Please completely read the article for deep knowledge


TIPS: 10 most important knowledge for you:


1. How to bypass windows silently.

   kon-boot (konboot.com)

A-    kon boot is a tool that allows accessing target computer without knowing the user's password. unlike other solution kon boot does not reset or modify user's password and all changes are reverted back to previous state after system restart.
kon boot has been successfully used by military personal, law enforcement, it corporations and professionals, forensics experts, private customers.

2.  How to remove pdf file password? portable document format

A- first open the pdf file "using password" press ctrl+p then choose then choose microsoft print to pdf
     press ok. pdf file password removed successfully.

3. TOP 10 useful website for hackers.
  1. dnsdumpster:- dns recon and research, find and lookup dns records
  2. verify email address:- verify email address online using free email verification tool.
  3. zoomey:- find iot device and bugs in android word press php my admin and much more
  4. search CVE List:- common vulnerabilities and exposures is a list of entries each containing an identification number, a descriptions and at least one public reference for publicly known cyber security vulnerabilities.
  5. national vulnerability database:- NVD is the U.S government repository of standards based vulnerability management data represented using the security content automation protocol (SCAP) this data enables the automation protocol of vulnerability management, security measurement and compliance. NVD includes databases of security checklist, security related softwares flows, miss configurations, product names and impact metrics.
  6. GREYNOISE:- greynoise intelligence is a cyber security company that collects, labels and analyzes internet wide scan and attack data.
  7. SEEBUG:- you can find bugs here.
  8. SHODAN:- is the world's first search engine for internet connected devices... use shodan to discover which of your devices are connected to the internet.
  9. website vulnerability scanner:- the scanner finds website vulnerability like sqli, xss, server mis configuration and many more. use our website scanner to check your web security.
  10. hack this site:- is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. also provide are articles, comprehensive and active forums, and guides and tutor to hack!
4. Types of malware:
  1. BUGS:-  A type of error flaw or failure that products an un desirable or unexpected result. bugs typically exist in a websites source code and can cause a wide range of damage.
  2. VIRUS:- A piece of code that is loaded onto your websites or computer without your knowledge. it can easily multiply and be transmitted as an attachment or file.
  3. TROJAN HORSES:- much like the myth, a trojan disguises itself as a normal file and tricks user into downloading it, consequently installing malware.
  4. ADWARE:- A type of malware that automatically display unwanted advertisements. clicking on one of these ads could redirect you to a malicious site.
  5. WORMS:- A worms relies on security failures to replicate and spread itself to other computers. they are often hidden in attachments and will consume bandwidth and overload a web server.
  6. BOTS:- A software program created to perform specific tasks, bots can send spam or be used in a Denial Of Service (DDOS) attack to bring down an entire website.
  7. RANSOMWARE:- Ransomware denies access to your files and demands payment through bitcoin in order for access to be granted again.
  8. SPYWARE:- A type of malware that function by spying includes monitoring a user's activity. keystrokes and more.
5. What is cookie & cached data?
COOKIE:
A- An HTTP cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser, while the user is browsing. cookies were designed to be a reliable mechanism for websites to remember state full information or to record the user's browsing activity.
CACHED DATA:
A- Cached data is information from a website or app that is stored on your device to make the browsing process faster. for this reason it's not a bad idea to clear your cache every so often, whether on your computer or your android phone & i phone.

6. What is MD5 Hash?
A- MD5 (message - digest algorithm) 5 is a cryptographic has function with a 128 bit resulting has value. MD5 is widely used in security related applications, and is also frequently used to check the integrity of files.
MD5 stands for Message Digest algorithm 5, and was invented by celebrated US cryptographer Professor Ronald Rivest in 1991 to replace the old MD4 standard. MD5 is simply the name for a type of cryptographic hashing function.

7. steganography Indepth 
  1.  steganography is the practice of concealing a file, message, image, or video within another file, message, image or video. the work steganography comes from new latin steganographia , which combines the greek words stegnos, meaning covered or canceled. 
  2. stegnography has been widely used, including in recent historical times and the present day.
  3. the most common form of steganography used today hides files withing image files on a computer.
8. what is ssl certificate?
  1. A- Secure sockets layer In cryptography, a public key certificate, also known as a digital certificate or identify certificate, is an electronic deocument used to prove the ownership of a public key
  2. ssl certificates are used to create an encrypted channel between the client and the server. transmission of such data as credit card details, account login information has to be encrypted to prevent eavesdropping.
9. The top 10 most common passwords were:

YOUR PASSWORD IS IN THE LIST TO CHANGE IT BECAUSE YOUR ACCOUNT HAS BEEN HACKED YOU ARE NOT SAFE

1. 123456                                    6. 12345678
2. 123456789                              7. abc123
3. qwerty                                     8. 1234567
4. password                                 9. password1
5. 111111                                    10. 12345

10. The concept of RAT in hacking and cyber security field?

  1. A- remote access trojan (RAT) is a type of malware that allows hackers to monitor and control your computer system or network.
  2. like most malware, RATs piggyback on legitimate looking files. hackers can attach a RAT to a document in an e-mail, or within a large software package, like a video game. Advertisements and nefarious web pages can also contain RATs, but most browsers prevent automatically download from websites or notify you when a site is unsafe.
  3. In most cases RATs are used like spyware, a money-hungry. hacker can use a RAT to obtain keystrokes and files from an infected computer.
  4. This key strokes and file could contain bank information, passwords, sensitive photos or private conversations. additionally hackers can use RATs to activate computers webcam or microphone directly.
SO HIDE YOU LAPTOP AND SMART TV FRONT CAMERA (BE SAFE AND SECURE)


I Hope you like this article Thanks for read this article. 
Please share this article to your friends and family members..

subscribe to our blog for more articles...