Free: learn ethical hacking in hindi
In this Section, you will cover what is hacking, ethical hacking, tipes of hackers, and which option to start from.
Section 2: Information Gathering And Vulnerability Scanning
At this level you will learn how you can gather information about your victim . Whether it is a personal PC or a website. You can gather information like Searching for Google hacking data base, information about target-through search engine, credit card numbers, details of their owner, Vulnerability and Loopoles Websites. What is the operating system, open ports, services, and system architecture and many more!
Section3: Using Proxy
Before proceeding, we have to see how you can hide your identity. Proxy is the best way to hide your IP address. And you will learn How to use proxy and anonymous tools to hide the Ip address
Section4: Gaining Access
In Forth part of hacking module we will teach you how to interact in a system, whether it is Linux or Windows or any other operating system. Both Linux and Windows tools have been used to explain this level. You also know how to create a backdoor in this level.
Section5: Lab Creation
in this section you will learn how you can create a lab on which you are going to perform hacking attacks
- Ethical Hacking In Hindi Part-5 How To Create a Lab For Hacking Test Part-1
- Ethical Hacking In Hindi Part-5 How To Create a Lab For Hacking Test Part-2
- Ethical Hacking In Hindi Part-5 How To Create a Lab For Hacking Test Part-3
- Ethical Hacking In Hindi Part-5 How To Create a Lab For Hacking Test Part-4
Section6: Password Hacking
In this section you will see password hacking and know how you can crack the password of Windows 7, 8 and 10 as well as the Linux system.
Section7: Data Encryption
Here we will learn more about encryption techniques, about steganography and cryptography.
section8: Exploitation-In this section you will be able to understand What is the difference between website hacking and application hacking . sql injection, cross site scripting and know all the details of DDOS Attack