1/24/2024

DEFINATION OF HACKING

DEFINATION OF HACKING

Hacking is an attempt to exploit a  computer system vulnerabilities or a private network inside a computer to gain unauthorized acess.
Hacking is identifying and exploiting weakness in computer system and/ or computer networks for finding the vulnerability and loopholes.

Continue reading


How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related posts


  1. Pentest Tools Android
  2. Hacking Tools Windows
  3. Hack Tools For Pc
  4. Hacker Tools 2020
  5. Hacker Tools 2019
  6. Hacking Tools Mac
  7. Free Pentest Tools For Windows
  8. Pentest Tools Android
  9. Hacker Tools Windows
  10. Termux Hacking Tools 2019
  11. Hacking Tools Github
  12. Ethical Hacker Tools
  13. Hacker Tools Github
  14. How To Make Hacking Tools
  15. Pentest Tools Tcp Port Scanner
  16. Hacks And Tools
  17. Hack Tools For Pc
  18. Termux Hacking Tools 2019
  19. Pentest Tools Free
  20. Hack Tools Online
  21. Hacker Tools
  22. Hack Tools For Windows
  23. Pentest Tools For Windows
  24. Hacker Tools Github
  25. Hack App
  26. Hack Apps
  27. Hacking Tools For Beginners
  28. Hacking Tools For Windows 7
  29. Pentest Tools Kali Linux
  30. Best Pentesting Tools 2018
  31. Wifi Hacker Tools For Windows
  32. Pentest Tools Windows
  33. Pentest Tools Port Scanner
  34. Hacking Tools Free Download
  35. Pentest Tools Android
  36. Best Pentesting Tools 2018
  37. Hack Tools For Mac
  38. Termux Hacking Tools 2019
  39. Best Hacking Tools 2019
  40. Pentest Tools Subdomain
  41. Hacker Security Tools
  42. Hack Tool Apk
  43. Hack Tools For Windows
  44. Tools Used For Hacking
  45. Hacking Tools Name
  46. Physical Pentest Tools
  47. Hack Tool Apk No Root
  48. Best Hacking Tools 2020
  49. Hacking Tools Free Download
  50. Physical Pentest Tools
  51. Hack And Tools
  52. How To Make Hacking Tools
  53. Wifi Hacker Tools For Windows
  54. Pentest Tools Alternative
  55. Pentest Automation Tools
  56. Hacking Tools Software
  57. Pentest Tools Tcp Port Scanner
  58. Easy Hack Tools
  59. Beginner Hacker Tools
  60. Pentest Box Tools Download
  61. Hack Tool Apk
  62. Hack Tools For Mac
  63. Hacking Tools
  64. Pentest Tools
  65. Hacker Tools 2020
  66. Nsa Hack Tools Download
  67. Hacking Tools Hardware
  68. Hack Tool Apk
  69. Kik Hack Tools
  70. Hack Tools Mac
  71. Hack And Tools
  72. Tools 4 Hack
  73. Hacking Tools For Windows
  74. Kik Hack Tools
  75. Wifi Hacker Tools For Windows
  76. New Hack Tools
  77. How To Hack
  78. Pentest Tools List
  79. Hacking Tools For Games
  80. Hacking Tools 2019
  81. Hacker Tools List
  82. Pentest Tools Windows
  83. Hack Tools For Pc
  84. Hacker Tools Hardware
  85. Pentest Tools Free
  86. Pentest Tools Website
  87. Pentest Tools Review
  88. Hacker Tools For Windows
  89. Hacking App
  90. Hack And Tools
  91. Android Hack Tools Github
  92. Hack Tool Apk
  93. Pentest Reporting Tools
  94. Hack Tools
  95. Hacker Tools Github
  96. Pentest Tools Open Source
  97. Best Pentesting Tools 2018
  98. Bluetooth Hacking Tools Kali
  99. Hacker Tool Kit
  100. Bluetooth Hacking Tools Kali
  101. Game Hacking
  102. Hacking Tools For Windows Free Download
  103. Hacking Tools For Beginners
  104. Pentest Tools Nmap
  105. Tools For Hacker
  106. Hacking Tools Name
  107. Nsa Hack Tools
  108. Hacking Tools Online
  109. Hacking Tools For Pc
  110. Android Hack Tools Github
  111. Pentest Tools Review
  112. Hackers Toolbox
  113. Hacking Apps
  114. Best Pentesting Tools 2018
  115. Pentest Reporting Tools
  116. Hacking Tools 2020
  117. Black Hat Hacker Tools
  118. Hack Tools
  119. Pentest Tools Url Fuzzer
  120. Ethical Hacker Tools
  121. Underground Hacker Sites
  122. Termux Hacking Tools 2019
  123. Wifi Hacker Tools For Windows
  124. Hacking Tools Kit
  125. Hack Tools For Windows
  126. Beginner Hacker Tools
  127. Hacker Tools
  128. Hacking Tools Free Download
  129. Hacker Tools Software
  130. Pentest Tools Url Fuzzer
  131. Hacking Tools Pc
  132. Hack Apps
  133. Hacker Search Tools
  134. Hacking Tools Kit
  135. Hack Tools Pc
  136. Hacker Hardware Tools
  137. Usb Pentest Tools
  138. Hack Rom Tools

Linux Command Line Hackery Series - Part 5



Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control processes on our Linux box, so wrap your sleeves up and let's get started.

Command:    ps
Syntax:           ps [options]
Description:  ps displays information about the currently running processes. Some of the common flags of ps are described briefly below
Flags: 
  -A or -e -> select all processes
  -a -> select all processes except both session leaders and processes not associated with a terminal.
  T -> select all processes associated with current terminal
  -u <username or id> -> select all processes of a given user or userlist

Open up a terminal and type ps:

ps

what you'll see is a list of processes currently running in your terminal. One important thing to notice in the output is what's called as PID which stands for process ID. It is the number that uniquely identifies a process. Just keep that PID concept in mind we'll use it soon.

OK I know that's not really what you want to see rather you want to see all the processes that are currently running on your box. Don't worry we have flags to rescue, in order to see all the processes you can use the -e flag like this:

ps -e

Boom! you get a long list of processes currently running on your machine (don't stare at me like that, you asked and I gave you that). If you want to see processes of a particular user you can type the following command in your terminal:

ps -u bob

here "bob" is a username. This command will list all processes of the user with effective user name of bob.

You can do a full-format listing of the processes using the -f flag like this:

ps -fu bob

But the output of the ps command is a snapshot not really a live preview of what is going on in your box. I know your next question is going to be something like this, Isn't there a command in Linux that gives me a live updating information of the processes? Yes, there is a command called top that we'll learn about next.

Command:    top
Syntax:           top [options]
Description:  top gives a dynamic real-time view of a running system. That is, it gives the up-to-date information about all the processes running on your Linux box (sounds fun!). Besides giving information about current processes and threads top also provides a brief system summary.

To start top just type this command:

top

and you'll get a nice and cute looking ugly display :). Well what the heck is going on here you might ask, right? What you get is information about what is going on with your computer. To see what more can you do with top just type <h> within the program window and you'll be given list of options that you can play with.

OK looking at what processes are going on in your box is cool but what if you want to terminate (or close) a process, is there a command line utility for that? Yes, there is and that's what we are going to look at next.

Command:   kill
Syntax:          kill [options] <pid> [...]
Description:  kill is used to send a signal to process which by default is a TERM signal meaning kill by default sends a signal of termination to process (Cruel guy). To list the available signals we can use the -l or -L flag of the kill command.


To simply terminate a process we provide kill command a PID (process ID) and it will send the TERM signal to the process. So to kill a process first we'll list the running processes and then we'll keep the PID of the process in mind that we want to terminate. After that we'll issue the kill command with the PID that we just found.

ps -ax
kill 1153

the above command will send a TERM signal to the process whose PID is 1153, as simple as that.

We can also use our already learned skills to refine the output of ps command. Say we have a xterm terminal running on our box and we want to terminate it. By using ps command all alone we'll get a long listing of all processes running on our box. But we can limit the output of ps command to just those processes that we're interested in by piping ps command with the grep command like this:

ps -ax | grep xterm

wow! that's amazing, we're able to pull out only those results from the ps command that contained xterm in them. Isn't that a cool trick? But what is that vertical bar ( ) doing in the middle, you may be thinking, right? Remember we learned about the input and output re-directors previously, the vertical bar (pipe in geeky terms) is another re-director whose task is to redirect the output of one command as input to another command. Here the pipe redirects the output of ps -ax command as input to grep command and of-course from the previous article you know that grep is used to search for a PATTERN in the given input. That means the above command searches for the xterm word in the output of ps -ax command and then displays just those lines of ps -ax command which contain xterm. Now get that PID and kill that process.

That's it for today, try these commands up on your own box and remember practice is gonna make you master the Linux command line. :)

Related news