Author : Wali Khan Kakar
Publisher : Wali Khan Kakar
ISBN 13 :
Total Pages : 752 pages
Book Rating : 4.8/5 (646 download)
Book Synopsis Kakar Cybersecurity by : Wali Khan Kakar
Download or read book Kakar Cybersecurity written by Wali Khan Kakar and published by Wali Khan Kakar. This book was released on 2022-01-01 with total page 752 pages. Available in PDF, EPUB and Kindle. Book excerpt: Contents Disclaimer!…………………………………………….. 18 Warning!……………………………………………….. 19 How to install Oracle VM VirtualBox…………. 20 VirtualBox needs the Microsoft Visual C++ 2019 Redistributable ………………………………. 22 How to install the Kali Linux …………………….. 24 How to install Kali Linux on VMware…………. 29 Install the Kali Linux ISO file in the VMware. 32 Kali Linux commands………………………………. 36 What are Daemons in Linux? & How to Run Daemon Process…………………………………….. 45 How to Install Tor Browser in Kali Linux…….. 46 Twitter Brute force (tweetshell)……………….. 48 Find All Social Media Accounts Using a Single Username ……………………………………………… 50 How to find website vulnerabilities in Kali Linux……………………………………………………… 53 Running Firefox as root in a regular user’s session is not supported. ($XAUTHORITY is 4 /home/kali/. Xauth ority which is owned by Kali.) ……………………………………………………… 57 How to secure Web server from hackers ….. 59 Dark Web Installation……………………………… 61 How to Crate Dark Web Website……………… 65 Linux Security: Securing Linux using UFW (Uncomplicated Firewall) ………………………… 69 Nmap ……………………………………………………. 71 Nmap Discovery Options…………………………. 75 Basic Scanning Techniques in the Nmap……. 76 Firewall Bypass — How to Do No-Ping Scan with NMAP…………………………………………….. 77 Network Hacking using NMAP Scanning……. 78 Kali Linux login bypass…………………………….. 82 DNS Spoofing …………………………………………. 85 How Hackers Use DNS Spoofing to Hack Systems…………………………………………………. 92 Apache2 Server…………………………………….. 100 If not work try this code ………………………. 101 5 HoneyPot…………………………………………….. 102 Track Location (Seeker)…………………………. 105 Ngrok Installation …………………………………. 117 Browser Hacking using BeEF (Browser Exploitation Framework) [For Beef don’t use Root permissions)…………………………………. 121 Exif Tool (Information Gathering Tool) ……. 137 How to Secure Your Systems and Servers | WAF and OWASP………………………………….. 138 Capturing and Analyzing Network Packets with Wireshark…………………………………………….. 141 Hacking Tools — Install Hacking Scripts, Tools, and Wordlists……………………………………….. 142 Initramfs Problem…………………………………. 153 Increase Internet Speed in Kali Linux ………. 155 NetBIOS Enumeration | How to Perform Enumeration of NetBIOS ……………………….. 158 Install Metasploitable 2 on Virtual Machine159 Bash Shell Scripting: Intro to File and Permissions………………………………………….. 163 6 Bug Bounty ………………………………………….. 165 Censys Discovery and Automation………….. 168 Website Footprinting ……………………………. 173 Footprinting Techniques (DNS, WHOIS) ….. 180 Facebook Information Gathering……………. 182 Scan the WordPress Vulnerabilities………… 184 Or ……………………………………………………… 185 Fraud Exposed | How to Expose a Scammer …………………………………………………………… 188 How to Hack WhatsApp QRL Jacking Exploitation Framework in Kali Linux ………. 189 How to Hack Webcam, Microphone and get Mobile Location using a Link ………………….. 195 Or ……………………………………………………… 200 How to Enumerate DNS? | Domain Name System ………………………………………………… 204 How to Enumerate SNMP ……………………… 205 Web Cam Hacking using CamPhish…………. 209 7 NIKTO Web vulnerability scanner tool for Kali Linux……………………………………………………. 212 Practically Perform Vulnerability Assessment (OWASP ZAP) ……………………………………….. 213 MAC Changer in Shell Scripting………………. 216 How to Enumerate NetBIOS…………………… 224 How to Enumerate NFS (Network File System) …………………………………………………………… 226 E: dpkg was interrupted, you must manually run ‘sudo dpkg — configure -a’ to correct the problem. ……………………………………………… 230 Shared Clipboard Text Windows to Kali Linux host in Virtual Box | Copy, and Paste Windows to Kali Linux………………………………………….. 231 How to avoid anonymity leaks? Stay anonymous………………………………………….. 233 Remotely Control an Android Device………. 237 Find someone’s social media profile, email, and domain using OSiNT Tool ………………… 238 8 How to Create a Remote Access Trojan (RAT) …………………………………………………………… 239 Enumeration — How to Enumerate SMTP…. 241 How to Change Private IP using Shell Program …………………………………………………………… 243 Clear All Logs from Windows and Linux…… 248 Monitor Mode Switcher Using Shell Scripting …………………………………………………………… 250 How to Remove Rootkits from Our Devices253 Advanced Hacking with Nmap ……………….. 254 How to Remove Cache Files…………………… 255 How to Create Payload………………………….. 256 How Hackers Hack Your Phone Remotely… 260 How to Perform DoS Attack …………………… 266 DOS Attack — Crash Linux and Android in just 2 lines of code…………………………………………. 267 DOS Attack in the Metasploitable2 Machine (Crash the Metasploitable2 Machine) …….. 270 GoldenEye DOS Attack ………………………….. 272 9 How to Perform DDoS Attacks……………….. 275 How are DoS and DDoS Attacks Performed? …………………………………………………………… 276 Install and use GR-GSM…………………………. 278 Password Protect GRUB Boot Loader ……… 282 What is Podman? Use Kali Linux on Windows 11 ……………………………………………………….. 286 How Hackers Can Own Your System……….. 289 CSI Installation | A Perfect OS for Cyber Security and Cyber Crime Investigation…… 293 Setup Web Pentesting Lab for Bug Hunting 295 How to go deep to find vulnerabilities | Bug Bounty hunting …………………………………….. 297 Sock Puppet — hackers’ technique for OSINT …………………………………………………………… 299 How to install Spiderfoot……………………….. 302 How to find social media accounts by username…………………………………………….. 304 Mapping Social Media Profiles with Facial Recognition using Social Mapper……………. 306 10 Trape: easily track location, IP, OS, Browser of people, and browser hooking ………………… 309 Recon-ng Web Reconnaissance Framework | Trace location, Pushpin, Images……………… 310 HTTrack website copier: How to clone any website | and extract website data ………… 312 How to easily setup web Pentesting lab on localhost for bug bounty ……………………….. 313 Hollywood-style terminal emulator………… 316 Fully Anonymize Your System with Tor Network Gateway using Nipe…………………. 319 METADATA (Hidden information of website download public documents)…………………. 321 Create a static name for the dynamic IP address for access localhost from anywhere …………………………………………………………… 322 Host your own fast OSiNT username search web-server…………………………………………… 329 Social Engineering Toolkit (SET) ……………… 332 11 Discover and extract hostnames of target IP addresses…………………………………………….. 333 Information Gathering | DNS-ENUM………. 335 Information gathering | DNS-RECON………. 337 Information Gathering | IDS and IPS Identification — lbd ……………………………….. 339 Information Gathering | IDS and IPS Identification — wafw00f ………………………… 340 Website’s deep information gathering using Dmitry …………………………………………………. 342 Website nameserver information nslookup343 whois lookup………………………………………… 344 Metasploit……………………………………………. 345 What is the Payload………………………………. 347 Lynis: Perform Security Auditing and Vulnerability Analysis…………………………….. 358 Enhancing Linux Security with Lynis………… 359 Bettercap Framework……………………………. 373 How to investigate an Email ID ………………. 381 12 Netcat | Swiss army knife of hacking tools. 384 Master of hacker tool to perfectly scan any website | Masscan ……………………………….. 385 Mobile Security Framework …………………… 387 How hackers gather target’s information… 389 Easily expose your localhost services to the Internet……………………………………………….. 394 Stay Anonymous online like a pro…………… 396 How do Hackers Hack Websites? — Acunetix Pro Tool……………………………………………….. 398 Twitter OSINT (Open-Source Investigation) 404 Breaking SERVER Systems using MySQL ….. 406 Easy way to find SQL Injection via SQL Finder | Bug bounty hunting………………………………. 411 SQL Injection with Sqlmap | How to use Sqlmap | Web App Penetration Testing ….. 418 Cmatrix………………………………………………… 422 Show Neofetch on Kali Linux Terminal ……. 423 How Hackers Exploit SSH to Hack Your System? | System Hacking using SSH………. 425 13 How Hackers Remotely Hack Any Device using FTP ……………………………………………………… 432 Hack Systems: How to use Netcat Commands with Examples?…………………………………….. 437 How Hackers Access Systems through Samba (Hack Like a Pro)…………………………………… 442 Capture the User name and Password in the tcpdump. …………………………………………….. 446 Download Nessus (vulnerability scanner)… 448 Nmap scanning for Network Hacking ……… 452 Basic to Advanced Network Scanning | Checking Live Systems, Open Ports and Services……………………………………………….. 454 Find the website Subdomain names……….. 462 How to find website’s subdomains | Subdomains Enumeration……………………… 464 Easy way to find Subdomain via Subfinder. 467 Complete Anonymous Settings (Proxy, VPN, and MAC Address) in Your Computer……… 471 14 Host Discovery Scan — NMAP Network Scanning………………………………………………. 486 Port Forwarding: Access Computer from Anywhere…………………………………………….. 487 Remote Desktop Attack: How Hacker Hack System Remotely using VNC ………………….. 491 Types of System Hacking ……………………… 492 Methodology of System Hacking ………….. 492 Creating a Payload with Msfvenom ………… 499 Netcat …………………………………………………. 502 Loki — Simple IOC and YARA Scanner……….. 504 System Hacking using NFS (Network File System) ……………………………………………….. 505 Linux File System ………………………………….. 512 Guymager ……………………………………………. 513 Install the Caine OS in the Virtual Box……… 520 Install the Caine OS in the VMware Workstation…………………………………………. 523 Install the Zphisher……………………………….. 525 15 The Harvester………………………………………. 531 Hack CCTV Camera ……………………………….. 532 Unmet dependencies. Try ‘apt — fix-broken install’ with no packages (or specify a solution)………………………………………………. 535 How to Install wlan0 in the Kali Linux — Not showing Wlan0 …………………………………….. 536 How to install a Wireless Adapter in the Kali Linux……………………………………………………. 540 What is Metagoofil | How to install and use metagoofil | Information gathering tools… 543 How to enable or disable the root user in the Kali Linux ……………………………………………… 544 How to create an Automate Pentest Report | APTRS Automate Pentest Report Generator …………………………………………………………… 546 DNS Cache Poisoning Attack ………………….. 553 How to hide data in image file — Steganography …………………………………………………………… 557 Features:……………………………………………. 557 16 How to manually update Metasploit in the Kali Linux……………………………………………………. 561 Install John the Ripper in the Kali Linux …… 564 Install the Hashcat in the Kali Linux…………. 566 Hydra ………………………………………………….. 568 Install Hydra in the Kali Linux …………………. 570 Dictionary Attack using Hydra………………… 571 Brute-Force services [FTP] using Hydra | Dictionary Attack using Hydra………………… 572 Hydra Brute Force ………………………………… 577 How to connect Kali Linux with Metasploitable2 Machine ……………………… 582 How to check user login history in Kali Linux | Checking last logins with last logs…………… 586 Rainbow Tables, recover password Hashes, Generate Rainbow table in the Kali Linux … 588 OpenVPN and connect with TryHackMe using Kali Linux ……………………………………………… 591 How to install Kali Nethunter in Mobile…… 595 17 Uncovering security flaws in Apache Tomcat …………………………………………………………… 603 What is Tomcat?…………………………………. 603 Types of system hacking:……………………… 604 Methodology of system hacking: ………….. 604 Kernel panic — not syncing: VFS: Unable to mount root fs on unknown-block (0,0)……. 615 Website hacking using PHP configuration .. 618 Get remote access to your hacking targets (Reverse Shell hacking)………………………….. 624 Firewall Bypass — size modification | Nmap629 Bad Checksum (Firewall Bypass) — Nmap Scanning………………………………………………. 632 Firewall Bypass — Source Port | Nmap…….. 633 Install the dcfldd Digital Forensics ………….. 634