Hackercool Magazine
670 FOLLOWERS
Articles cover Forensics, Hacking, Installations, Networking, Server, Tweaking, and Vulnerabilities. A monthly magazine designed for absolute beginners and cybersecurity experts, dedicated to advanced penetration testing & practical ethical hacking in real-world hacking scenarios.
Hackercool Magazine
1d ago
Hello, aspiring ethical hackers. This blogpost is a detailed guide on Linux privilege escalation. Linux privilege escalation comes after Linux hacking and is part of Post-exploitation of Linux. What is Linux privilege escalation? Linux privilege escalation is the process of elevating privileges on a Linux system after successfully gaining access to a Linux system. Why is it important? Linux hacking is […]
The post Linux privilege escalation for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
3d ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about Windows privilege escalation. Windows privilege escalation comes after Windows hacking and is part of Post-exploitation of Windows. What is Windows privilege escalation? Windows privilege escalation is the process of elevating privileges on a Windows system after successfully gaining access to a Windows system. Why […]
The post Windows privilege escalation for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
3d ago
Hello, aspiring ethical hackers. This blogpost is a beginner guide to IDS (Intrusion Detection System) and IPS (Intrusion Preventions System). IDS and IPS are two of the security technologies used for securing the network of any organization from hackers. What is an IDS and what is an IPS? Intrusion Detection system (IDS) is an appliance […]
The post Beginners guide to IDS and IPS appeared first on Hackercool Magazine ..read more
Hackercool Magazine
5d ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about POST-exploitation. POST-exploitation comes after the phase of gaining access in ethical hacking. What is POST-exploitation? POST- exploitation refers to all the operations that are performed after gaining initial access on the target system. It is done to further gain control of the target system […]
The post POST-exploitation for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
3w ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about Linux hacking. It comes under gaining access, third of the 5 phases of ethical hacking. What is Linux hacking? Although Linux hacking can be generalized as any type of hacking attempt made on Linux systems, gaining initial access to the Linux system can be […]
The post Linux hacking guide for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
3w ago
Hello, aspiring ethical hackers. This article is a beginners guide for Windows hacking. It comes under gaining access, third of the 5 phases of ethical hacking. What is Windows hacking? Although Windows hacking can be generalized to any hacking performed on the Windows operating system, gaining initial access to the Windows systems is known as […]
The post Windows hacking guide for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
1M ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about covering tracks which is the last of the 5 phases of ethical hacking. What is Covering tracks? Covering tracks or clearing tracks is the phase of ethical hacking in which a hacker tries to erase all the evidence on the target system that can […]
The post Covering tracks in ethical hacking appeared first on Hackercool Magazine ..read more
Hackercool Magazine
1M ago
Hello, aspiring ethical hackers. In this blogpost, you will learn about maintaining access in ethical hacking. Maintaining access is the fourth phase in the total 5 phases of ethical hacking. In this phase, hackers try to hold on to the initial access or foothold they have gained on the network. This is done using various […]
The post Maintaining access in ethical hacking appeared first on Hackercool Magazine ..read more
Hackercool Magazine
1M ago
Hello, aspiring ethical hackers. In this blogpost, you will learn what is ethical hacking and the 5 phases of ethical hacking. What is Ethical Hacking? Ethical hacking is hacking that is performed while following the ethics and rules. It is a procedure of detecting vulnerabilities and weaknesses in the target organization’s network and exploiting them […]
The post 5 phases of ethical hacking for beginners appeared first on Hackercool Magazine ..read more
Hackercool Magazine
1M ago
Hello, aspiring ethical hackers. This article is a beginner guide to gaining access. Gaining access is the third phase in ethical hacking after footprinting and scanning & enumeration. It should be noted that the earlier two phases will play a major role in gaining access. This blogpost will explain you about different ways in which […]
The post Gaining access in ethical hacking: Techniques appeared first on Hackercool Magazine ..read more