Cybersecurity

Mujahida Joynab - Feb 10 - - Dev Community

Mac Address - Unique
VPN - Virtual Private Network - For the secured transfer of data
https://epicbrowser.com/

Ping & traceroute
Facebook -> ISP ->
Tracer - For tracing server -> Windows , Linux
https://nmap.org/ -> It gathers information
What device the guy use ? What weakness does his device have?
Location Tracking -> grabify.link/track/MWU299

Hurinicate Electric Internet Service

For converting -> Cuttly -> Make attractive

https://canarytokens.org/nest/

Temp mail - https://temp-mail.org/en/

Essential Hacking Terms
Back door -
Bruteforce attack -> Random
Dictionary attack ->
Exploit -> Will take control of the device
Zero-day attack ->

Malware ?
-> Polluted program .
Trojan Horse ?
-> Can crack freely

Harmful Attack -
Key Logger
First weapon to track password .
Hardware e thake .

Movie - Cybersecurity
To be saved -

  1. Virtual keywork - OSK To be saved
  2. Anti key logger software -> SPYSHELTER ,ZAMANA ANTILOGGER

Clickjacking
UI redressing

Clickjaching used for -

Spyware
Installed while buying it

Pegasus
Paragan solution

Cookie theft -
Block third party cookies
Ransomware
File will be lost

Bitcoin
Everyday 5 lacks malware is created

https://www.nomoreransom.org

Phishing

email -v

Fake mail -
check point
sandan search
emkei.cz

To be saved from phising
https://Bit
https://wheregoes.com/

USB Attack
-> Will run malicious code
To get the
Aurdino -

USB Moduler

Wifi cable
Juice jacking attack
Electronic chip
SEO - Search Engine Optimization

Deepfake

Important -
vm ware install
Kali Linux

facebook security
fb hack -
cookie , third party

Spam -
Community standard

System Hacking -

  1. Password breaking
  2. Types of password attacks

Non electronic attacks
Active Online

Wireless Terminology

Encryption

Wireless Threats
Access Control Attacks
Monitor Mode
Wifi jamper - To jamp wifi
Mobile Phone HackingT
To know where phone information going -
glassware
myaccount.google.find my account
eyecon
OSINT - Open Source Intelligence
Google Dork
https://www.exploit-db.com/google-hacking-database

To check malicious link
https://www.virustotal.com/gui/home/upload

Hacking Gadgets
Flipper

Task Manager && Performance Monitor

Digital Forensics
To find the source

IP is most important

Win

ActivityTrack->
Nirsoft

To know if usb connceted or not

https://www.vmware.com/

Basic Linux for Hackers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .