• Learn hacking very easily !!!



    Hacking has more than zero on top. But hacking is not just hacking. There are lots of wood hay burn issues behind it. To be a real hacker, you have to spend your time in such a way that you have to spend the talent. There are many tunes on hacking in TT. They are also very useful. But hacking has its primary or beginnings in very few places. There are just a few tips taught here. But to be a real hacker, you have to start from long ago. Today I will discuss some steps on this topic. Actually there are many good hackers in Bangladesh. Peace be upon them. Please forgive me if I make a mistake in my writing and please correct it.
    In fact, hacking is a kind of hacking, or hacking with different software, but they are not equally effective in all cases. For this reason, to learn real hacking you must have good knowledge about networking, programming, web hosting, remote access, IP networking and many more, although I do not even understand the issues at all. Still, I understand that I am sharing it among you. But never think of it as a hacking technique. Because, it's a theme for your hacking or basics. In this you will know all the steps. Some things can be done by yourself. But there are many things to understand from this you have to find out about Google's search and use them.
    First of all, the initial few steps of real hacking.
    1. Collect specific information
    2. Port Scanning
    3. Find out all the information about the target operating system
    4. Find out the system khut
    5. Preparation of System Attack
    6. Attack on the system
    7. At the end, implement all the things you want to doCollection of information
    Find out the IP of the website or system you want to hack. This is the most important thing. Open Prompt Prompt for it and type:
    Ping yoururl.com
    Then enter it. See your website's IP. Then collect detailed information about this IP. Collect all the information about the website (eg: owner email, site service, contact number etc.) These can come in many ways later. Then go to this address for your information, including email, domain company, owner of this domain, and enter your target URL and search.
    Then, to know the location of the IP address, this address can come to know its location. Anyway, try to find out all the information you need about Google search.Port scanning
    Port scanning is the way to find the road to the operating system or website. Suppose you will steal a house, then you must know that you enter the house or you have a door open or have access to it from any side. This is something like that. This is basically the way you do it, to find out which way it is easy or weak. For this, you can use an expensive port scanner or you can use any free software. Its job is to find out which of the systems are open or closed or running in a port. You can use NMAP or SUPERSCAN software for this purpose. If you reply to the port from the port when you scan port with NMAP, then the port is running. Download this software with Google search. Then start working. If you search Google on its usage, you will get many tutorials.
    To find your PC's port, enter the command prompt at:
    Netstat -no
    Then enter it. See, the ports of your PC are doing so. Go here for NMAP download.Operating System Information
    You must know the information about the operating system for hacking. For example, victim uses any operating system. Windows is Linux or Unix not Mac? Then you have to find out the operating system version. What is the version of Windows, Windows 7, not 8 or XP? You must be aware of these for running an acute attack. If you do not know, you can not properly enter the remote system. The tools that are available for this purpose are: NMAP, Netscantool Pro Proof. Try to collect these with Google search. Hope to get it very easily.Find out the system khut
    That is, finding a system where there is no sorrow or weakness. Almost all the systems have problems with no tone. It could be the problem of programming, problems of any software etc. Now, at this stage, we will be working to find those problems on the system. To see that the system is open or running and to collect detailed information about that port. You can use many tools for this. However Nessas, Nikto, Core Impact, these tools are great tools for this job. You can take a look at how to use them from different sites in Google.System etac final preparation and ATAQ
    At this stage, you will have to prepare any system or website ATAC final. For this, basically discover the vulnerabilities of your system that will have to pull out the Apache Port that has Port weaknesses. To find out, type in command prompt:
    Telnet your target ip or url port
    Or, an example:
    Teln
  • 0 মন্তব্য(গুলি):

    Post a Comment