Posts

Showing posts from May, 2024

Networking Basics for Ethical Hackers (Beginner to Pro Guide)

Image
  Networking Basics for Ethical Hackers (Beginner to Pro Guide) Introduction: Why Networking Matters in Ethical Hacking Before you become a skilled ethical hacker, you need to understand one thing very clearly: Hacking = Understanding Networks Every attack, every defense, every tool — all work on networks. If you don’t understand how computers talk to each other, you’ll always feel confused using tools like Nmap, Wireshark, or Metasploit. So in this guide, I’ll teach you networking from zero to a strong foundation in the simplest way possible — like a story. Chapter 1: What is a Network? Imagine this: You and your friends are in a classroom passing notes. You = Computer Friend = Another Computer Notes = Data Passing system = Network Network = A group of computers connected to share data Types of Networks: LAN (Local Area Network) → Small (home, school, lab) WAN (Wide Area Network) → Large (Internet) Chapter 2: How Data Travels (The Hidden Journey) When you send a message on WhatsAp...

How to Install Kali Linux on VirtualBox {Step by Step Tutorial}

Image
Kali Linux 2024.1 Download options: Kali Linux ISO 64-bit   Kali Linux ISO 32-bit Download VirtualBox Here you will find links to VirtualBox binaries and its source code. VirtualBox binaries By downloading, you agree to the terms and conditions of the respective license. VirtualBox  7.0.18 platform packages ​ Windows hosts ​ macOS / Intel hosts Linux distributions ​ Solaris hosts ​ Solaris 11 IPS hosts Step 1: Create Kali Linux VirtualBox Instance Create a new virtual machine and configure it to run Kali Linux. Proceed with the steps below to correctly set up a Kali Linux VM in VirtualBox: 1. Launch  VirtualBox Manager  and click the  New  icon. 2.   Specify a name for the VM and provide the path to the ISO image. Select  Next . 3.   Select the amount of memory and the number of  virtual CPUs  to allocate to the VM. The minimum recommended values for Kali Linux are  2 GB of RAM  and  1 CPU . Select  Next  w...

How To Install REDHAWK Tool In Your Kali Machine

Image
  All in one tool for  Information Gathering  and  Vulnerability Scanning Scans That You Can Perform Using RED HAWK : Basic Scan Site Title  NEW IP Address Web Server Detection  IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup  IMPROVED Geo-IP Lookup Grab Banners  IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner  IMPROVED Sub Domain IP Address Reverse IP Lookup & CMS Detection  IMPROVED Hostname IP Address CMS Error Based SQLi Scanner Bloggers View  NEW HTTP Response Code Site Title Alexa Ranking Domain Authority Page Authority Social Links Extractor Link Grabber WordPress Scan  NEW Sensitive Files Crawling Version Detection Version Vulnerability Scanner Crawler MX Lookup  NEW Scan For Everything -  The Old Lame Scanner Released Versions: - Version 1.0.0 [11-06-2017] - Version 1.1.0 [15-06-2017] - Version 2.0.0 [11-08-2017] Changelog: Version 1.0.0 Initial Launch V...