Category: ABC of Ethical Hacking

Scanning

Scanning is one of the three components of intelligence gathering of an attacker.Scanning is the second phase in steps of hacker. Through scanning , hacker find the info. regarding victim sytems , like OS , System Architecture , IP adresses , service running on computer to discover which ports are active , etc.     Basically …

Patches and Hotfixes

Hotfixes and Patches – These both words are very important in every aspect for us. Through both of them we can find lot of way to hack a victim. Actually these are use for security or vanishing loop hole purpose. but we can create fake Hotfixes and patches , before that we have to understand what …

Hacking WebServers

Welcome back to the session of learning ABC of Ethical Hacking. Objective of this post is to describe Web applications, Explain Web application vulnerabilities, Describe the tools used to attack Web servers , Countermeasures and Increasing Web Server Security. Mainly there are two main Web servers are Apache (Open source) and IIS (Microsoft). First of all …

List of Footprinting tools

hey , welcome back friends Hope you enjoying the session of Footprinting and in this post i share about a List of Footprinting tools There are various tools which is used for Footprinting like Whois , Nslookup , ARIN , Neo Trace , Visual Route Trace , eMail Tracker Pro , Website watcher , Google Earth …