Linux hacking guide for beginners
Hackercool Magazine
by kanishka10
1w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about Linux hacking. It comes under gaining access, third of the 5 phases of ethical hacking. What is Linux hacking? Although Linux hacking can be generalized as any type of hacking attempt made on Linux systems, gaining initial access to the Linux system can be […] The post Linux hacking guide for beginners appeared first on Hackercool Magazine ..read more
Visit website
Windows hacking guide for beginners
Hackercool Magazine
by kanishka10
1w ago
Hello, aspiring ethical hackers. This article is a beginners guide for Windows hacking. It comes under gaining access, third of the 5 phases of ethical hacking. What is Windows hacking? Although Windows hacking can be generalized to any hacking performed on the Windows operating system, gaining initial access to the Windows systems is known as […] The post Windows hacking guide for beginners appeared first on Hackercool Magazine ..read more
Visit website
Covering tracks in ethical hacking
Hackercool Magazine
by kanishka10
2w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about covering tracks which is the last of the 5 phases of ethical hacking. What is Covering tracks? Covering tracks or clearing tracks is the phase of ethical hacking in which a hacker tries to erase all the evidence on the target system that can […] The post Covering tracks in ethical hacking appeared first on Hackercool Magazine ..read more
Visit website
Maintaining access in ethical hacking
Hackercool Magazine
by kanishka10
2w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about maintaining access in ethical hacking. Maintaining access is the fourth phase in the total 5 phases of ethical hacking. In this phase, hackers try to hold on to the initial access or foothold they have gained on the network. This is done using various […] The post Maintaining access in ethical hacking appeared first on Hackercool Magazine ..read more
Visit website
5 phases of ethical hacking for beginners
Hackercool Magazine
by kanishka10
2w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn what is ethical hacking and the 5 phases of ethical hacking. What is Ethical Hacking? Ethical hacking is hacking that is performed while following the ethics and rules. It is a procedure of detecting vulnerabilities and weaknesses in the target organization’s network and exploiting them […] The post 5 phases of ethical hacking for beginners appeared first on Hackercool Magazine ..read more
Visit website
Gaining access in ethical hacking: Techniques
Hackercool Magazine
by kanishka10
2w ago
Hello, aspiring ethical hackers. This article is a beginner guide to gaining access. Gaining access is the third phase in ethical hacking after footprinting and scanning & enumeration. It should be noted that the earlier two phases will play a major role in gaining access. This blogpost will explain you about different ways in which […] The post Gaining access in ethical hacking: Techniques appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to shells in hacking
Hackercool Magazine
by kanishka10
3w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about the most basic BUT most important concept in ethical hacking. What is it? What else, SHELLS. Shells in hacking or ethical hacking are a very important topic because any hack or pen test is not considered complete without acquiring a shell. But what exactly […] The post Beginners guide to shells in hacking appeared first on Hackercool Magazine ..read more
Visit website
Cewl wordlist generator: Complete guide
Hackercool Magazine
by kanishka10
1M ago
Hello, aspiring ethical hackers. This blogpost is a complete guide to Cewl wordlist generator. Cewl stands for Custom Word List generation. It is written in ruby language. Unlike crunch that takes input from us to generate a wordlist, this tool spiders a given website to the depth specified by us and then creates a dictionary […] The post Cewl wordlist generator: Complete guide appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to Firewalls
Hackercool Magazine
by kanishka10
1M ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about Firewalls. A firewall is a software or a hardware device that acts as a wall between the internet and the internal networks or between any two networks. The main purpose of the firewall is to prevent malicious traffic from entering the internal network. Based […] The post Beginners guide to Firewalls appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to IP spoofing
Hackercool Magazine
by kanishka10
1M ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about IP spoofing or IP address spoofing. To understand IP spoofing, you need to first understand what is an IP address? What is an IP address? Every house has an address no matter in which nation it is around the world. This address helps in […] The post Beginners guide to IP spoofing appeared first on Hackercool Magazine ..read more
Visit website

Follow Hackercool Magazine on FeedSpot

Continue with Google
Continue with Apple
OR