Posts

Showing posts with the label cyber security

A Step By Step Tutorial On How To Setup Proxy Chains In Kali Linux

Image
----------------------------- For Beginners : ----------------------------- If you have installed kali linux on a VMWare workstation or even on your physical machine, you may be able to try and use this steps mentioned in the tutorial. Stay anonymous using proxy chain on kali linux ------------------------------ Procedure : ----------------------------- Note your IP address and DNS address from google before doing this step ✔️Procedure 1: Edit the Proxychains configuration file inside ''etc'' folder nano /etc/proxychains.conf ✔️Procedure 2: (Now in the proxychains.conf file make the below changes) ⚠ Remove the # before dynamic change ⚠ Add the # before strict change ⚠ Remove the # before proxy dns request – no leak for dns data ⚠ In the [proxy list] add a line below socks4 – ⚠ Socks5 127.0.0.1 9050 ✔️Procedure 3: Check if your kali linux os has been installed with TOR service service tor status ✔️Procedure 4: If Tor service is Installed p...

Hacker Books

Image
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX The Hacker Playbook 3: https://amzn.to/34XkIY2 Hacking: The Art of Exploitation: https://amzn.to/2VchDyL The Web Application Hacker's Handbook: https://amzn.to/30Fj21S Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe Social Engineering: The Science of Human Hacking: https://amzn.to/31HAmVx Linux Basics for Hackers: https://amzn.to/34WvcXP Python Crash Course, 2nd Edition: https://amzn.to/30gINu0 Violent Python: https://amzn.to/2QoGoJn Black Hat Python: https://amzn.to/2V9GpQk

What is Cyber Security?

Image
Cyber security consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. Effective cyber security reduces the risk of cyber attacks and protects against the unauthorised exploitation of systems, networks and technologies. If you want learn cyber security or ethical hacking then follow my blog and Youtube channel. youtube:- introduction of cyber security