Thursday, July 23, 2020

Surface web,Deep web and dark web

Hello guys, This is Anand Kumar and today we would learn about types of the web in this blog. 

Internet:
Internet is nothing but a network through which we can share data from one to another. The Internet is medium to share data. The Internet is used to connect with other devices




 
Surface web:(Also known as public web and visible web)

The content which we can visit on the internet or web or on google they are called the surface web for example if you search for some password-protected sites or data the Google would not list them for you.
The total percent of the surface web which we use as in normal web searches is only 4℅.

The best example of the surface web is a client and server architecture. 






















Deep web:

The deep web is a part of the internet which is not indexed by search engines.
The content of the website which is protected using passwords and encryption comes under this category.


Dark web:

These types of webs are used for illegal works such as selling drugs (criminal activities) 
To access these types of the web you need an anonymizer browser such as Tor.


Indexing of the website means collecting information from the website and storing it on their server.

You might be thinking that how come google knows about all the websites which are available on the internet it's by using spiders, what spider does is it scans a website and all the hyperlinks present on a website and store it on their server or database this is called indexing.



Thanks for reading :)
See you in the next article!

Wednesday, July 15, 2020

Applications used to protect your device/network.

Antivirus: An antivirus is a software that protects, prevents, and removes viruses from your machine.




















Antivirus mainly works on virus definition(Updates), these updates are updated on the antivirus server(server of the antivirus product which is in use) and after which all the devices are updated online (virus definition)
This virus definition consists of a new virus hash values and signatures.


Firewall: Firewall is a network security system that monitors the network incoming and outgoing traffic.
In simple terms, the firewall is a watchman of your building who knows who comes in and who goes out of your building.















Intrusion Detection System(IDS):
IDS is a device or software which monitors the network or a machine for malicious activity and if found any then the alerts are sent to the administrator.


Intrusion Prevention System (IPS):
IPS is a software or hardware form of network security device which monitors the network or a machine detect and prevent threats.


Behavior-based detection
This kind of detection occurs when software or application doesn't work according to their behavior.
For example, a screen keyboard application is used as a screen keypad but in the background, if it's changing windows file then there's a behavior-based detection.


Email Protection:
Email protection is a feature of antivirus software that has the ability to scan inbound and outbound emails for infected attachments and URLs of malicious sites.

Thank you for reading :)
See you in the article!








Monday, June 29, 2020

Google Dorking/Google Hacking

This blog is for educational purposes only. 

Google Dorking:
Google Dorking is also known as Google Hacking. It's a hacking technique for advanced searching.

Here are few examples for advanced search parameter

  • In-text
  • In URL
  • In title
  • Site
  • File type 



































In-text: If you need to find all the results on google which contain some words then we use intext.
For example, we need to find all search results that contain or have the word 'developer' we will type as Intext:developer in the search bar.

We will get the result where the text would be containing the desired word as we mentioned.

Refer the screenshot as shown below 



In URL: If you need to find all the results where the URL has the word 'developer', this google dork could be helpful.

We will get the result where the URL would be containing the desired word as we mentioned.

Refer the screenshot as shown below 


In-title: If you need to find all the results where the title has the word 'developer', this google dork could be really helpful. Just type Intitle:developer

We will get the result where the title would be containing the desired word as we mentioned.

Refer the screenshot as shown below 

Site: If you need to find particular sub-domains of a site this dork can be used. For example, if you want all the search results should be of networkgeek.in then type site:networkgeek.in and all the results would be from this search or will be either sub-domains of networkgeek.in.

Network geek is an institution where I did a course called CCNA routing and switching, cisco certification.

Refer the screenshot as shown below 



File type: If you need to find all the results where the file type is ppt on some specific topic, this google dork could be really helpful. Just type filetype:ppt on networking 


Thanks for reading, see you in the next article:) 



Thursday, June 25, 2020

Common tools used by Hackers

This article is only for educational purpose.

There are 'n' numbers of hacking tools,in this blog,we would be talking about some of the most common tools used.


NETDISCOVER: Netdiscover is a tool which is used to find the the number of active hosts  on the network.This is the basic scanner.

Command: 

Netdiscover -i eth0 -r [IP Address]  
Here 'i' is defined as interface and 'r' as range


output for this command is



NMAP [Network Mapper]: NMAP is one of the most widely used tools by hackers.This is a more advanced scanner compare to Nedtdiscover.

In Linux if we want to the know in depth about any topic we can use the man page,Just type man (name of the topic)

  • Ping Scan:Ping scan is used to see the number of active host  on the network.It's similar to Netdiscover 
Command:
nmap -sn [IP Address]   


  • OS Detection: OS Detection is use to find out the operating system of the host machine or attacker's machine.
Command:
nmap -O [IP Address]



  • Service Version Detection: Service version detection is used to know about the ports and service running on those ports.All scan deals with port only scans 1000 ports by default.
Command:
nmap -sV [IP Address]

  • Aggressive Scan:This is one of the best scan in nmap.It's used to find the OS,in detail about the ports,services used on the port and the version of service.
Command: 
nmap -A [Ip Address]

Hope you liked it!

Thanks for reading :),See you in next article!

Ransomware

In this article, we will be learning about Ransomware and best practises to get rid of it! Ransomware is a type of malware attack which is c...

What is Bug Bounty with real time example