OS Fingerprinting

-: Network Hacking (OS Fingerprinting) :- OS Fingerprinting :- OS Fingerprinting refers to detection of target computer's operating system. Since, different operating system responds differently to the same kind of ICMP message, it is very important for an attacker to determine the exact operating system running on target system. Also attacker can carry out attacks by taking over the vulnerabilities/bugs found in that particular operating...

Port Scanning

-: Network Hacking (Port Scanning) :- Port Scanning :- Port scanning is carried out to determine a list of open ports on the remote host that have certain services or daemons running. In port scanning, the attacker connects to various TCP and UDP ports and tries to determine which ports are in listening mode. 1) TCP Ports Scanning :- Almost all port scans are based on the client sending a packet containing a particular flag to the target...

Address Resolution Protocol

-: Address Resolution Protocol (ARP) Attacks :- What Does ARP Mean? Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made. On a majority of operating systems, such...

Computer Viruses

-: Computer Viruses :- What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the...

BlueTooth Hacking

-: Blue Tooth Hacking :- Discovering Bluetooth Devices :- Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range. Recommended Tools BlueScanner It will try to extract as much information as possible for each newly discovered device Download BlueSniff It is a GUI-based utility for finding...

Denial Of Service (DoS) Attacks

-: Denial Of Service (DoS) Attacks :-A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The...

Intrusion Detection System

-: Intrusion Detection System (IDS) :- An intrusion detection system (IDS) is software and/or hardware based system that monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. Typical locations for an intrusion detection...

Input Validation Attacks

-: Input Validation Attacks :- Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application. The most common input validation attacks are as follows- 1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows...

Subscribe

Guyyyyz if u want serious and successful hacking tools please subscribe Untamed productions Email:If u subscribe. 8| ...

Cryptography

-: Cryptography :-  By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted...

Privacy Attacks

-: Privacy Attacks :- Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows: 1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system. Most trojans consist of two parts - a) The Server Part :- It has to be installed on the the victim's computer. b) The Client Part :- It is installed...

IP spoofing

-: IP Spoofing :- The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. Why it works ? IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult. The main reason is...

Password Hacking

    -: Password Hacking :- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed...

About ethical hacking

About Ethical Hacking Internet Security and Ethical Hacking       Welcome to the unique confluence of hackers , crackers and security professionals on the world wide web. This is your complete resource for internet security and ethical hacking.  -: The Ethical Hacker :- Most people thinks that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two...