• Stars
    star
    1,446
  • Rank 32,535 (Top 0.7 %)
  • Language
  • License
    Apache License 2.0
  • Created over 4 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Complete Listing and Usage of Tools used for Ethical Hacking

Ethical-Hacking-Tools


forthebadge


https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools/network/members   https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools/stargazers   https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools/watchers  

Show some 💚 and ⭐ the Repo to SUPPORT


DOWNLOAD

Kali Linux     🐉

Parrot OS    🦜

Remnux    🐝

bWAPP    💻

OWASP Juice Shop    🍹



What is Hacking? 👾

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.

Hacking can be carried out in many ways. The most common form is the phishing scam, where hackers attempt to gain login names and passwords, or introduce malware into networked computing environments, by tricking users into opening an email attachment or forwarding private information. Some of the most serious breaches of recent years, including the Wannacry malware attack, began as phishing scams, affecting not just the target enterprise but associated partners, customers, government agencies and others.


Who is a hacker? 👨‍💻

A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.

  • White hat   A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments
  • Black hat   A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
  • Grey hat   A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

What is Ethical-Hacking?

Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users. Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.


What is Cybersecurity? 💻

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.


What are Ethical-Hacking-Tools? 👨‍💻 🛠️

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There are a variety of such tools available on the market. Some of them are open source while others are commercial solutions.


What is CTF? 🚩

CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name! Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location.


What is Cryptography? 💱

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. Today, cryptography is used to provide secrecy and integrity to our data, and both authentication and anonymity to our communications.An example of basic cryptography is an encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed.


Community Resources and Environments

There are a lot of resources out there in order to help you get started with Ethical Hacking. These range from YouTube tutorials to virtual lab environments where you can hone your skills.

YouTube Channels

Virtual Testing Environments

  • VulnHub - Through VulnHub, you can download VMs that have known vulnerabilities, your task is to break into these and find the flags that have been listed by the creator. This is a free service, you download the VM and run it in your VM program of choice
  • Hack The Box - In order to even get signed up to Hack the Box, you need to hack into the site. Once in, you will find a load of pre-made vulnerable boxes. No VM programs are needed here as you access them all through a VPN. There is a free tier but in order to access the retired machines you need to pay a subscription.
  • Try Hack Me - Similar to Hack the Box but with a more guided learning approach. You can enroll yourself in "classes" that will help you through what to look for when hacking a machine. Again, all machines are accessed via a VPN. Subscription is required for most of the content here




The 10 most common cyber attack types:

  1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks  
  2. Man-in-the-middle (MitM) attack  
  3. Phishing and spear phishing attacks  
  4. Drive-by attack  
  5. Password attack  
  6. SQL injection attack  
  7. Cross-site scripting (XSS) attack  
  8. Eavesdropping attack  
  9. Birthday attack  
  10. Malware attack  

Phases of Ethical Hacking

  1. Planning and Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Analysis and WAF configuration

Certifications

Certified Ethical Hacker | CEH Certification  

More tools and tutorials coming your way soon !!

More Repositories

1

developer-portfolio

JavaScript
580
star
2

Dorkify

Perform Google Dork search with Dorkify
Python
196
star
3

DS_and_ML_projects

Data Science & Machine Learning projects and tutorials in python from beginner to advanced level.
Jupyter Notebook
148
star
4

CodeChef

Solutions to CodeChef problems in multiple languages.
C++
121
star
5

handReacting

Text to Handwriting converter made using React.
JavaScript
62
star
6

PyBox

PyBox provides you with a compilation of many such Python games, serving as a platform to, simply put, have fun. Ranging from pen and paper games like Tic Tac Toe to watered down and modified versions of popular classic arcade games like Snake, Flappy bird and Pong, we have a game for everybody to play.
HTML
51
star
7

resume-builder

Resume maker made using React.
JavaScript
43
star
8

fatigue-detector

A Flask app that detects fatigue during online classes.
Python
34
star
9

Patterns

Patterns in different programming languages
C++
32
star
10

Selenium_python

Python
15
star
11

Trapple

Food Delivery
HTML
14
star
12

TravelApp

Travel App created using MERN stack!
CSS
14
star
13

etudia

1st Year Notes Platform
HTML
9
star
14

Python_OpenCV

Python
8
star
15

tkinter_

TeX
7
star
16

hhhrrrttt222111

7
star
17

covid-tracker

Covid19 Tracker made with ReactJS
JavaScript
7
star
18

Collagify

Image collage maker
HTML
6
star
19

Excel20Marketing

HTML
4
star
20

chat

JavaScript
4
star
21

express

Learning express
JavaScript
4
star
22

DiGiTaL_DiaRY

C++
3
star
23

chat-app

Simple Chatting system made using nodeJS ,ExpressJS , Socket.io
HTML
2
star
24

FLuTTuR

Just some random widgets
Dart
2
star
25

hhhrrrttt222111-web

UNDER CONSTRUCTION
CSS
2
star
26

loading

loading. loading.. loading... .....
CSS
2
star
27

CSA-Blog

CSA Blog | Made with Django
HTML
2
star
28

chat_app_ui

sample chat app ui
Dart
2
star
29

PYTHoN_PRoGRaMS

Python
2
star
30

app

Dart
2
star
31

content-writer-portfolio

CSS
1
star
32

memories

JavaScript
1
star
33

tourise

JavaScript
1
star