KaaShiv Infotech

Inplant training in chennai | Internship in chennai

1.Phishing
Phishing is one of the most common hacking terminology used by security people. Phishing is a technique which tricks users into revealing sensitive information (like usernames, passwords or credit card details) to seemingly benign sources. A phisher disguises as a trustworthy entity and contacts potential victims asking them to reveal information. This could be further used for malicious intent. For example, a phisher may pose as a bank and ask for their bank account credentials via e-mail. Or he could trick you to click on a fraudulent link. Phishing is a type of social engineering.

2. Malware
You daily hear websites getting infected with malware attack, so let’s learn more about this hacking terminology.

Malware is a software program designed by hackers to hijack computer systems or steal sensitive information from a device. These go by various names like viruses, adware, spyware, keyloggers etc. A malware program can get transferred to a system via various means like USB, hard drive, or spam.

For instance, a recent malware functioned by redirecting both Opencart and Magento desktop and mobile websites to malicious links. This essentially leads to a loss of customers, reputation and most importantly bad impact on search engine rankings.

3. Ransomware
One of the most searched hacking terminology of 2017. Ransomware is a form of malware which locks a user out of his own system and cuts access to his/her files. A ransom message is displayed that instructs how much and where to send payment, usually requested in bitcoin, in order to get your files back. Such attacks affect not only individuals but banks, hospitals, and online businesses. A very recent example of such ransomware is the Petya ransomware attack which recently took the businesses worldwide by storm.

4. Spoofing
E-mail and IP spoofing are few common hack techniques encountered by users worldwide. E-mail spoofing involves altering the header of an e-mail to make it look legit. For instance, a black hat hacker can make an e-mail look as if it has appeared from your bank or any other source you may trust. On the other hand, IP spoofing refers to an illegitimate packet sent to a computer with an altered IP appearing to be a trusted host. This is carried out with the hope that the packet would be accepted to allow the sender access to the target machine.

5. Encryption
Encryption is a process of encoding a message or information to make it unreadable and secretive. This ensures that the concerned information is concealed only to the authorized parties. Often, encryption is employed by hackers to extort money by unleashing ransomware on computer systems, thus locking out victims and encrypting their files. The decryption key is provided only when a certain ransom is paid.

6. Adware
Adware is typically a software which acts as a spyware to track a user’s browsing activities covertly. It then generates advertisements based on the user’s browsing history. Some adware is maliciously designed to pop up ads with a frequency ultimately slowing down your system. It can collect your personal information, browsing history and provide inputs for further phishing attacks. This hacking terminology is common in the marketing world. Google shows a warning when visitors visit such deceptive website because of Social engineering content.

7. Zero Day threat
A zero-day threat refers to a threat which is undocumented and hence hidden from any antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners, making it oblivious to developers who built antivirus functionalities based on knowledge of these vulnerabilities. Such vulnerabilities are exploited through different vectors, popularly web browsers, and malicious attachments via e-mails.

 

Hacking Tools

Site Secret Fetcher Tools   –  http://www.mediafire.com/file/8d4g3epqu50vbh8/Site_Secret_Finder.rar/file

 

Site Digger – http://www.mediafire.com/file/hldirhdnc5vvnwi/SiteDigger.rar/file

 

Reg Cleaner – http://www.mediafire.com/file/0bvmpx7zwwcr9ts/Reg_Clean.rar/file

 

Charter Tool – https://drive.google.com/file/d/1YwC7DU08Oweu-EBuYne7NUGdO21YzGty/view?usp=sharing

 

Microsoft Security Tool download –  https://drive.google.com/file/d/1N-eY8qD7hVA-6C-dcizOPSA6Jww-wdAe/view?usp=sharing

 

VPN Software : http://www.mediafire.com/file/gqp9nhxzltumlw2/VPN.rar/file

 

CyoCopy – http://www.mediafire.com/file/q74ivqjhwhvkgbo/CyoCopy.rar/file

 

IP Spoofing Tool Download – http://www.mediafire.com/file/yyoskri8uxeyfgv/IPSetup.rar/file

 

Firewall  – http://www.mediafire.com/file/w9jtbu1zuehwerh/Firewall.rar/file

 

Pentest Tool – http://www.mediafire.com/file/nryhsgxb2op0290/Tools.rar/file

 

 

project Code  – http://www.mediafire.com/file/oazkokrl9kqhagx/IpAddressGrabber.rar/file

 

GIT Installation S/W:

http://www.mediafire.com/file/woadcuktksvsh0z/Git-2.28.0-64-bit.rar/file

main.dart   ( 3 files  with 3 classes )


 

import ‘package:flutter/material.dart’;

void main()

{

runApp(MyApp());

}

class MyApp extends StatelessWidget

{

@override

Widget build(BuildContext context)

{

return MaterialApp

(

home: Page1(),

);

}

}

 


page1.dart


import 'package:flutter/material.dart';
import 'package:stateful_project/Page2.dart';

class Page1 extends StatelessWidget {
  @override
  Widget build(BuildContext context) {
    return Scaffold(
      appBar: AppBar(
        title: Text("Machi Page Navigation App")
      ),
      floatingActionButton: FloatingActionButton(
        child: Icon(Icons.add),
        onPressed: (){
          Navigator.push(context, MaterialPageRoute(
             builder: (context)
                 {
                   return Page2();
                 }
              )
          );
        },
      ),
      floatingActionButtonLocation: FloatingActionButtonLocation.centerDocked,
      body: Container(
        child: Center(
         child: Text(
              "Venkat's First Page"
           )
          ),
      ) ,
    );
  }
}

page2.dart


import ‘package:flutter/material.dart’; import ‘package:stateful_project/Page1.dart’; class Page2 extends StatelessWidget { @override Widget build(BuildContext context) { return Scaffold( appBar: AppBar( title: Text(“Machi Page Navigation App”) ), floatingActionButton: FloatingActionButton( child: Icon(Icons.add_box), onPressed: (){ Navigator.push(context, MaterialPageRoute( builder: (context) { return Page1(); } ) ); }, ), floatingActionButtonLocation: FloatingActionButtonLocation.centerDocked, body: Container( child: Center( child: Text( “Venkat’s Second Page” ) ), ) , ); } } —————————————— 1 file with 3 classes (Main.dart)

——————————

 

import 'package:flutter/material.dart';


void main() {
  runApp(MaterialApp(
    home: Page1(),

  ));
}

class Page1 extends StatelessWidget {
  @override
  Widget build(BuildContext context) {
    return Scaffold(
        appBar: AppBar(
            title: Text("Venkat's Routing - Page 1")
        ),
        body: Container(
            child: Center(
              child: RaisedButton(
                  child: SafeArea(child: Text("Venkats First Route Page")),
                  onPressed: ()
                  {
                    Navigator.push(context, MaterialPageRoute(
                        builder: (context)
                        {
                          return Page2();
                        }
                    ));
                  }),
            )
        )
    );
  }
}

class Page2 extends StatelessWidget {
  @override
  Widget build(BuildContext context) {
    return Scaffold(
        appBar: AppBar(
            title: Text("Venkat's Routing - Page 2")
        ),
        body: Container(
            child: Center(
              child: RaisedButton(
                  child: SafeArea(child: Text("Venkats Second Route Page",)),
                  onPressed: ()
                  {
                    Navigator.push(context, MaterialPageRoute(
                        builder: (context)
                        {
                          return Page1();
                        }
                    ));

                  }),
            )
        )
    );
  }
}
KaaShiv InfoTech Rated 5 / 5 based on 99,988 reviews.
× How can I help you?