Mac Address - Unique
VPN - Virtual Private Network - For the secured transfer of data
https://epicbrowser.com/
Ping & traceroute
Facebook -> ISP ->
Tracer - For tracing server -> Windows , Linux
https://nmap.org/ -> It gathers information
What device the guy use ? What weakness does his device have?
Location Tracking -> grabify.link/track/MWU299
Hurinicate Electric Internet Service
For converting -> Cuttly -> Make attractive
https://canarytokens.org/nest/
Temp mail - https://temp-mail.org/en/
Essential Hacking Terms
Back door -
Bruteforce attack -> Random
Dictionary attack ->
Exploit -> Will take control of the device
Zero-day attack ->
Malware ?
-> Polluted program .
Trojan Horse ?
-> Can crack freely
Harmful Attack -
Key Logger
First weapon to track password .
Hardware e thake .
Movie - Cybersecurity
To be saved -
- Virtual keywork - OSK To be saved
- Anti key logger software -> SPYSHELTER ,ZAMANA ANTILOGGER
Clickjacking
UI redressing
Clickjaching used for -
Spyware
Installed while buying it
Pegasus
Paragan solution
Cookie theft -
Block third party cookies
Ransomware
File will be lost
Bitcoin
Everyday 5 lacks malware is created
Phishing
email -v
Fake mail -
check point
sandan search
emkei.cz
To be saved from phising
https://Bit
https://wheregoes.com/
USB Attack
-> Will run malicious code
To get the
Aurdino -
USB Moduler
Wifi cable
Juice jacking attack
Electronic chip
SEO - Search Engine Optimization
Deepfake
Important -
vm ware install
Kali Linux
facebook security
fb hack -
cookie , third party
Spam -
Community standard
System Hacking -
- Password breaking
- Types of password attacks
Non electronic attacks
Active Online
Wireless Terminology
Encryption
Wireless Threats
Access Control Attacks
Monitor Mode
Wifi jamper - To jamp wifi
Mobile Phone HackingT
To know where phone information going -
glassware
myaccount.google.find my account
eyecon
OSINT - Open Source Intelligence
Google Dork
https://www.exploit-db.com/google-hacking-database
To check malicious link
https://www.virustotal.com/gui/home/upload
Hacking Gadgets
Flipper
Task Manager && Performance Monitor
Digital Forensics
To find the source
IP is most important
Win
ActivityTrack->
Nirsoft
To know if usb connceted or not
Basic Linux for Hackers