hey here, click on those to learn more...
WARNING..
welcome, here is the website for hackers ,the intention of this website is to provide extreme white hat hacking skills..don't misuse the tips and tricks..This website is only for educational purpose. Misuse of this information may lead to prison .. This website or the author of this website is not responsible for any kind of unethical activities being performed by the users..By signing up or by entering into the website it means that you had agreed to the terms and conditions .Misuse of this information may fine you....
CLICK HERE TO KNOW THE TERMS AND CONDITIONS
before getting started..lets know what is hacking...
hacking is basically known as the art of exploitation....hacking actually means identifying the vulnerability or weakness in the system and gaining access to the computer system without the administrators knowledge ..once you have done ..that's it now,the computer is yours..you can upload files or download files ..and you can do anything you want..
basically there are 4 different types of hackers..
1 > white hat hacker:-The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems
2 > black hat hacker:-A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. They are computer security hackers that break into computers and networks or also create computer viruses. The term “black hat” comes from old westerns where the bad guys usually wore black hats and the good guys wore white ones.
3 > grey hat hacker:-The term "grey hat", "greyhat" or "gray hat" (gureihato) refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
4 > script kiddies:-the script kiddie is the one who hacks the system using ready made tools available on the internet..they dont know actuall functions of code ..or code language..without any knowledge they use some malicious codes and crash the systems..these are known as most dangerous hackers..in the hacking community..
introduction to ethical hacking
so , as mentioned at the beginning of this website black hat hacking is an illegal activity which is not supported or encouraged by the government , if a person hacks computers without the permission of the govt officials or the company owners, he/she will be punished or imprisoned. so by this reason the website provides you a legal way of hacking that is knowledge of ethical hacking . in this type of hacking you will learn how to penetrate the computers , so for that you will have to learn about what is penetration testing .? penetration testing is an ethical way of hacking attack . basically it aims to test the security and defenses of a computer network and tries to find the loop holes that hackers could find and exploit.so in this case we the white hat hackers try to penetrate the system, it means we find the loop holes or vulnerabilities in a computer network or a system and patch them . so once when the ethical hacker finds (here the term "ethical hacker and white hat hacker means the same)the weakness they will submit their findings and recommendations to the administrator / owner . penetration is basically done for cyber-security purposes in an attempt to find the ways to enter the network . as an ethical hacker you have to always get permissions from the person or company you are targeting .
​
types of penetration testing
​
* grey box testing :- here you will get a partial information about the website you are going to hack .
the information which is provided to you would be like architectural diagrams , credentials , etc
​
* white box testing:- in this case you will be given a wide range of information ti test including systems like source codes , ip addresses to perform an attack from an internal source..
​
* black box testing:- this is when the tester is completely in the dark and dose not know what he is doing . here the hacker needs to gain information about the victim individually and he has to penetrate the computer network.this type of hack is done by the black hat hackers.
​
​
so now lets come to the concept how to
perform a penetration test
​
just like your school assignment or project hacking requires you to create and execute plans. while performing a test , you need to analyze , investigate and solve the problems.so to do that you have to follow the mentioned steps-
* 1) Reconnaissance :- Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The Hacker seeks to find out as much information as possible about the target or the phase of gathering information on the source by contacting the machines in the network and attempting to possibly extract information .
* 2) Scanning :- Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the information discovered during reconnaissance and using it to examine the network. Scanning involves steps such as intelligent system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker can use different automated tools to discover system vulnerabilities.
​
* 3) Gaining Access:- This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the Hacker uses for an exploit can be a local area network, local access to a PC, the Internet, or offline. Gaining access is known in the Hacker world as owning the system. During a real security breach it would be this stage where the Hacker can utilize simple techniques to cause irreparable damage to the target system.
​
* 4) Maintaining Access :-once the hacker has gained access to the network he has to maintain persistence to the network so that he could re connect to the network when ever the penetrator wants. The attacker can use automated scripts and automated tools for hiding attack evidence and also to create backdoors for further attack.
* 5) Clearing Tracks:-In this phase, once Hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. At present, many successful security breaches are made but never detected. This includes cases where firewalls and vigilant log checking were in place.
​
* 6) your schedule for performing penetration :-
this point plays an important role in hacking filed.
you have to choose your timing like would you like to perform the attack while the target is busy. or do you like to perform the test at night so that the target wont be effected financially.
* 7) exploit launching :- after these vulnerabilities have been identified it is time to test the exploits that are most likely going to give an intruder access to the system leading to a serious breach.
​
* 8) document everything :- after finishing your penetration test document each systems loop hole and result them i mean document them in an order .
​
* 9)submit:- once you are done with the following above steps you have to submit these details to your clients.
​
the hacking machine
Raspberry pi 3
Raspberry Pi B+ Trailer
THIS IS RASPBERRY PI 3 MODEL B . THIS IS BASICALLY A HACKING MACHINE . YES , IT IS A PORTABLE HACKING MACHINE . YOU CAN INSTALL ANY KIND OF OPERATING SYSTEM YOU LIKE , I PREFER YOU TO INSTALL KALI LINUX AS A HACKER YOU HAVE TO MAINTAIN ANONYMITY , SO YOU CANNOT TAKE YOUR LAPTOPS AND COMPUTERS OUTSIDE YOUR ROOMS . OF COURSE A LAPTOP IS PORTABLE BUT IT IS NOT THAT MUCH PORTABLE WHICH COULD FIT YOU FINGERS RIGHT..SO HERE IS THE MACHINE FOR YOU TAKE IT INSTALL KALI LINUX AND ROCK ON . CLICK ON THE BUTTON TO DOWNLOAD KALI LINUX ISO IMAGE FOR YOUR MACHINE..
​
INSTALLING KALI LINUX
(CLICK ON THIS TO KNOW WHAT IS KALI LINUX)
BUY RASPBERRY PI 3 FROM HERE ..
BUY BOTH SCREEN AND MOTHER BOARD
​