Online Network Tools

Here we have some network tools for CountrybyIP, Current Location and DNS.


Ethical Hacking

Wel-come to ethical hacking section, here we are learning hacking concepts,terms,strategies and finally real world hacking.

Home

Welcome, This Ethical hacking tutorials are designed for beginner. Those who are in initial stage of ethical hacking....

Overview

Hacking is the process of attempting to gain or successfully gaining, unauthorized access to computer resources....

Hacker Types

A white hat hacker breaks security for non-malicious reasons. Perhaps to test own security system or while working....

Famous Hackers

In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By....

Terminologies

List of very important terms and meaning used in the field of hacking. Pishing is one of the most common hacking termin....

Tools

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web....

Skills

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There....

Process

In the process of hacking there are 5 phases involved. Reconnaissance Reconnaissance means to collect....

Reconnaissance

The first process in ethical hacking is to gather information and knowledge about the target computer or network....

Foot Printing

Footprinting (also known as reconnaissance) is the technique used for gathering information about computer....

Fingerprinting

Fingerprinting in Ethical Hacking means a method used for determining the current running operating system on....

Sniffing

Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used....

Sniffing Tools

If you have been an IT Administrator for any length of time, you know that one of the most frustrating and time-consuming....

ARP Poisoning

ARP is the acronym for Address Resolution Protocol. It is used to convert IP address to physical addresses [MAC....

DNS Poisoning

A technique by which DNS server is tricked, in the belief that the server has received the authentic information,....

Exploitation

A script or programmed software which enables the hackers to take over the control of a system and exploit its vuln....

Enumeration

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services....

Metasploit

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we....

Trojan Attacks

Trojans are malicious files which are used by the attacker to create a backdoor without the knowledge of the user. It....

TCP/IP Hijacking

TCP/IP Hijacking is done when a genuine network connection of a another user can be accessed by an authorized user. To....

Email Hijacking

An email is sent by a spammer from a known domain misguiding the receiver to open the mail, as it is from a known....

Password Hacking

Passwords are set for the things that we desire to protect like for emails, servers, databases, computer systems etc. The....

Wireless Hacking

In this ehtical hacking session, all hacking tutorials are arranged/designed with simple hacking stuff to experties lavel, ....

Social Engineering

Social engineering is the art of manipulating users of a computing system into revealing confidential information....

DDOS Attacks

Distributed Denial of Service (DDoS) attack, the website or any online service is overloaded with traffic from multiple....

Cross Site Scripting

A vulnerability is exploited in the website visited by a victim, such that the website to deliver the malicious JavaScript, which....

SQL Injection

SQL injection is an attack where the hacker makes use of unvalidated user input to enter arbitrary data or SQL....

Pen Testing

Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network....


Computer Network

In this computer network session, we are going to study complete network, starting from beginer to expert level.

Home

The dictionary defines the word network as “a group or system of interconnected people or things.” Similarly, in the....

Network Types

The Network allows computers to connect and communicate with different computers via any medium. LAN, MAN and WAN....

Architecture

Network architecture refers to how computers are organized in a system and how tasks are allocated between these....

Topologies

It defines the specific characteristics of a network, such as where all the workstations and other devices are....

Physical Media

A lot of us rely on wireless networking methods that work using technologies like radio frequency and infrared, but....

Fiber Optic Cable

Fiber-optic cable transmits digital signals using light impulses rather than electricity. Fiber cable allows light impulses....

Cable Properties

The reason we use so many different types of cables in a network is that each type has its own set of properties that....

Wiring Standards

Ethernet cabling is an important thing to understand, especially if you’re planning to work on any type of LAN. There are....

Network Devices

We’ll start by covering the more common network devices that you would be most likely to come across and then move on....

Network Specialized Devices

Here is some other network connectivity devices, there are several devices are available in today’s network connectivity.....

OSI Model

In the very first networks, the computers involved could communicate only with other computers made by the same.....

Internet Protocol (Part I)

Because TCP/IP is so central to working with the Internet and intranets, it’s essential for us to understand it in.....

Internet Protocol (Part II)

Because TCP/IP is so central to working with the Internet and intranets, it’s essential for us to understand it in.....

IP Address

An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific....

Subnetting

Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do....

Class b subnetting

We know the Class B network address has 16 bits available for host addressing. This means we can use up to 14 bits for....

Class a subnetting

Class A network address has 24 bits available for host addressing. This means we can use up to 22 bits for subnetting.....

NAT

The original intention for NAT was to reduce available IP address space by allowing many private IP addresses to....

Wireless Networking

Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into the air from an antenna that creates....

Network Security Threats

Viruses are common threats that we hear about all the time, there are many other nasty things out there as well. Bad guys....

Network WAN

A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects different smaller....

Network Troubleshoot

Troubleshooting computers and networks is a combination of art and science and the only way to get a really good at it is....


Ethical Hacking - Tutorials

Here we are studying some tools with there step by step hacking or Pen Testing Procedure.

aircrack-ng

Aircrack-ng

In this tutorial I will tell you how to crack wpa/wpa2 wi-fi in kali linux using aircrack-ng. To do this, first you should install ....

thc-hydra

THC Hydra

Hydra (better known as “thc-hydra”) is an online password attack tool. It brute forces various combinations on live services....

John the Ripper

John the Ripper

John is a state of the art offline password cracking tool. John was better known as John The Ripper(JTR) combines many....

Metasploit

Metasploit

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we....

Netcat

Netcat

Netcat is a great network utility for reading and writing to network connectios using the TCP and UDP protocol. Netcat is....

Nmap

Nmap

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free....

wireshark

Wireshark

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a....

kismet_wireless

Kismet Wireless

Kismet is a WIFI network analysis tool. This is the 802.11 second layer wireless network detector, sniffer and intrusion....

facebook

Facebook Account Hacking

Facebook is far from unhackable, but to do so, you will need some skills ... For this facebook hacking trick, you must have....

reset windows 7 PWD

Reset Windows 7 admin password with CMD

This method is for you when you forgot Windows 7 admin password and are unable to log on. Sometimes, it is used.....

wps wpa tester

Wi-Fi Hacking Using Android Phone

In this tutorial we are hackign Wi-Fi using android phone, for this hacking trick we are using Wps Wpa Tester app. This....