Must Know Hacking!3
Must Know Hacking!3
OWASP or Open Web Security Project is a non-profit charitable organization focused on improving the security of software and web
applications.
The organization publishes a list of top web security vulnerabilities based on the data from various security organizations.
The web security vulnerabilities are prioritized depending on exploitability, detectability and impact on software.
Exploitability –
What is needed to exploit the security vulnerability? Highest exploitability when the attack needs only web browser and lowest being
advanced programming and tools.
Detectability –
How easy is it to detect the threat? Highest being the information displayed on URL, Form or Error message and lowest being source
code.
Impact or Damage –
How much damage will be done if the security vulnerability is exposed or attacked? Highest being complete system crash and lowest
being nothing at all.
The main aim of OWASP Top 10 is to educate the developers, designers, managers, architects and organizations about the most
important security vulnerabilities.
Kali Linux Tutorial: What is, Install, Utilize Metasploit and Nmap
What is Kali Linux?
KALI LINUX is a security distribution of Linux derived from Debian and specifically designed for computer forensics and advanced
penetration testing. It was developed through rewriting of BackTrack by Mati Aharoni and Devon Kearns of Offensive Security. Kali
Linux contains several hundred tools that are well-designed towards various information security tasks, such as penetration testing,
security research, computer forensics and reverse engineering.
BackTrack was their previous information security Operating System. The first iteration of Kali Linux was Kali 1.0.0 was introduced
in March 2013. Offensive Security currently funds and supports Kalin Linux. If you were to visit Kali's website today (www.kali.org),
you would see a large banner stating, "Our Most Advanced Penetration Testing Distribution, Ever." A very bold statement that
ironically has yet to be disproven.
Kali Linux has over 600 preinstalled penetration-testing applications to discover. Each program with its unique flexibility and use
case. Kali Linux does excellent job separating these useful utilities into the following categories:
What is JVM (Java Virtual Machine) with Architecture JAVA Programming Tutorial
1. Information Gathering
2. Vulnerability Analysis
3. Wireless Attacks
4. Web Applications
5. Exploitation Tools
6. Stress Testing
7. Forensics Tools
8. Sniffing & Spoofing
9. Password Attacks
10. Maintaining Access
11. Reverse Engineering
12. Reporting Tools
13. Hardware Hacking
In this beginners tutorial, you will learn:
What is Kali Linux?
Who uses Kali Linux and Why?
Kali Linux Installation Methods
Install Kali Linux using Virtual Box
Getting Started with Kali Linux GUI
What is Nmap?
o Nmap Target Selection
How to Perform a Basic Nmap Scan on Kali Linux
o Nmap OS Scan
What is Metasploit?
o Metasploit and Nmap
o Metasploit Exploit Utility
Who uses Kali Linux and Why?
Kali Linux is truly a unique operating system, as its one of the few platforms openly used by both good guys and bad guys. Security
Administrators, and Black Hat Hackers both use this operating system extensively. One to detect and prevent security breaches, and
the other to identify and possibly exploit security breaches. The number of tools configured and preinstalled on the operating system,
make Kali Linux the Swiss Army knife in any security professionals toolbox.
Professionals that use Kali Linux
1. Security Administrators – Security Administrators are responsible for safeguarding their institution's information and data.
They use Kali Linux to review their environment(s) and ensure there are no easily discoverable vulnerabilities.
2. Network Administrators – Network Administrators are responsible for maintaining an efficient and secure network. They use
Kali Linux to audit their network. For example, Kali Linux has the ability to detect rogue access points.
3. Network Architects – Network Architects, are responsible for designing secure network environments. They utilize Kali
Linux to audit their initial designs and ensure nothing was overlooked or misconfigured.
4. Pen Testers – Pen Testers, utilize Kali Linux to audit environments and perform reconnaissance on corporate environments
which they have been hired to review.
5. CISO – CISO or Chief Information Security Officers, use Kali Linux to internally audit their environment and discover if any
new applications or rouge configurations have been put in place.
6. Forensic Engineers – Kali Linux posses a "Forensic Mode", which allows a Forensic Engineer to perform data discovery and
recovery in some instances.
7. White Hat Hackers – White Hat Hackers, similar to Pen Testers use Kali Linux to audit and discover vulnerabilities which
may be present in an environment.
8. Black Hat Hackers – Black Hat Hackers, utilize Kali Linux to discover and exploit vulnerabilities. Kali Linux also has
numerous social engineer applications, which can be utilized by a Black Hat Hacker to compromise an organization or
individual.
9. Grey Hat Hackers – Grey Hat Hackers, lie in between White Hat and Black Hat Hackers. They will utilize Kali Linux in the
same methods as the two listed above.
10. Computer Enthusiast – Computer Enthusiast is a pretty generic term, but anyone interested in learning more about
networking or computers, in general, can use Kali Linux to learn more about Information Technology, networking, and
common vulnerabilities.
Kali Linux Installation Methods
Kali Linux can be installed using the following methods:
Ways to Run Kali Linux:
1. Directly on a PC, Laptop – Utilizing a Kali ISO image, Kali Linux can be installed directly onto a PC or Laptop. This method
is best if you have a spare PC and are familiar with Kali Linux. Also, if you plan or doing any access point testing, installing
Kali Linux directly onto Wi-Fi enabled laptop is recommended.
2. Virtualized (VMware, Hyper-V, Oracle VirtualBox, Citrix) – Kali Linux supports most known hypervisors and can be easily
into the most popular ones. Pre-configured images are available for download from https://www.kali.org/, or an ISO can be
used to install the operating system into the preferred hypervisor manually.
3. Cloud (Amazon AWS, Microsoft Azure) – Given the popularity of Kali Linux, both AWS and Azure provide images for Kali
Linux.
4. USB Boot Disc – Utilizing Kali Linux's ISO, a boot disc can be created to either run Kali Linux on a machine without
actually installing it or for Forensic purposes.
5. Windows 10 (App) – Kali Linux can now natively run on Windows 10, via the Command Line. Not all features work yet as
this is still in beta mode.
6. Mac (Dual or Single boot) – Kali Linux can be installed on Mac, as a secondary operating system or as the primary. Parallels
or Mac's boot functionality can be utilized to configure this setup.
Install Kali Linux using Virtual Box
The easiest method and arguably the most widely used is installing Kali Linux and running it from Oracle's VirtualBox.
This method allows you to continue to use your existing hardware while experimenting with the featured enriched Kali Linux in a
completely isolated environment. Best of all everything is free. Both Kali Linux and Oracle VirtualBox are free to use. This tutorial
assumes you have already installed Oracle's VirtualBox on your system and have enabled 64-bit Virtualization via the Bios.
Step 1) Go to https://www.kali.org/downloads/
This will download an OVA image, which can be imported into VirtualBox
Step 2) Open the Oracle VirtualBox Application, and from the File, Menu select Import Appliance
File Menu -> Import Appliance
Step 3) On the following screen "Appliance to Import" Browse to the location of the downloaded OVA file and click Open
Step 4) Once you click Open, you will be taken back to the "Appliance to Import" simply click Next
Step 5) The following screen "Appliance Settings" displays a summary of the systems settings, leaving the default settings is fine. As
shown in the screenshot below, make a note of where the Virtual Machine is located and then click Import.
Step 6) VirtualBox will now Import the Kali Linux OVA appliance. This process could take anywhere from 5 to 10 minutes to
complete.
Step 7) Congratulations, Kali Linux has been successfully installed on VirtualBox. You should now see the Kali Linux VM in the
VirtualBox Console. Next, we'll take a look at Kali Linux and some initial steps to perform.
Step 8) Click on the Kali Linux VM within the VirtualBox Dashboard and click Start, this will boot up the Kali Linux Operating
System.
Step 9) On the login screen, enter "Root" as the username and click Next.
Step 10) As mentioned earlier, enter "toor" as the password and click SignIn.
You will now be present with the Kali Linux GUI Desktop. Congratulations you have successfully logged into Kali Linux.
By default, nmap only scans the first 1000 ports. If you needed to scan the complete 65535 ports, you would simply modify the above
command to include -p-.
Nmap 10.0.2.15 -p-
Nmap OS Scan
Another basic but useful feature of nmap is the ability to detect the OS of the host system. Kali Linux by default is secure, so for this
example, the host system, which Oracle's VirtualBox is installed on, will be used as an example. The host system is a Windows 10
Surface. The host system's IP address is 10.28.2.26.
In the Terminal window enter the following nmap command:
nmap 10.28.2.26 – A
Review results
Adding -A tells nmap to not only perform a port scan but also try to detect the Operating System.
Nmap is a vital utility in any Security Professional toolbox. Use the command nmap -h to explore more options and commands on
Nmap.
What is Metasploit?
The Metasploit Framework is an open source project that provides a public resource for researching vulnerabilities and developing
code that allows security professionals the ability to infiltrate their own network and identify security risk and vulnerabilities.
Metasploit was recently purchased by Rapid 7 (https://www.metasploit.com). However, the community edition of Metasploit is still
available on Kali Linux. Metasploit is by far the world's most used Penetration utility.
It is important that you are careful when using Metasploit because scanning a network or environment that is not yours could be
considered illegal in some instances. In this tutorial, we'll show you how to start Metasploit and run a basic scan on Kali Linux.
Metasploit is considered an advance utility and will require some time to become adept, but once familiar with the application it will
be an invaluable resource.
Metasploit and Nmap
Within Metasploit, we can actually utilize Nmap. In this case, you'll learn how to scan your local VirtualBox subnet from Metasploit
using the Nmap utility we just learned about.
Step 1) On the Applications Tab, scroll down to 08-Exploitation Tools and then select Metasploit
Step 2) A terminal box will open, with MSF in the dialog, this is Metasploit
Step 3) Enter the following command
db_nmap -V -sV 10.0.2.15/24
(be sure to replace 10.0.2.15 with your local IP address)
Here:
db_ stands for database
-V Stands for verbose mode
-sV stands for service version detection
Metasploit Exploit Utility
Metasploit very robust with its features and flexibility. One common use for Metasploit is the Exploitation of Vulnerabilities. Below
we'll go through the steps of reviewing some exploits and trying to exploit a Windows 7 Machine.
Step 1) Assuming Metasploit is still open enter Hosts -R in the terminal window. This adds the hosts recently discovered to
Metasploit database.
Step 2) Enter "show exploits", this command will provide a comprehensive look at all the exploits available to Metasploit.
Step 3) Now, try to narrow down the list with this command: search name: Windows 7, this command searches the exploits which
specifically include windows 7, for the purpose of this example we will try to exploit a Windows 7 Machine. Depending on your
environment, you will have to change the search parameters to meet your criteria. For example, if you have Mac or another Linux
machine, you will have to change the search parameter to match that machine type.
Step 4) For the purposes of this tutorial we will use an Apple Itunes vulnerability discovered in the list. To utilize the exploit, we
must enter the complete path which is displayed in the list: use exploit/windows/browse/apple_itunes_playlist
Step 5) If the exploit is successful the command prompt will change to display the exploit name followed by > as depicted in the
below screenshot.
Step 6) Enter show options to review what options are available to the exploit. Each exploit will, of course, have different options.
Summary
In sum, Kali Linux is an amazing operating system that is widely used by various professionals from Security Administrators, to Black
Hat Hackers. Given its robust utilities, stability, and ease of use, it's an operating system everyone in the IT industry and computer
enthusiast should be familiar with. Utilizing just the two applications discussed in this tutorial will significantly aid a firm in securing
their Information Technology infrastructure. Both Nmap and Metasploit are available on other platforms, but their ease of use and pre-
installed configuration on Kali Linux makes Kali the operating system of choice when evaluating and testing the security of a
network. As stated previously, be careful using the Kali Linux, as it should only be used in network environments which you control
and or have permission to test. As some utilities, may actually cause damage or loss of data.
Features:
It can be used for penetration testing.
This platform is available in 32 bits as well as 64 bits.
Kali Linux can be updated without the need to download a new version.
This OS can encrypt the full disk.
You can easily automate and customize the Kali Linux installation on the network.
Support for USB live installs.
It has a forensics mode that can be used for forensic work.
Link: https://www.kali.org/
2) Parrot OS
Parrot OS is a platform for hacking. It has an easy to use editor for software development. This platform enables you to surf the web
privately and securely. Hackers can use Parrot OS to perform vulnerability assessment, penetration testing, computer forensics, and
more.
Features:
It is available as lightweight software that runs with limited resources.
You can read and change the source code the way you like.
Provides support of experts to help you in cybersecurity.
It has distributed infrastructure with dedicated CDNs (Content Distribution Network).
You can share this operating system with others.
Link: https://parrotlinux.org/
3) BackBox
BackBox is an Ubuntu based open-source Operating System that offers a penetration test and security assessment facility. This system
also provides a network analysis toolkit for security in the IT environment. It contains a toolkit that is needed for ethical hacking.
Features:
It helps you with computer forensic analysis, vulnerability assessment, etc.
Design with accuracy to avoid redundancies.
It consumes the minimum resource of your system.
Provides easy to use the desktop environment.
Enables you to simulate an attack on application or network.
It offers stability and speed.
Link: https://www.backbox.org/
4) BlackArch
BlackArch is a free Linux based platform that contains a wide range of tools for automation, mobile, networking, etc. It is an open-
source Operating System that is specially created for security researchers and penetration testers. You can install it individually or in a
group.
Features:
It offers live ISO (International Organization for Standardization) with multiple window managers.
This operating system can be run using limited resources.
Supports more than one architecture.
The installer can be built from the source.
Link: https://blackarch.org/
6) Dracos Linux
Dracos Linux is an open-source OS that offers penetration testing. It is packed with a wide range of tools, like forensics, information
gathering, malware analysis, and more.
Features:
Everyone can use this platform to study, modify, and redistribute.
Dracos Linux is a fast OS to perform malware analysis.
This OS does not collect your sensitive personal data.
It makes it easy for ethical hackers to perform security research.
Link: https://www.dracos-linux.org/
7) Bugtraq
Bugtraq is an OS that contains a wide range of pen-testing tools, including malware testing tools, mobile forensic tools, etc. It is easy
to use services and products. This environment provides friendly service with innovations. Bugtraq helps hackers to monitor the
system in real time.
Features:
The Bugtraq system offers the most comprehensive, optimal.
It is based on 3.2, and 3.4 kernels
Anyone can use this platform with ease.
Install this platform from a USB drive or live DVD.
Supports numerous languages.
Available in both 32 bit and 64 bits.
Link: http://www.bugtraq-apps.com/
8) CAINE
CAINE is an Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This operating system
can be integrated into existing software tools as a module. It automatically extracts a timeline from RAM.
Features:
It is an open-source project.
CAINE blocks all the devices in read-only mode.
You can integrate this OS into existing software.
An environment supports the digital investigator during the digital investigation.
You can customize features of CAINE.
It offers a user-friendly operating system.
Link: https://www.caine-live.net/
Features:
It is an open-source project
Samurai Web Testing Framework focuses on attacking websites.
It is pre-configured for a web pen-testing environment.
Features that can be used for focusing on attacking the website.
It contains tools like WebScarab (web security application testing tool) and ratproxy (Web proxy server) tool.
Link: http://www.samurai-wtf.org/
Features:
You can easily access open-source network security applications.
It has easy to use WUI (Web User Interface).
Network Security Toolkit can be used as a network security analysis validation.
It contains monitoring on a virtual server having virtual machines.
Link: https://www.networksecuritytoolkit.org/nst/index.html
12) DemonLinux
DemonLinux is a Linux distribution that is used for hacking. It has a lightweight desktop environment. This platform comes with a
dark theme and a user-friendly user interface. DemonLinux helps you to search or open anything by pressing just one key.
Features:
You can instantly search the needed things by pressing the Windows key.
It has a simple dock design (a bar located at the bottom of the OS).
Works with Firefox and Google Chrome.
Easily record desktop or take a screenshot using a quick access menu to save time.
Link: https://www.demonlinux.com/
13) ArchStrike
ArchStrike is an OS that can be used for security professionals and researchers. It follows Arch Linux OS standards to maintain
packages properly. This environment can be used for pen testing and security layer. You can easily install or remove it without any
problem.
Features:
It gives two selection of major view packages and all tracked packages.
This environment includes open source applications for investigation.
It has a hardware detection facility.
Link: https://archstrike.org/
Meta Sploit
Wire Shark
NMAP
John The Ripper
Maltego
4) What are the types of ethical hackers?
The types of ethical hackers are
Grey Box hackers or Cyberwarrior
Black Box penetration Testers
White Box penetration Testers
Certified Ethical hacker
5) What is footprinting in ethical hacking? What is the techniques used for footprinting?
Footprinting refers accumulating and uncovering as much as information about the target network before gaining access into any
network. The approach adopted by hackers before hacking
Open Source Footprinting : It will look for the contact information of administrators that will be used in guessing the
password in Social engineering
Network Enumeration : The hacker tries to identify the domain names and the network blocks of the target network
Scanning : Once the network is known, the second step is to spy the active IP addresses on the network. For identifying
active IP addresses (ICMP) Internet Control Message Protocol is an active IP addresses
Stack Fingerprinting : Once the hosts and port have been mapped by scanning the network, the final footprinting step can be
performed. This is called Stack fingerprinting.
Usage HIDS is used to detect the intrusions. NIDS is used for the network.
What does it It monitors suspicious system activities and traffic of a It monitors the traffic of all device on the
do? specific device. network.
10) Explain SSL
SSL stands for Secure Sockets Layer. It is a technology creating encrypted connections between a web server and a web browser. It is
used to protect the information in online transactions and digital payments to maintain data privacy.
11) What do you mean by data leakage?
Data leakage is an unauthorized transfer of data to the outside world. Data leakage occurs via email, optical media, laptops, and USB
keys.
12) Explain the brute force attack. How to prevent it?
It is a trial-and-error method to find out the right password or PIN. Hackers repetitively try all the combinations of credentials. In
many cases, brute force attacks are automated where the software automatically works to login with credentials. There are ways to
prevent Brute Force attacks. They are:
Setting password length.
Increase password complexity.
Set limit on login failures.
13) What is port scanning?
It is the technique for identifying open ports and service available on a specific host. Hackers use port scanning technique to find
information for malicious purposes.
14) Name the different layers of the OSI model.
Seven different layers of OSI models are as follows:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
15) What is a VPN?
VPN stands for Virtual Private Network. It is a network connection method for creating an encrypted and safe connection. This
method protects data from interference, snooping, censorship.
16) What are black hat hackers?
Black hat hackers are people who have a good knowledge of breaching network security. These hackers can generate malware for
personal financial gain or other malicious reasons. They break into a secure network to modify, steal, or destroy data so that the
network can not be used by authorized network users.
17) What are white hat hackers?
White hat hackers or security specialist are specialized in penetration testing. They protect the information system of an organization.
18) What are grey hat hackers?
Grey hat hackers are computer hacker who sometimes violate ethical standards, but they do not have malicious intent.
19) How to reset a password-protected BIOS configuration?
There are various ways to reset BIOS password. Some of them are as follows:
Remove CMOS battery.
By utilizing the software.
By utilizing a motherboard jumper.
By utilizing MS-DOS.
20) What is MITM attack?
A MITM or Man-in-the-Middle is a type of attack where an attacker intercepts communication between two persons. The main
intention of MITM is to access confidential information.
21) Define ARP and its working process.
It is a protocol used for finding MAC address associated with IPv4 address. This protocol work as an interface between the OSI
network and OSI link layer.
22) Explain botnet.
It's a number of internet-connected devices like servers, mobile devices, IoT devices, and PCs that are infected and controlled by
malware.
23) What is the main difference between SSL and TLS?
The main difference between these two is that SSL verifies the identity of the sender. SSL helps you to track the person you are
communicating to. TLS offers a secure channel between two clients.
24) What is the abbreviation of CSRF?
CSRF stands for Cross-Site Request Forgery.
25) What is 2FA? How to implement it for a public website?
TFA stands for Two Factor Authentication. It is a security process to identify the person who is accessing an online account. The user
is granted access only after presenting evidence to the authentication device.
26) Explain the difference between asymmetric and symmetric encryption.
Symmetric encryption requires the same key for encryption and decryption. On the other hand, asymmetric encryption needs different
keys for encryption and decryption.
27) What is the full form of XSS?
XSS stands for cross-site scripting.
28) Explain WAF
WAF stands for Web Application Firewall. WAF is used to protect the application by filtering and monitoring incoming and outgoing
traffic between web application and the internet.
29) What is hacking?
Hacking is a process of finding weakness in computer or private networks to exploit its weaknesses and gain access.
For example, using password cracking technique to gain access to a system.
30) Who are hackers?
A Hacker is a person who finds and exploits the weakness in computer systems, smartphones, tablets, or networks to gain access.
Hackers are well experienced computer programmers with knowledge of computer security.
31) What is network sniffing?
Network sniffing is a tool used for analyzing data packets sent over a network. This can be done by the specialized software program
or hardware equipment. Sniffing can be used to:
Capture sensitive data such as password.
Eavesdrop on chat messages
Monitor data package over a network
32) What is the importance of DNS monitoring?
Yong domains are easily infected with malicious software. You need to use DNS monitoring tools to identify malware.
33) Define the process of salting. What is the use of salting?
Salting is that process to extend the length of passwords by using special characters. To use salting, it is very important to know the
entire mechanism of salting. The use of salting is to safeguard passwords. It also prevents attackers testing known words across the
system.
For example, Hash("QxLUF1bgIAdeQX") is added to each and every password to protect your password. It is called as salt.
34) What is SSH?
SSH stands for Secure Socket Shell or Secure Shell. It is a utility suite that provides system administrators secure way to access the
data on a network.
35) Is SSL protocol enough for network security?
SSL verifies the sender's identity, but it does not provide security once the data is transferred to the server. It is good to use server-side
encryption and hashing to protect the server against a data breach.
36) What is black box testing and white box testing?
Black box testing: It is a software testing method in which the internal structure or program code is hidden.
White box testing: A software testing method in which internal structure or program is known by tester.
37) Explain vulnerabilities in network security.
Vulnerabilities refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an
application like SaaS (Software as a service) software.
38) Explain TCP Three-way handshake.
It is a process used in a network to make a connection between a local host and server. This method requires the client and server to
negotiate synchronization and acknowledgment packets before starting communication.
39) Define the term residual risk. What are three ways to deal with risk?
It is a threat that balances risk exposure after finding and eliminating threats.
Three ways to deal with risk are:
1. Reduce it
2. Avoid it
3. Accept it.
40) Define Exfiltration.
Data exfiltration refers to the unauthorized transfer of data from a computer system. This transmission may be manual and carried out
by anyone having physical access to a computer.
41) What is exploit in network security?
An exploit is a method utilized by hackers to access data in an unauthorized way. It is incorporated into malware.
42) What do you mean by penetration testing?
It is the process of checking exploitable vulnerabilities on the target. In web security, it is used to augment the web application
firewall.
43) List out some of the common cyber-attack.
Following are the common cyber-attacks which can be used by hackers to damage network:
Malware
Phishing
Password attacks
DDoS
Man in the middle
Drive-by downloads
Malvertising
Rogue software
44) How to make the user authentication process more secure?
In order to authenticate users, they have to provide their identity. The ID and Key can be used to confirm the user's identity. This is an
ideal way how the system should authorize the user.
45) Explain the concept of cross-site scripting.
Cross-site scripting refers to a network security vulnerability in which malicious scripts are injected into websites. This attack occurs
when attackers allow an untrusted source to inject code into a web application.
46) Name the protocol that broadcast the information across all the devices.
Internet Group Management Protocol or IGMP is a communication protocol that is used in game or video streaming. It facilitates
routers and other communication devices to send packets.
47) How to protect email messages?
Use cipher algorithm to protect email, credit card information, and corporate data.
48) What are the risks associated with public Wi-Fi?
Public Wi-Fi has many security issues. Wi-Fi attacks include karma attack, sniffing, war-driving, brute force attack, etc.
Public Wi-Fi may identify data that is passed through a network device like emails, browsing history, passwords, and credit card data.
49) What is Data Encryption? Why it is important in network security?
Data encryption is a technique in which the sender converts the message into a code. It allows only authorized user to gain access.
50) Explain the main difference between Diffie-Hellman and RSA.
Diffie-Hellman is a protocol used while exchanging key between two parties while RSA is an algorithm that works on the basis two
keys called private and public key.
51) What is a remote desktop protocol?
Remote Desktop Protocol (RDP) is developed by Microsoft, which provides GUI to connect two devices over a network.
The user uses RDP client software to serve this purpose while other device must run RDP server software. This protocol is specifically
designed for remote management and to access virtual PCs, applications, and terminal server.
52) Define Forward Secrecy.
Forward Secrecy is a security measure that ensures the integrity of unique session key in event that long term key is compromised.
53) Explain the concept of IV in encryption.
IV stands for the initial vector is an arbitrary number that is used to ensures that identical text encrypted to different ciphertexts.
Encryption program uses this number only once per session.
54) Explain the difference between stream cipher and block cipher.
How does it work? Stream cipher operates on small plaintext units Block cipher works on large data blocks.
Usage Stream cipher is used to implement hardware. Block cipher is used to implement software.
55) Give some examples of a symmetric encryption algorithm.
Following are some examples of symmetric encryption algorithm.
RCx
Blowfish
Rijndael (AES)
DES
56) What is the abbreviation of ECB and CBC?
The full form of ECB is Electronic Codebook, and the full form of CBC is Cipher Block Chaining.
57) Explain a buffer overflow attack.
Buffer overflow attack is an attack that takes advantage of a process that attempts to write more data to a fixed-length memory block.
58) Define Spyware.
Spyware is a malware that aims to steal data about the organization or person. This malware can damage the organization's computer
system.
59) What is impersonation?
It is a mechanism of assigning the user account to an unknown user.
60) What do you mean by SRM?
SRM stands for Security Reference Monitor provides routines for computer drivers to grant access rights to object.
61) What is a computer virus?
A virus is a malicious software that is executed without the user's consent. Viruses can consume computer resources, such as CPU
time and memory. Sometimes, the virus makes changes in other computer programs and insert its own code to harm the computer
system.
A computer virus may be used to:
Access private data like user id and passwords
Display annoying messages to the user
Corrupt data in your computer
Log the user's keystrokes
62) What do you mean by Authenticode?
Authenticode is a technology that identifies the publisher of Authenticode sign software. It allows users to ensure that the software is
genuine and not contain any malicious program.
63) Define CryptoAPI
CryptoAPI is a collection of encryption APIs which allows developers to create a project on a secure network.
64) Explain steps to secure web server.
Follow the following steps to secure your web server:
Update ownership of file.
Keep your webserver updated.
Disable extra modules in the webserver.
Delete default scripts.
65) What is Microsoft Baseline Security Analyzer?
Microsoft Baseline Security Analyzer or MBSA is a graphical and command-line interface that provides a method to find missing
security updates and misconfigurations.
66) What is Ethical hacking?
Ethical hacking is a method to improve the security of a network. In this method, hackers fix vulnerabilities and weakness of computer
or network. Ethical hackers use software tools to secure the system.
67) Explain social engineering and its attacks.
Social engineering is the term used to convince people to reveal confidential information.
There are mainly three types of social engineering attacks: 1) Human-based, 2) Mobile-based, and 3) Computer-based.
Human-based attack: They may pretend like a genuine user who requests higher authority to reveal private and confidential
information of the organization.
Computer-based attack: In this attack, attackers send fake emails to harm the computer. They ask people to forward such
email.
Mobile-based attack: Attacker may send SMS to others and collect important information. If any user downloads a malicious
app, then it can be misused to access authentication information.
68) What is IP and MAC Addresses?
IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device
such as printers, storage disks on a computer network.
MAC Address is the acronym for Media Access Control address. MAC addresses are used to uniquely identify network interfaces for
communication at the physical layer of the network.
How they infect a It inserts malicious code into a specific file or Generate it's copy and spread using email client.
computer? program.
Dependency Virus need a host program to work They do not require any host to function
correctly.
Linked with files It is linked with .com, .xls, .exe, .doc, etc. It is linked with any file on a network.
Infrastructure
Here, are important Cloud certification for CompTIA:
CompTIA Cloud + certification:
The cloud certification will help you to perform security or networking functions on cloud platforms. This is the only vendor-neutral
certification that will validate your skills to maintain and optimize your cloud infrastructure services.
Link: https://www.comptia.org/certifications/cloud
CompTIA Linux + certification
The CompTIA Linux certification is beneficial to all the IT professionals who work on Linux in their organizations. Many enterprises
are using Linux in the cloud platform, cybersecurity, mobile applications, web applications, and administration of mobile and web
apps.
Link: https://www.comptia.org/certifications/linux
CompTIA Server + certification
The server certification is the only industry certification that covers the latest server technologies like virtualization, storage, security,
and troubleshooting. This certification validates your skills as a server administrator. This certification will help you to understand the
server architecture, implement network data security to servers, and support storage devises.
Link: https://www.comptia.org/certifications/server
Additional Certifications
Here, are some other important CompTIA certification
CompTIA Project + certification:
The project certification is useful for all the managers or business professionals who manage small to mid-sized projects in their
organizations, which are not very complicated. Apart from managerial skills, you will learn a few project management techniques
required to handle small to mid-sized projects with this certification program.
Link: https://www.comptia.org/certifications/project
CompTIA CTT + Certification
The certified technical trainer certification imparts all the skills needed to train a group. The certification validates the knowledge of
the tools and techniques required to be a trainer. You will be an effective communicator and learn to manage classroom training,
conduct exams, with confidence before a large group of audience.
Link: https://www.comptia.org/certifications/ctt
CompTIA Cloud Essentials
The cloud essentials certification is for business professionals who are new to IT concepts and understand the essential cloud
principles. This course is useful to all the non-IT professionals whose enterprise is planning to adapt to the cloud platform and manage
vendor relationships.
Link: https://www.comptia.org/certifications/cloud-essentials
Hacking: The Art of Exploitation is a book written by Jon Erickson. In this book, you will learn the fundamentals of C programming
from a hacker's perspective.
You will also know hacking techniques like overflowing buffers, hijacking network communications. You will also learn about
bypassing protections, exploiting, etc. The book will give a complete picture of programming, network communications, etc.
Check Latest Price and User Reviews on Amazon
2) The Hacker Playbook 2: Practical Guide to Penetration Testing
The Hacker Playbook provides them their game plans. Written by Peter Kim. This ethical hacking book is a step-by-step guide that
teaches you plenty of hacking features. It also offers hands-on examples and helpful advice from the top of the field.
This book includes the latest attacks, tools, and lessons learned. This certified ethical hacking guide further outlines building a lab.
The book walks through test cases for attacks and provides more customized code.
Check Latest Price and User Reviews on Amazon
3) The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook is a book written by Dafydd Stuttard. The book explores the various new technologies
employed in web applications. The book teaches you advanced hacking attack techniques that have been developed, particularly to the
client-side.
The book also covers new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, frame busting, hybrid file
attacks, and more. This book is the most current resource. On the critical topic about discovering, exploiting, and it also preventing
web apps and security flaws.
Check Latest Price and User Reviews on Amazon
4) Penetration Testing – A Hands-On Introduction to Hacking
In Penetration Testing, a security expert, researcher, and trainer is written by Georgia Weidman. The book introduces you to the
necessary skills and techniques that every pentester needs.
You will also learn about forcing and wordlists, test web applications for vulnerabilities, Automate social-engineering attacks, bypass
antivirus software. You will gather advanced information like how you can turn access to one machine into total control of the
enterprise.
Check Latest Price and User Reviews on Amazon
The Basics of Hacking and Penetration Testing is written by Patrick Engebretson. It serves as an introduction to the steps needed to
complete a penetration test to perform an ethical hack from start to end.
The book teaches students how they can utilize and interpret the hacking tools required to complete a penetration test. Every chapter in
this book contains examples and exercises that are designed to teach learners how to interpret results and utilize those results.
Check Latest Price and User Reviews on Amazon
6) Computer Hacking Beginners Guide
Computer Hacking Beginners Guide teaches you how to protect yourself from the most common hacking attacks by knowing how
hacking works! You should stay ahead of any criminal hacker to learn these techniques you can read this book.
This book covers methods and tools that are used by both criminal and ethical hackers. All the topics you will find here will show you
how information security can be compromised and how you can find cyber attacks in a system. Which you are trying to protect.
Check Latest Price and User Reviews on Amazon
Hackers & Painters: Big Ideas is a book written by Paul Graham. This hacking book will have a powerful impact on how we think,
how we work, how we develop technology, and how we live.
The book includes topics like the importance of software design, how to make wealth, programming language renaissance, digital
design, internet startups, etc.
This book includes the importance of beauty in software design, how to make wealth, the programming language renaissance, the
open-source movement, digital design, etc.
Check Latest Price and User Reviews on Amazon
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali Linux and Metasploit.
The book allows you to integrate social engineering, programming, and vulnerability exploits. The book offers a multidisciplinary
approach for targeting and compromising high-security environments.
It also contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples using
VBA, C, Java, JavaScript, etc.
Check Latest Price and User Reviews on Amazon
9) Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
Hacking: Computer Hacking, Security Testing is a book written by Gary Hall. This book goes all the way from the basic concept
principles to the intricate techniques methods. It is written, which suits both beginners and advanced learning.
This ethical hacking book uses a language that beginners can understand, without leaving out the intricate details required for
computer hacking. This book is an ideal reference book to know how to hack and how to protect your devices.
Check Latest Price and User Reviews on Amazon
10) The Hardware Hacker: Adventures in Making and Breaking Hardware
The Hardware Hacker is a book written by Andre Huang. The author shares his experiences in manufacturing and open hardware. It
allows you were creating an illuminating and compelling career retrospective.
This collection of personal essays and interviews covers topics related to reverse engineering to a comparison of intellectual property.
It includes practices between, and society into the tapestry of open hardware.
This book is highly detailed passages on manufacturing and comprehensive. You can take on the issues related to open-source
hardware.
Check Latest Price and User Reviews on Amazon
BackTrack 5 Wireless Penetration Testing Beginner's Guide is a book by Packt's publishers. With the help book, you will grasp the
concepts and understand the techniques to perform wireless attacks in your lab.
In this ethical, every new attack is described. The book gives this information in the form of a lab exercise with rich illustrations of all
the steps associated. You will practically implement various attacks in your organization.
Check Latest Price and User Reviews on Amazon
12) Hacking: The Underground Guide to Computer Hacking
Hacking: The Underground Guide to Computer Hacking is a book written by Abraham K White. This book offers the best tools for
Hacking and points out ways to protect your systems. The book provides instructions with command prompts.
The book covers topics like Hacking into Wireless Networks, Ethical Hacking, Cracking Encryption. You will also learn about other
Wireless Hacking Resources and various other subjects related to Hacking.
Check Latest Price and User Reviews on Amazon
13) Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker book is written by Roger A. Grimes. It takes you inside the world of cybersecurity. It shows you what goes on
behind the scenes and introduces you to the men and women on the front lines.
The book contains information form the world's top white hat hackers, security researchers, writers, and leaders. This book
introducing the people and practices that help keep our world secure.
Check Latest Price and User Reviews on Amazon
14) Gray Hat Hacking: The Ethical Hacker's Handbook
Gray Hat hacking the book featuring 13 new chapters. This book helps you to fortify your network and avert digital and catastrophe
with proven methods from a team of security experts.
You will also learn the latest ethical hacking skills and tactics. It also offers field-tested remedies, case studies, etc. This book helps
explains how hackers gain access and overtake different network devices.
Check Latest Price and User Reviews on Amazon
The Hash Crack: Password Cracking Manual is written by Joshua Picolet. It is an expanded reference book for password recovery
(cracking) methods, tools, and analysis techniques.
A compilation of basic and advanced methods to penetration testers and network security professionals. It helps you to evaluate the
network security of their organization. The Hash Crack manual book contains syntax and examples.
Check Latest Price and User Reviews on Amazon
16) Mastering Hacking (The Art of Information Gathering & Scanning)
Mastering hacking is a book written by Harsh Bothra. By using this book, you would be able to learn about the modern Penetration
Testing Framework.
It also teaches techniques, discovering all types of vulnerabilities, patching, and more. This book aims to provide the best practices
and methodology in the simplified approach. It would help both the technical and non-technical readers.
Check Latest Price and User Reviews on Amazon
MUST KNOW HACKING!
10 Most Common Web Security Vulnerabilities.........................................................................................................................................1
Top 30 Bug Bounty Programs in 2021........................................................................................................................................................6
Kali Linux Tutorial: What is, Install, Utilize Metasploit and Nmap.........................................................................................................10
13 BEST Operating System for Hacking in 2021.....................................................................................................................................30
Top 25 Ethical Hacking Interview Questions and Answers......................................................................................................................34
Top 110 Cyber Security Interview Questions & Answers........................................................................................................................38
CompTIA Certification Guide: Career Paths & Study Material...............................................................................................................47
16 BEST Ethical Hacking Books (2021 Update)......................................................................................................................................51