HACKERS ONLINE GROUP
What is the Hacking?
Hacking is processing to gain Authorized/Unauthorized access to data or full control in a system or
computer. Computer hacking is the practice of making malicious modifications to a program in order to achieve a goal outside the original purpose of the creator.
Who is called hacker?A person who engages in these system activities is called Hacker, who are hackers they keep the full knowledge of computer, network, the computer program languages & another system. Hackers regard hacking is art & as the way to apply their skills in real life situations.
What is the Ethical Hacking?Hackers hack the system or another thing after getting the permission from the system owner of the system this call Ethical Hacking.
What are essentials to become a Best Hacker?Essential for a Hacker:
1. Learn to program In Languages like-
C, C++, JAVA, .NET, Python, HTML, PHP, Perl, XML ......2. Learn UNIX
3. Learn more Operating System
4. Learn Networking
5. Read some Hacking related books
6. Learn Cryptography
7. The last one is main making a Virtual LAB on the computer for Experiment & Practices.
How many types of Hacker?10 types of Hackers
1. Script Kiddie Hacker
2. White Hat Hacker
3. Black Hat Hacker
4. Grey Hat Hacker
5. Green Hat Hacker
6. Red Hat Hacker
7. Blue Hat Hacker
8. Hacktivist
9. State/Nation Sponsored Hacker
10. Malicious Insider Or Whistleblower.
How many types of hacking?1. Web Hacking
There are many hacking included in the web hacking like (DDOS Attacks, Remote Code Execution Attacks, Cross Site Scripting Attacks, Symlinking-An Insider Attacks, Social Engineering Attacks, DNS Cache Poisoning Attacks, Clickjacking Attacks, Broken Authentication & Session Management Attacks, SQL Injection Attacks, Cross Site Request Forgery Attacks).
2. Exploit Writing
3. Wireless Hacking
4. Phishing Attacks
5. Brute Force Attacks
6. Payload
7. Remote Access
8. Google Hacking
Hackers All-Time Best Hacking Tools Uses Ever1. Nmap
2. Acutenix Web Vulnerability Scanner
3. Metasploit
4. Owasp Zed Attack Proxy Project
5. Wireshark
6. Burp Suite
7. THC Hydra
8. Aircrack-ng
9. John The Ripper
10. Putty
11. Crunch
12. Mac Changer
13. Maltego
Above all the details Written by (Mr, R.S)
If anyone has to hacking-related any queries message on the Facebook page or mail in hackersonline900@gmail.com
Follow the Facebook Page https://www.facebook.com/Hackers-Online-1560817147314447
No comments:
Post a Comment