Saturday 5 July 2014

KEYLOGGER

Key logger is a software or application which has the capability to record every information you type from your keyboard . Hacker installed key logger on your computer without your knowledge and once it installed on your PC it sends all the information which you have typed  from your keyboard to the hacker in log file . We can also say its a surveillance tool which record your information without your knowledge . Mostly it installed on your PC when you don't  have updated Antivirus or window or  you have download free games, movies and files or unknown person email attachment.

NAME OF KEYLOGGERS

Sniper Spy 
Andra max Key logger
Refog key logger



RECOMMENDATION :- ALWAYS USED UPDATED ANTIVIRUS OR WINDOWS NEVER DOWNLOAD UNKNOWN PERSON EMAIL ATTACHMENT WITHOUT SCANNING . DOWNLOAD SOFTWARE OR GAMES ONLY FROM TRUSTED WEBSITES

HOW TO BECOME AN ETHICAL HACKER

Ethical Hacker is a person work with permission of the company or organization  to protect the network or application from hackers he help to increase the security . Security is ever evolving process . No network or computer is 100 percent secure.






To become an ethical hacker you required lot of skills in computer programming and networking , ethical hacker needs hands on security skills. Being an ethical hacker its your responsibility to perform penetration testing and check all the security or vulnerabilities in network or in application. Being an ethical hacker you should have the programming knowledge like C, C++, HTML., php. python, sql, although you must have the knowledge in networking like:-

1. Routing knowledge (Routing Protocols)
2.OSI Model , TCP/IP
3.ACL (Access control list)
4.Firewalls, IPS, (Intrusion Preventation system), IDS (Intrusion detection system)
5.Microsoft Server 2008 or 2010
6.Linux or (Backtrack open source)

                                                           KNOWLEDGE REQUIRED

INFORMATION GATHERING  

 SOCIAL ENGINEERING ATTACK

PHISHING ATTACK

DNS POISONING (ADVANCED PHISHING) 

SNIFFERS

PHYSICAL ACCESS

SESSION HIJACKING (MAN IN THE MIDDLE ATTACK)

SQL INJECTION

XXS ATTACK

BRUTE FORCING ATTACK (PASSWORD GUESSING)

DOS ATTACK

DDOS ATTACK  

WINDOWS HACKING

LINUX HACKING

CRYPTOGRAPHY

WIRELESS HACKING TECHNIQUE (WEP OR WAP CRACK TOOLS)

TROJANS AND BACKDOORS

PROXY SERVER AND ETC...


Hacker is a very intelligent person who have very good knowledge in all above programming and networking or to become an ethical hacker you must have all the knowledge which i have mention above . We will learn all these thing one by one in our upcoming lecture or tutorials.

SOCIAL ENGINNERING

Social engineering is a method or technique to get into the network or a system. Social engineering is used to obtain your personal information like your name date of birth bank account details and email accounts details or your network details etc. Social engineering commonly done by the telephone or internet to get the sensitive information or to get them to do something which is against the security policies of company or organization. In social engineering attack you get the telephone call or email where your personal information ask or if you provide your information on telephone or internet you will get the victim.


NEVER RESPOND TO ANY PHONE CALL OR EMAIL WHERE YOUR PERSONAL INFORMATION ASK. ALWAYS VERIFY THE WEBSITE BEFORE ENTERING YOUR PERSONAL INFORMATION

For more details on social engineering watch my video tutorial