Ethical Hacking Institute™

You are all welcome to the latest blog that is dedicating it's life time in making sure your online accounts are save and secured from the hands of these wicked crackers of our time.You are always welcome to Ethical Hacking Institute Please note that we are not responsible for any form of misuse of information gotten in here.All you will acquire is for educational purpose only

Sunday 21 August 2011

How to know if the web server is Windows or Linux based

Just follow the given steps:-
1) Goto the link below and find the IP Address of the website you want to gather information about. You may do this by writing its name in the Get IP box
http://www.selfseo.com/find_ip_address_of_a_website.php
(This step was optional just to tell you that it can be done this way also):-P
2)Goto run->type CMD
IN CMD type
ping Target _Website_Name . For Eg- ping google.com
or
ping target_website/computer_ip_address . For Eg:- 59.172.45.1
Now you will see several ping requests coming
Ping Google Server
We Are interested in seeing the TTL time which you can see at the end of each request in ping.
NOTE:-
1) If TTL
2) If TTL>64 but
3) TTL>128 Mac and others.
From the above screenshot, it is clear that the servers of google are linux based.
Note:- In some Cases you may not get ping replies ( Eg. you try it on your friend’s PC ). Now This can have two reasons, The server is down ie.. The machine is not connected to internet. Else the most common reason, The Firewall is protecting that PC and is not allowing your request to access that system.
Same thing may happen in case of some websites as well, Reason is same.
Caution:- If you are trying this on your friends machine then do not enter the local IP address like 192.168.1.1
Ask him to goto: http://whatismyip.com and check the IP address from there

Tuesday 16 August 2011

Becoming A Certified Hacker

1: Introduction to Ethical Hacking
    Why Security?
    The Security, functionality and ease of use Triangle
    Can Hacking be Ethical?
Module 2: Footprinting
    Defining Footprinting
Module 3: Scanning
    Definition of Scanning.
    Types of scanning
Module 4: Enumeration
    What is Enumeration?
    NetBios Null Sessions
Module 5: System Hacking
    Administrator Password Guessing
    Manual Password Cracking Algorithm
    Automated Password Cracking
Module 6: Trojans and Backdoors
    Effect on Business
    What is a Trojan?
Module 7: Sniffers
    Definition of sniffing
    How a Sniffer works?
Module 8: Denial of Service
    What is Denial of Service?
    Goal of DoS(Denial of Service)
Module 9: Social Engineering
    What is Social Engineering?
    Art of Manipulation

Module 10: Session Hijacking

    Understanding Session Hijacking
    Spoofing vs Hijacking
    How Web Servers Work?
Module 11: Hacking Web Servers
    How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
    Web Application Set-up
    Web Application Hacking
Module 13: Web Based Password Cracking Techniques
    Authentication- Definition
    Authentication Mechanisms
    HTTP Authentication
Module 14: SQL Injection
    Attacking SQL Servers
    SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
    Introduction to Wireless Networking
    Business and Wireless Attacks
Module 16: Virus
    Virus Characteristics
    Symptoms of 'virus-like' attack
Module 17: Physical Security
    Security statistics
    Physical Security breach incidents
Module 18: Linux Hacking
    Why Linux?
    Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
    Intrusion Detection Systems
    Ways to Detect Intrusion
Module 20: Buffer Overflows
    Significance of Buffer Overflow Vulnerability
    Why are Programs/Applications Vulnerable?
Module 21: Cryptography
    Public-key Cryptography
    Working of Encryption
Module 22: Penetration Testing Course
    Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques

Search for Hacking security

Custom Search