COVID-19 IS REAL PLEASE STAY AT HOME, FOR ADVERT PLACEMENT OR INQUIRY PLEASE CALL: 08166201592 OR 09031936614 THANKS Best Basic Hacking Tools (BBHT) Skip to main content

Best Basic Hacking Tools (BBHT)



1. Vulnerability Scanner
Vulnerability is defined as an unintended software flaw and can be used as an opening used by hackers to sending malicious software like Trojan horses, viruses, worms etc.
A Vulnerability scanner is a very efficient tool used for checking weak spots in a computer system or a network. It is basically a computer program. The sole purpose of the scanner is to access networks, applications and computer systems for weaknesses. This is used by both Black Hat hackers and computer security managers who are usually White hat hackers or blue hat hackers. The black hat hackers use this for checking for weaknesses and gain unauthorized access from those points. In the hands of white hat hackers this is used for the same purpose of checking for weaknesses but they use it for protecting the computer systems. Download

2. Password Cracking

Password cracking is the process of recovering passwords, which are transmitted and stored in the computer system. With this, you can gain access to a computer system by gaining the password of the user. The time required for cracking password depends entirely on the strength of the password used. Most of the methods used usually require the computer system for producing many passwords, which are then checked individually.
There are many methods for cracking passwords. Brute force is one of them. It is a time taking process as it uses all possible combinations of letters and words until it succeeds. Methods like word list substitution, but on checking, dictionary attacks are performed before using brute force. This is done to reduce the number of attempts. Download

3. Spoofing Attack (Phishing)
Spoofing is nothing but making a fake website or program which looks like the original. User gets fooled thinking that it is the original website or program. The main purpose of spoofing attack is to collect confidential information such as ID and passwords. Download

4. Social Engineering
This is a more direct way of hacking without using a system. Here the hacker gets the information by using some of the social engineering tactics. Here the hacker gets the trust of the user and makes them reveal their password or other information. The hackers play the role of the users who cannot access his account.

5. Trojan Horses
A Trojan horse is a malware program which is non self replicating. They can be used for gathering confidential formation like passwords. It acts like a backdoor for unauthorized access for the systems that are affected. Download

Popular posts from this blog

Basic Turmux Commands

Turmux is an android terminal emulator that enables command line interface, just like command prompt , it  works directly with no rooting or setup required Basic Command Codes and Their Functions cp -v This is used to prints informative massage cp -r This is used to copy any directory mv -u This is used to update-move when source is newer than destination mv -v This is used to move any directory ls -n This is used to display UID and GID directory ls --version This is used to check the version of ls command cd -- This is used to show last working directory from where we moved ls -l This is used to show file action like - modified, date and time, owner of file, permissions Etc. ls help This is used to show display how to use "ls" command cp -n no file overwrite cd ~ This is used to move to users home directory from anywhere mv [file1 name] [new file2 name] This is used to move or rename two file at a time cd - This is used to move one directory back from...

Center for Information Technology and Education Standards

Steps in Troubleshooting a System

Step By Step in  Troubleshooting a System Do you know what to do if your screen goes blank? What if you can't seem to close an application, or can't hear any sound from your speakers? Whenever you have a problem with your computer, don't panic! There are many basic troubleshooting techniques you can use to fix issues like this. In this lesson, we'll show you some simple things to try when troubleshooting, as well as how to solve common problems you may encounter. General Tips to keep in mind There are many different things that could cause a problem with your computer. No matter what's causing the issue, troubleshooting will always be a process of trial and error  in some cases, you may need to use several different approaches before you can find a solution; other problems may be easy to fix. We recommend starting by using the following tips. Write down your steps : Once you start troubleshooting, you may want to write down each step you ta...