Ethical Hacking tutorial for beginners

Ethical Hacking tutorial for beginners



Hackers feel smart on hearing this name and we think that I wish we were hackers too. If you all visit such websites which tell advanced things of hacking, then you do not understand.There are many such web sites in Google search which teach hacking but in advanced level. In this article, we are posting specially for Beginners so let's start.


What is ethical Hacking

1. Penetration testing & Cyber security

2. Legally breaking into systems & service

3. Securing the organization

4. Defeating bad hackers


Types Of Attack On a System

1. Operating System Attack

Operating system attacks very harm full attacks for Linux,Mac, windows,os to settings issues than attack system.


2. Misconfiguration Attack

Misconfiguration attack this attack software and application settings isused or feature isused than attack hacker.


3. Application Level Attack 

This attack only for web application and website. Devloper create a webpage than some isused and attacks hacker.


4. Shrink Wrap Code Attack

A device that has already been hacked and restores its data after being hacked but does not fix its deficiency

 

Types ( Kinds ) of Hacker

1. White hat

This hacker work to all testing legally on Cyber work. Give permission for owner and start work and testing.

2. Gray hat

This hacker work to legal and elegal work in your Cyber testing for a reason to big money amount or crace data.

3. Black hat 

This hacker work to only elegal testing and frowd task for uses  owner data lick and crace.


Cyber Lows ( Low of technology )

India :- The patent ( Amendment ) act ,1999

Trade marks act ,1999

The copyright act ,1957

Information technology act

information :- http://www.ipindia.nic.in

                         http://www.meity.gov.in

Networking Concept

1. Communication 

sharing of information and connect device one and connect device two than communicate device.

2. sharing software

3. sharing file

4. sharing information

5. information poesertation 

6. security sharing hardware

7. sharing hardware

8. sharing data


Kinds of network in networking

1. LAN ( local area network )

Local area network sharing simple home PC 

mobile and any gadgets.


2. MAN ( metropolitan area network )

MAN area network sharing a network to office, company, society than call MAN area network.


3. WAN ( wide area network )

This internet is a wide area network  We can only call ISP as Wide Area Network.


IP ADDRESS ( internet provider )

IP = Internet protocol address

IP address 4 ( four ) page digit

example :-  17.172.224.47

17           172           224                  47

8 Bit      8 Bit           8 Bit                8 Bit

Totally 32 bits = 4 bytes


IP ADDRESS INFORMATION

17.           172.         224.       47 

contory     state     ISP       Device


Different IPV4 and IPV6
IPV4

1. Address size : 32- bit number

2. Address format : Dotted Decimal Notation

    192.159.252.76

3. Prefix Notation : 192.149.00.124

4. Number Of Address : ( 2^32 ) 4.37 billion address


IPV6

1. Address size : 128-bit number

2. Hexadecimal Natation : 3ffe:f200:0234:ab 00:0123:4567:8901:abcd

3. Prefix Notation : 3ffe:200:0234:148

Number Of Address

( 2^128 ) 34° trillion address


Kinds of IP ADDRESS

1. Public

2. Private

3. Static

4. Dynamic


what is OSI Model

1. Open system interconnection model

2. Defines function

3. 7 layer

4. Standardized communication

5. Bottom to up


Working 7 Layer

Application

Presentation

Session

Transport

Network

Data Layer

Physical

( CLIENT ) - ( SERVER )


1. Physical :-  Transfer data bestreming 

2. Data Layer :-  Error ganreted worked

3. Networking :- Define a address for data transfer.

4. Transport :- Worked check for data transfer and reply.

5. Session :- Check a to system connection and worked.

6. Presentation :- Manipulate the data and covert to ZIP file incode the date compress the data.

7. Application :- This high level layer sharing to data resource.


TCP/IP  MODEL

1. Transmission control protocol internet protocol

2. OSI Model version

3. 4/5 layers

4. Practical model

5. Over wan

This is a practical version of OSI model.


Working TCP/IP 

TCP/IP-4                               TCP/IP-5

Application                         Application

Transport                             Transport

Internet                                   Internet

Network                                  Data link

                                                   physical

Combined to physical layer and data layer


How TCP works?

1. URG ( urgent ) 

Data contained in the packet should be processed immediately.

2. FIN ( Finish ) 

There will be no farther transmission

3. REST ( Rest ) 

Rest a connection

4. PSH ( push )

Sends all buffered data immediately

5. ACK ( acknowledgement ) 

Acknowledge the receipt of a pocket

6.  Syn ( synchronize ) 

Initiates a connection between hosts


TCP   vs UDP

Syn              Request

Syn Ack       Response

ACK               Response          


Domain name DNS and Zone files

Domain name

1. Name of IP :- Easy to remember

Example :- Google.com , facebook.com


What is DNS

1. Domain name system

a. Address book of Internet

b. Translate domain to IP

c. Store all data in form of records in zone file


Records in DNS & there use

A :- IP of domain name

CNAME :- Forward domain and subdomain

MX :-  Directs mail to email server

TXT :- Any text by admin

NS :- Name server of DNS entry

SOA :- Admin info about a domain

SRV :- Specify port for specific server

PTR :- Provides domain name in reverse lookup


What is zone file

1.  A text file of DNS

2. Records of domain

3. IP mapping

4. Name server zone


Request & Response

Request

A packet asking to load a website includes GET/POST header and body


Response

Packet providing permission to access website and content.

Includes GET/POST header and body. Complete program of that page.


If you found this post helpful in learning and you liked it, then do share it and give your feedback in the comments.








                                      



















Post a Comment

0 Comments