What is Sniffing

What is Sniffing
§  Sniffing is a data interception technology.
§  Sniffing is generally referred to as a passive type of attack and difficult to detect.
§  Sniffing involves capturing, decoding, inspecting and interpreting the information.
§  The purpose is to steal information usually User ID, Passwords, Network Details, Credit Card Number etc.

What is CRYPTOGRAPHY

What is CRYPTOGRAPHY
Cryptography is the method of storing and transmitting data in a particular form.
Crypto - Hidden
Graphy – writing
What is CRYPTOGRAPHY

What is STEGANO GRAPHY

What is STEGANO GRAPHY
Setganography is the art and science of hiding messages and data files. The word Steganography is of Greek origin and means "covered writing". Setganography in this process we can attach the virus file or data file to the Text, Image, Audio, Video files. These files known as cover file.
What is STEGANO GRAPHY

What is KeyLogger

What is KeyLogger
A Keylogger is a type of spyware software that capability to record every keystroke you make to a log file, take a screen snapshot, record instant message, email etc.
What is KeyLogger

What is Password Hacking

What is Password Hacking
A password is a unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.
What is Password Hacking

What is Windows Hacking

What is Windows Hacking
Registry - The registry is a repository of data about data.
GPEdit – The local group policy editor is a Microsoft management console that provides a single user interface through which all the settings of local group policy objects can be managed.
What is Windows Hacking

What is Enumeration

What is Enumeration
Enumeration is process to find out User Name, Group, Using OS in network, open ports, network resources etc. But we start Enumeration in target system here Hacker can make a fixed active connection to the target system. So Hacker can hack the target then start Enumeration process.
What is Enumeration

What is Scanning

What is Scanning
What is running on the target system called Scanning. For Example Running OS Operating System, IP Address, Which Services are Run on Target System and Open Ports in Network etc.
What is Scanning

What is Proxy Server

What is Proxy Server
A Proxy Server is acts as a mediator for request from clients to Server. A client connects to the Proxy Server, requesting some services such as a file, connection, web page or other resource available from a Server.
What is Proxy Server

It can help keep the Server anonymous from client and the client anonymous from Server. The Server not know whose request it is serving and the client not know who has responded to its request.

What is Footprinting

What is Footprinting
Footprinting is a process to find out and gathering target all valuable information. Footprinting is the first step taken by hackers to hack a computer system or network. We Gathering information using Footprinting.

Example:
Finding a Company's Details, Domain Name, Internal URLs, Server Details, Domain Registration, Finding the range of IP Address, Security Types Firewall etc.

What is Ethical Hacking

What is Hacking : Hacking is a process to find out or identifying weakness in our Computer and Networks System.

Who is Hacker : A person who enjoy modifying system function. Hacker have excellent knowledge about Computer and Network whole system Architecture. Hacker better know that how to computer system and computer network work.

What is Network Devices

Network Devices :- Computer Networking devices can communicate two or more different network without these Devices network communication can’t be possible.

Type of Network Devices :-
# Repeater
# Hub
# Bridge
# Switch
# Router
# Proxy
# Firewall

Linux Basic Commands

Linux Basic Commands
Rules For Commands In LINUX
  • Case Sensitive (Lower Case by default).
  • Always use single space between objects (Commands, Options, Arguments).
  • Always use – or - - before any option.

What is Transmission Media

Transmission Media :- When we create a computer network then we need to communication medium this medium can be wired or wireless.

There are two type of transmission media:-
Wired medium or Guided medium.
# Wireless medium or unguided medium.