Ethical Hacking Institute™

You are all welcome to the latest blog that is dedicating it's life time in making sure your online accounts are save and secured from the hands of these wicked crackers of our time.You are always welcome to Ethical Hacking Institute Please note that we are not responsible for any form of misuse of information gotten in here.All you will acquire is for educational purpose only

Saturday 10 September 2011

The Future Of Mobile Software Development

A process in which apps are developed for portable devices is mobile software development. During manufacture the applications may be pre-installed on devices, or may be downloaded from App Stores, Android Market or other mobile software platforms by users. Today mobile software outsourcing is becoming very popular.
There is great number of platforms that support devices through single as well as numerous manufacturers. Android, iOS (Apple), Java ME, Flash Lite, BlackBerry and Qt are platforms which support devices by single manufacturer. Each of these platforms has a development environment tools that allow a developer to build, test and spread out applications into the target platform environment.
There are many software outsourcing companies that deliver professional android application development as well as app development for other mobile platforms.
The idea of mobile technology in every offshore software development company has been modernized by the mobile application development features. Mobile applications involve a collection of powerful mobile apps that assist video and audio application, Internet browsing, gaming, video players, utilities etc. To put it differently, it is essential to claim data which many people have access to the world through mobile.
iPhone app development company delivers sophisticated apps on iOS platform. There are plenty of benefits of mobile applications, there are some of them:
  • Interactive intermediate. Programmers of mobile application may develop, imagine and customize the application according to the customer's requirements.

  • A customer fully receives the mobile application which is brought out through the mobile program and that is essentially to involve any way a third party for marketing its products.

  • Owing to the presence of manifold mobile platform development options for example Java, Android, Brew and others mobile application development is becoming very popular today.

  • Thanks to compact size, mobile devices are very user-friendly and handy. Up-to-date's mobile application development offer great number of features which allow not just communication but also offer improved features as for example Internet support by GPRS technology, music facilities, advanced satellite navigation and live video conferencing. Moreover mobile devices let you play games, watch TV and listen to the music anytime and anywhere.
In order to improve your business and receive cost-effective solution all you need is just choose software outsourcing company. It has a lot of benefits if to compare with in-house one. Additionally to cost savings offshore software development improves the productivity of the company. The company may deploy the saved costs in reaching core business expansion of a company. Due to the profit evolved and the savings gathered company may furrow all these back and develop higher quality products, create company brand and service more clients.

Sunday 21 August 2011

How to know if the web server is Windows or Linux based

Just follow the given steps:-
1) Goto the link below and find the IP Address of the website you want to gather information about. You may do this by writing its name in the Get IP box
http://www.selfseo.com/find_ip_address_of_a_website.php
(This step was optional just to tell you that it can be done this way also):-P
2)Goto run->type CMD
IN CMD type
ping Target _Website_Name . For Eg- ping google.com
or
ping target_website/computer_ip_address . For Eg:- 59.172.45.1
Now you will see several ping requests coming
Ping Google Server
We Are interested in seeing the TTL time which you can see at the end of each request in ping.
NOTE:-
1) If TTL
2) If TTL>64 but
3) TTL>128 Mac and others.
From the above screenshot, it is clear that the servers of google are linux based.
Note:- In some Cases you may not get ping replies ( Eg. you try it on your friend’s PC ). Now This can have two reasons, The server is down ie.. The machine is not connected to internet. Else the most common reason, The Firewall is protecting that PC and is not allowing your request to access that system.
Same thing may happen in case of some websites as well, Reason is same.
Caution:- If you are trying this on your friends machine then do not enter the local IP address like 192.168.1.1
Ask him to goto: http://whatismyip.com and check the IP address from there

Tuesday 16 August 2011

Becoming A Certified Hacker

1: Introduction to Ethical Hacking
    Why Security?
    The Security, functionality and ease of use Triangle
    Can Hacking be Ethical?
Module 2: Footprinting
    Defining Footprinting
Module 3: Scanning
    Definition of Scanning.
    Types of scanning
Module 4: Enumeration
    What is Enumeration?
    NetBios Null Sessions
Module 5: System Hacking
    Administrator Password Guessing
    Manual Password Cracking Algorithm
    Automated Password Cracking
Module 6: Trojans and Backdoors
    Effect on Business
    What is a Trojan?
Module 7: Sniffers
    Definition of sniffing
    How a Sniffer works?
Module 8: Denial of Service
    What is Denial of Service?
    Goal of DoS(Denial of Service)
Module 9: Social Engineering
    What is Social Engineering?
    Art of Manipulation

Module 10: Session Hijacking

    Understanding Session Hijacking
    Spoofing vs Hijacking
    How Web Servers Work?
Module 11: Hacking Web Servers
    How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
    Web Application Set-up
    Web Application Hacking
Module 13: Web Based Password Cracking Techniques
    Authentication- Definition
    Authentication Mechanisms
    HTTP Authentication
Module 14: SQL Injection
    Attacking SQL Servers
    SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
    Introduction to Wireless Networking
    Business and Wireless Attacks
Module 16: Virus
    Virus Characteristics
    Symptoms of 'virus-like' attack
Module 17: Physical Security
    Security statistics
    Physical Security breach incidents
Module 18: Linux Hacking
    Why Linux?
    Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
    Intrusion Detection Systems
    Ways to Detect Intrusion
Module 20: Buffer Overflows
    Significance of Buffer Overflow Vulnerability
    Why are Programs/Applications Vulnerable?
Module 21: Cryptography
    Public-key Cryptography
    Working of Encryption
Module 22: Penetration Testing Course
    Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques

Search for Hacking security

Custom Search