Skip to main content

Posts

Showing posts from June, 2018

Concept of hacking,phases and its types in securetecho

1.3 Hacking Concepts, Types, and Phases in securetecho What is Hacking ? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator's original purpose. Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss . Who is a Hacking ? Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer's software and hardware. For some hackers, hacking is a hobby to see how many computers or networks they can compromise. Their intention can either be to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades, like stealing business data, credit card information, social security numbers, email passwords, etc. Hack...

CEH V9 Module in securetecho

CEH_v9              Introduction  in securetecho Chapter 01. Introduction to Ethical Hacking 1.1 Information Security Overview 1.2 Information Security Threats and Attack Vectors 1.3 Hacking Concepts, Types, and Phases 1.4 Ethical Hacking Concepts and Scope 1.5 Information Security Controls 1.6 Information Security Laws and Standards Module Summary Chapter 02. Footprinting and Reconnaissance 2.1 Footprinting Concepts 2.2 Footprinting Methodology 2.2.1 Footprinting through Search Engines 2.2.2 Footprinting Using Advanced Google Hacking Techniques 2.2.3 Footprinting through Social Networking Sites 2.2.4 Website Footprinting 2.2.5 Email Footprinting 2.2.6 Competitive Intelligence 2.2.7 WHOIS Footprinting 2.2.8 DNS Footprinting 2.2.9 Network Footprinting 2.2.10 Footprinting through Social Engineering 2.3 Footprinting Tools 2.4 Footprinting Countermeasure...

Information Security Controls Information Assurance (IA) in securetecho

1.5 Information Security Controls Information Assurance (IA) in securetecho IA refers to the assurance that the  integrity, availability, confidentiality , and  authenticity  of information and information systems is protected during usage, processing, storage, and transmission of information.this type of information provided by securetecho of ethical hacking and information security.in the securetecho we will discouss everything . Some of the processes that help in achieving information assurance include: Developing local policy, process, and guidance Designing network and user authentication strategy Identifying network vulnerabilities and threats Identifying problems and resource requirements Creating plan for identified resource requirements Applying appropriate information assurance controls Performing certification and accreditation Providing information assurance training Information Security Managemen...

Web Development Artical in securetecho

Artical About Web Development in securet echo Web development is a broad term for the workinvolved in developing a web site for the Internet(World Wide Web) or an intranet (a private network).Web development can range from developing thesimplest static single page of plain text to the mostcomplex web-based internet computer programs (orjust 'web apps') electronic businesses, and socialnetwork services. A more complete and thorough listof tasks to which web development commonly refers,may include web engineering, web design, webcontent development, client representative/sexual relationship, client-side/server-side scripting, webserver and network security setup, and (buying things online) development. Among web professionals, "webdevelopment" usually refers to the main non-designparts of building web sites: writing markup andcoding. Latestly Web development has come to meanthe creation of content management systems or CMS.These CMS can be made from scratch, privat...

How to hack mobile phone in securetecho

Part 1. How to Hack Android Phones In securetecho How to hack android phone remotely With Androrat in securetecho: Androrat is an open source tool that allows a remote attacker to control your phone . With the software the computer criminal-related can make calls , send messages , get The (numbers that describe a location) , access files and photos stored in the phone . Androrat lets you hack a smart phone without the use of any software . An APK is the standard application format of Android phones . The Androrat binds itself to a legal/real and true Android app and lies to any security features in the phone . Please follow the steps listed below : Step 1: Go to https://www.noip.com/ to register a free domain . Step 2: Download DUC Updater from site , this updates your current ip to NOIP server every time you connect to the internet . Step 3: Login in DUC with your N...