This is a free and open source project made by few students and anyone intrested sharing hacking or linux skill or anyone willing to learn hacking are welcome here
This whole project is for educational purpose only and we suggest that you should gain full permission before doing anything on their network even before scanning
We all know what hacking is and we've seen lot of hacker in movies right? the one always with masks and they just press one key and the system is hacked . That's not realy how things work a simple simple scan can even take more than the whole movie(depents on what your scanning).Inorder to be a hacker (or just to know how it works) we should at least know about linux and how to execute a command, becouse now days everything is available on github from simple phishing scripts to whole hacking framework, Hacking using those scripts still make you a hacker but you will be known as a "script kiddie" (the person who plays with scripts) and who does not even know what he is doing
for more click here
followings are required to function effectively on this project and essential in bocoming an ethical hacker . You can skip this if you already know this or You can all this later
Learn more about it here
Linux is a must have skill for any hacker or it professionals because you'll encounter it everywhere and you'll be doing all the hacks from a linux operating system like kali
, parrot
or exodia
- Introduction
- Hacking OS
- Installing ArchLinux
- Setting up Black Arch
- Adding a restricted user
- Creating a restricted group
A hacking environment is essential for doing hacks.In good old days everyone has to setup their own hacking environment inorder to start hacking but nowdays some community/companies do this for you that is , they make an hacking os which comes with all the neccessary tools out of the box In this section We will setup a hacking os and explore some pre-maid one's like kali and parrot os You are free to use any other hacking os like parrot os kali but "i" preffer to use arch/black arch for hacking
Hacking os is a premaid OS which shipps with hacking tools pre-installed , which saves time but increases system's size . So inorder to reduce we will setup a hacking os from just a normal Arch
install iso.
Arch Linux simple and lightweight operating system . I choose Arch linux insted of Debian because in arch linux you'll get the latest tools and packages and it only take as little as 77 MB
after installing.
Learn more about installing arch linux here
Black arch is is an arch based penetration testing operating system which has over 2800 tools. This makes installing hacking tools easy .
Learn more about setting up Black arch here
It is not neccessary to add a restricted user but in some case or in my opinion it is good to isolate the user from accessing others files and obtaining root
access etc.
- It isolates the restricted user from others
- Good if your using the same Operating System for personal use
Learn more about Adding a restricted user
here
Creating a restricted group also helps in isolating the user for example consider if you use sudo
group or wheel
group for hacking and they both can access sudo
seamlessly like consider if you have a script that you downloaded from github or some place and you wont be able to execute it with super user permission if your using restricted user
and we can control which program should get to run with root
permission using custom group
Learn more about Creating a restricted group
here
More about Setting up hacking environment
This sections's discus about all basic hacks click here to know more
Staying anonymous is an importent thing in hacking as well as in surfing the internet. In the dark side of things the main advantage of staying anonymous is that you won't get caught. This section is highly recomented before anything else. and more about this click here
Cryptography itself is a very huge topic and it will not fit in this simple markdown page and i dont have the time to explain it. So i will surf throught the surface and only point out the important stuffs .So in simple words cryptography is a tool used to make a data secure by coverting it into some format to make the information/data secure.
Learn more about cryptography here
Followings are scripts made for this project
[`Metasploit`](./Tools-used#metasploit) `gcc` `Nikto` `nmap`you can join us and simply start learning together for more details contact here