How To Start | How To Become An Ethical Hacker

Posted by KP-3α€™ိα€žားα€…ု |

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat πŸ˜€

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related posts


  1. Pentest Tools Open Source
  2. Install Pentest Tools Ubuntu
  3. Hacking Tools Software
  4. Usb Pentest Tools
  5. Hacking Tools Software
  6. Hack App
  7. Bluetooth Hacking Tools Kali
  8. Nsa Hacker Tools
  9. Hacker Tools Apk Download
  10. Hacking Tools Free Download
  11. Underground Hacker Sites
  12. Termux Hacking Tools 2019
  13. Hacker Tools Online
  14. Hacking Tools And Software
  15. Hacking Tools For Beginners
  16. Pentest Tools Subdomain
  17. Hacking Tools 2020
  18. Pentest Tools Alternative
  19. Pentest Recon Tools
  20. Hack Website Online Tool
  21. Pentest Tools Tcp Port Scanner
  22. Pentest Tools Website Vulnerability
  23. How To Make Hacking Tools
  24. Physical Pentest Tools
  25. Hackers Toolbox
  26. Hacking Tools Kit
  27. Hacker Security Tools
  28. World No 1 Hacker Software
  29. Beginner Hacker Tools
  30. Hacker Techniques Tools And Incident Handling
  31. What Is Hacking Tools
  32. Underground Hacker Sites
  33. Pentest Tools
  34. Hacking Tools Hardware
  35. Hacking Tools Download
  36. Hackrf Tools
  37. Hacking Tools For Windows 7
  38. Pentest Tools Apk
  39. Hacking Tools Free Download
  40. Best Hacking Tools 2020
  41. Hack Apps
  42. Pentest Tools For Ubuntu
  43. Pentest Tools Port Scanner
  44. Growth Hacker Tools
  45. Nsa Hack Tools
  46. Pentest Tools Framework
  47. Hacker Tools
  48. Pentest Tools Kali Linux
  49. What Are Hacking Tools
  50. Hack And Tools
  51. Pentest Tools Android
  52. Pentest Tools Subdomain
  53. Hack Website Online Tool
  54. Termux Hacking Tools 2019
  55. Hack Tools Download
  56. Pentest Tools Linux
  57. Hacker Tools Apk Download
  58. Hack App
  59. Beginner Hacker Tools
  60. Hacker Tools Hardware
  61. Hacker Security Tools
  62. Hacks And Tools
  63. Hacker Tools For Windows
  64. Pentest Tools Alternative
  65. Hacking Apps
  66. Hack Tools Pc
  67. Nsa Hack Tools
  68. Growth Hacker Tools
  69. Hacker Tools Github
  70. Top Pentest Tools
  71. Pentest Tools Apk
  72. Hack Tool Apk No Root
  73. Hack And Tools
  74. Pentest Tools Find Subdomains
  75. Usb Pentest Tools
  76. Black Hat Hacker Tools
  77. Pentest Recon Tools
  78. Pentest Tools List
  79. Hacking Tools Name
  80. Hacker Tools
  81. Hacking Tools For Mac
  82. Hacking Tools For Kali Linux
  83. Pentest Tools Open Source
  84. Hacker Tools Github
  85. Hacking Tools For Windows Free Download
  86. Hacker Tools Software
  87. Pentest Tools Port Scanner
  88. Hacking Tools Name
  89. Hacker Tools Apk Download
  90. Hacking Tools Free Download
  91. Hacker Tool Kit
  92. Pentest Tools List
  93. Best Hacking Tools 2019
  94. Hacking Tools For Windows Free Download
  95. Hacker Tools Free Download
  96. New Hacker Tools
  97. Pentest Tools Github
  98. Pentest Tools Alternative
  99. Hacker Tools
  100. Pentest Tools Website Vulnerability
  101. Usb Pentest Tools
  102. Hacking Tools Github
  103. Hacker Tools For Pc
  104. Pentest Tools Kali Linux
  105. Hacks And Tools
  106. Pentest Tools
  107. Pentest Tools Port Scanner
  108. Hacking Tools Free Download
  109. Pentest Tools Tcp Port Scanner
  110. Hack Tools Pc
  111. Hacking Tools
  112. Best Hacking Tools 2020
  113. Hacking Tools For Beginners
  114. Hacker Tools Online
  115. Hacker Tools For Pc
  116. Pentest Tools Alternative
  117. Hacker Techniques Tools And Incident Handling
  118. Pentest Tools Bluekeep
  119. Pentest Automation Tools
  120. Hack Tools Online
  121. Hack Tool Apk
  122. Hack Tools Github
  123. Tools For Hacker
  124. Hacker Tools Apk Download
  125. Hacking Tools Online
  126. Hacker Tools 2019
  127. Pentest Automation Tools
  128. New Hack Tools
  129. Pentest Tools List
  130. Hacker Tools
  131. Hackrf Tools
  132. Pentest Tools Alternative
  133. How To Hack
  134. Pentest Tools Kali Linux
  135. Hack Tools
  136. Hack And Tools
  137. Top Pentest Tools
  138. Tools 4 Hack
  139. Hacking Tools Pc
  140. Hacking Tools Usb
  141. Hacker
  142. Pentest Tools Nmap
  143. Hack Tool Apk
  144. Hacker Tools Github
  145. Hacker Tools Online
  146. Tools For Hacker
  147. How To Make Hacking Tools
  148. Tools 4 Hack
  149. Pentest Reporting Tools
  150. Tools Used For Hacking
  151. Hack Tools Github
  152. Hack Tools Download
  153. Hacking Tools Hardware
  154. Hacker Tools For Windows
  155. Pentest Tools Subdomain
  156. Hacker
  157. Blackhat Hacker Tools
  158. Pentest Reporting Tools
  159. Hacker Tools Github
  160. Easy Hack Tools
  161. Hacking Tools And Software
  162. Hack Tools For Ubuntu
  163. World No 1 Hacker Software
  164. Hacker Tools For Ios
  165. Hack Tools For Ubuntu
  166. Hackers Toolbox
  167. Github Hacking Tools

Hacking Facebook By Using PHP Script | Social Engineering Attack | LAN And WAN (Same Or Different Networks)

Posted by KP-3α€™ိα€žားα€…ု |


This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How hackers can hack your social media by using their own local servers.

Basically these type of attacks  known as Social Engineering attacks or Phishing. Attacker just send the duplicate vulnerable HTML page to the victim, when victim enters any type of information to that vulnerable page it'll automatically received by the attacker.

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.

How phishing works 

Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.

Phishers may use social engineering and other public sources of information, including social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities.

Hacking by PHP

As PHP is server side scripting language so first of all you have need to install a local server (WAMP, XAMPP or LAMPP) over your system. Because if there is no any server running on your system then you can't even run your PHP script. So if you wanna do a programming with PHP this is the first step to download and install a server from the Internet. You can easily download and install servers by watching my videos. Just visit my YouTube channel and watch there.



Hacking Facebook By Using PHP Script | Social Engineering Attack | You can perform this attack over LAN and WAN (Same or Different Networks)
Related links

Networking | Switching And Routing | Tutorial 3 | 2018

Posted by KP-3α€™ိα€žားα€…ု |


Welcome to my 3rd new tutorial of networking (Routing and Switching). In this blog you will able to watch an interesting video about basic device navigation such as changing device (router or switch) name, configuration of login password, configuring a device information, router IP addresses and many more.

What is router?

Router is a network layer device which is the 3rd layer in the OSI model which is used to communicate different networks. It is an intelligent device fixed at the boundary of network that connects to other networks and responsible for end to end delivery of the packet that requires an IP address which is known as the logical address which is the basic identity of the device just like our identity card number or roll number and so on, for the identification of source and destination devices. Router is the gateway of the network having two interfaces such as inbound and the outbound interface through which the traffic comes in from different networks and comes out traffic to the different networks.

What is an IP address?

Internet protocol (IP) address is a numeric label given to each and every device in the network for the identification of the device just like our roll numbers in collages, universities which identity each and every student uniquely everywhere. So same concept here, it is a logical address which is used whenever the device want to communicate outside the network that means to another network.

What is Switch?

Switch is basically layer 2 device, which is used to connect two or more than two devices with each other in the same network. It is an intelligent device which doesn't allow the broadcast. It requires Media access control (MAC) address to communicate within the network. Now let's move to the video for further.


Related articles


  1. Wifi Hacker Tools For Windows
  2. Hacker Tools Github
  3. Hacking App
  4. Android Hack Tools Github
  5. Pentest Tools Android
  6. Pentest Tools Android
  7. What Is Hacking Tools
  8. Pentest Tools Linux
  9. Android Hack Tools Github
  10. Pentest Tools Review
  11. Pentest Tools Bluekeep
  12. Hacking Tools Kit
  13. Pentest Tools Url Fuzzer
  14. New Hacker Tools
  15. Hacker Tools Apk Download
  16. Hacking App
  17. Ethical Hacker Tools
  18. Hacker Tools For Pc
  19. Hacker Tools Apk
  20. Hack App
  21. Hacker Tools Github
  22. Hack Tools For Games
  23. Pentest Tools For Windows
  24. Hacking Tools Online
  25. Hacking Tools
  26. Hacking Tools And Software
  27. Pentest Reporting Tools
  28. Hack Tools 2019
  29. Hacker Hardware Tools
  30. Pentest Tools For Mac
  31. Hack Tool Apk No Root
  32. Hacker Tool Kit
  33. Ethical Hacker Tools
  34. Pentest Automation Tools
  35. Hack Tools For Pc
  36. Hack Tools For Games
  37. Hacking Tools Free Download
  38. Pentest Tools For Android
  39. Hacking Tools Usb
  40. Hack Tools 2019
  41. Kik Hack Tools
  42. Hacking Tools Kit
  43. Hacker Tool Kit
  44. What Are Hacking Tools
  45. Pentest Tools Kali Linux
  46. Hacking Tools 2020
  47. Hacking Tools For Mac
  48. Hack Tools 2019
  49. Hacker Tools Online
  50. Github Hacking Tools
  51. Best Hacking Tools 2019
  52. Ethical Hacker Tools
  53. How To Install Pentest Tools In Ubuntu
  54. Hacker Tool Kit
  55. Best Hacking Tools 2020
  56. Bluetooth Hacking Tools Kali
  57. What Are Hacking Tools