Ticker

"WEBSITE UNDER MAINTENANCE"

ACTIVITIES FOR BE AN PERFECT ETHICAL HACKER:-

 

ACTIVITIES FOR BE AN PERFECT ETHICAL HACKER

 

LESSON1: YOUR EXPERIENCE WITH THE DEEP WEB

TASK 1: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

We hope you have been able access all the Dark Web sites that you always wanted to. Let us know which sites that you visited along with a brief description of the contents.

LESSON2: SCANNING FOR INFORMATION

TASK2: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Choose your friend’s laptop first demo. Apply all the concepts of footprinting and make a list of all the information you were able to gather.

LESSON3: GATHERING INFORMATION

TASK3: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Now that we are familiar with process of scanning and determining these vulnerabilities in a system, lets practice on a friend’s laptop. Let us know a list of all the vulnerabilities that you found using the tools that you installed.

LESSON4: HACK TO GAIN ACCESS

TASK4: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Now that we are familiar with the first two steps, let us learn more about the front-end and the back-end features of a website or any application. This will help you solidify your grip over scripting. List down at least 5 front-end and 5 back-end features of a website or application of your choice.

LESSON5: LET’S START HACKING!

TASK5: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Let us get our hands dirty and hack into our own phone. Follow the steps correctly and let us know the steps followed and the applications hacked.

Take us through, the hack and note down all the features hacked.

Happy Hacking!

LESSON6: LET’S SPOOF!

TASK6: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Ladies and gentlemen it’s now time to hack into an email.

Your Task is to recreate the email hack that was carried out in the lesson.

Follow the steps explained in the video and provide is a link to the spoof file that you obtained by hacking your mail.

Make sure you resolve all errors in a methodical manner. Happy Hacking!

LESSON7: HACK THE PASSWORD!

TASK7: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Have you ever wanted to access that one website to which you have forgotten the password? Or is there a locked folder on your laptop that you have no way to access? Well now is the time to break those walls and access them. List down all the steps followed. Don’t forget to include the screenshots of the process.

We are excited to review your hack!

LESSON8: GAINING WIFI ACCESS

TASK8: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Have you ever felt jealous of your next door neighbor having really fast internet while you struggle to send whatsapp messages. Well that ends today. Let’s go get that free Wi-Fi.

Take us through the steps you followed and don’t forget to include screenshots of each phase.

LESSON9: CHALLENGE: DDoS ATTACK HACK

TASK9: COMPLETE THIS TASK TO MOVE ONE STEP CLOSER TO YOUR GOALS!

Congratulation on reaching the penultimate part of the course. Below, we have included a URL for a DDoS attack simulator. Be sure to give us a detailed step-by-step procedure with screenshots included. Happy Coding!

https://sourceforge.net/project/ddosim/

 

 

Post a Comment

0 Comments

Subscribe

We'll send you AWESOME content!