Posts

Types Of Network

Image
 Local Area Network (LAN) In LAN, a computer network cover small local area like home, office and small workgroups such as schools or university. Wi-Fi and Ethernet are commonly used for LAN.    Wide Area Network (WAN) In WAN, a computer network cover larger area like on national or regional level. A wide area network can be used as Local area network, Metropolitan area network (MAN), or for Campus area network  Wireless Local Area Network (WLAN) In WLAN, devices are connected wirelessly by the mechanism of wireless distribution method ( OFDM Radio or any other). In WLAN, generally a access point provides the connection and hence provide the user an ease of mobility. WLAN is easy to install and maintain. However it became very popular these days with Laptops and Personal Devices.

Introduction to Ports and Protocols

Ports A port is logical access channel between two device which helps in their communication. A port is used to transfer the data There are total 65535 ports.     1. Well known ports: 0 to 1023    2.   Registered Ports: 1024 to 49151   3.    Dynamic/Private ports: 49152 to 65535    Some of the useful ports are:                        Port Name                        Port Number ftp 21/tcp Ssh 22/tcp telnet 23/tcp Stmp 25/tcp http 80/tcp Kerberos 88/tcp Pop3 110/tcp Imap 143/tcp https 443/tcp Ftps-data 989/tcp Ftps 990/tcp Telnets 992/tcp Imaps 993/tcp Pop3s 995/tcp Ldap 389/tcp Protocols Protocol is simply a set of rules which defines a standard way for exchanging information over a netwo...

Phases Of Hacking

Image
1. Reconnaissance: This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups Network Host People Involved There are two type of Footprinting: Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc. 2. Scanning: In this phase, Attacker find much more information about Target. Attacker ca perform port Scanning or various assessment in order to get sensitive information about target 3. Gaining Access: In this phase,Attacker actually performs Hack. Using the information or vulnerability found by previous phase, attac...
Image
INTRODUCTION TO HACKING Hacking Hacking means to "Gaining Unauthorized Access Into A System"  In India, Ethical Hackers are also known as INFORMATION SECURITY EXPERT or CYBER SECURITY ANALYST. Types of Hackers   White Hat Hacker                         Hacker who works for Private Organization or  Government Organization. They Perform hacking and security checks with authority. They are known for security  Black Hat Hacker                          Hacker who breaking the security without any permission or authority . They hack for enjoy and stole information are known as Black Hat Hacker .  Gray Hat Hacker                       Hacker who work for Benefits and work as White Hat Hacker as well as Blac...