Skip to content

aruncs31s/ethical-hacking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Under construction

License: GPL v3 fork status commits contributers

Ethical-hacking

Introduction

This is a free and open source project made by few students and anyone intrested sharing hacking or linux skill or anyone willing to learn hacking are welcome here

Disclimer

This whole project is for educational purpose only and we suggest that you should gain full permission before doing anything on their network even before scanning

What is this all about?

We all know what hacking is and we've seen lot of hacker in movies right? the one always with masks and they just press one key and the system is hacked . That's not realy how things work a simple simple scan can even take more than the whole movie(depents on what your scanning).Inorder to be a hacker (or just to know how it works) we should at least know about linux and how to execute a command, becouse now days everything is available on github from simple phishing scripts to whole hacking framework, Hacking using those scripts still make you a hacker but you will be known as a "script kiddie" (the person who plays with scripts) and who does not even know what he is doing

for more click here

Prerequisites

followings are required to function effectively on this project and essential in bocoming an ethical hacker . You can skip this if you already know this or You can all this later

Learn more about it here

Linux

Linux is a must have skill for any hacker or it professionals because you'll encounter it everywhere and you'll be doing all the hacks from a linux operating system like kali , parrot or exodia

Git

click here


Setting Up hacking Environment

Introduction

A hacking environment is essential for doing hacks.In good old days everyone has to setup their own hacking environment inorder to start hacking but nowdays some community/companies do this for you that is , they make an hacking os which comes with all the neccessary tools out of the box In this section We will setup a hacking os and explore some pre-maid one's like kali and parrot os You are free to use any other hacking os like parrot os kali but "i" preffer to use arch/black arch for hacking

Hacking OS

Hacking os is a premaid OS which shipps with hacking tools pre-installed , which saves time but increases system's size . So inorder to reduce we will setup a hacking os from just a normal Arch install iso.

Installing ArchLinux

Arch Linux simple and lightweight operating system . I choose Arch linux insted of Debian because in arch linux you'll get the latest tools and packages and it only take as little as 77 MB after installing.

Learn more about installing arch linux here

Setting up Black Arch

Black arch is is an arch based penetration testing operating system which has over 2800 tools. This makes installing hacking tools easy .

Learn more about setting up Black arch here

Adding a restricted user

It is not neccessary to add a restricted user but in some case or in my opinion it is good to isolate the user from accessing others files and obtaining root access etc.

  • It isolates the restricted user from others
  • Good if your using the same Operating System for personal use

Learn more about Adding a restricted user here

Creating a Restricted group

Creating a restricted group also helps in isolating the user for example consider if you use sudo group or wheel group for hacking and they both can access sudo seamlessly like consider if you have a script that you downloaded from github or some place and you wont be able to execute it with super user permission if your using restricted user and we can control which program should get to run with root permission using custom group

Learn more about Creating a restricted group here

More about Setting up hacking environment


Basics

  1. Proxy Servers and Stay Anonymous
  2. Phishing

This sections's discus about all basic hacks click here to know more

1. Proxy Servers and Stay Anonymous

Staying anonymous is an importent thing in hacking as well as in surfing the internet. In the dark side of things the main advantage of staying anonymous is that you won't get caught. This section is highly recomented before anything else. and more about this click here


Languages

Reconnaissance

Click here

Cryptography

Cryptography itself is a very huge topic and it will not fit in this simple markdown page and i dont have the time to explain it. So i will surf throught the surface and only point out the important stuffs .So in simple words cryptography is a tool used to make a data secure by coverting it into some format to make the information/data secure.

Learn more about cryptography here

Hacks

Scripts

Followings are scripts made for this project

Exploits

Tools Used

[`Metasploit`](./Tools-used#metasploit) `gcc` `Nikto` `nmap`

Contact

Telegram

Team members

Arun CS

Amarnath

Goutham Naik

Anurag M K

Sony Thomas

MaxStee

Anoop J J

Athul vv

Swetha Kc

Aslam

gouthamdaas

Anuranch C

Join us

you can join us and simply start learning together for more details contact here