program of that page.
If you found this post helpful in learning and you liked it, then do share it and give your feedback in the comments.
0 Comments