Friday, January 16, 2015

1.[IN NEPALI] Java Programming_Part 1 - Intro Plus HelloWorld Coding - By BIJAY ACHARYA

Ethical Hacking "A DEFENCE DIET"



This Video Explains about :
1. Introduction to Ethical Hacking “Overview”
- Category of Hackers, Ethical Hacking, Warnings.
- Penetration Test,Testing Models
2. Revealing Asterisk
- Hacking Passwords Behind ‘dots/asterisk’ from Facebook Login Page.
3. KeyLogging Attack
- Local Attack with Software
- Recording each keystrokes of pressed keys/text
- Effective if used brilliantly
- Can be used to hack all kind of emails and passwords.
4. Phising Attack
- Fake Link Creation and Phising Users.
- Getting all login credential of targeted users.
- ‘Must Have Knowledge’ for all Internet users.
5. Virtual Lab for Hacking Research
- Detail Explanation of Requirements
- Virtual Box|VmWare Concept.
6. NMAP – Kali Linux Basics
- Network Mapper
- Some Commands
- Operating System Fingerprint
7. Cracking|Hacking Wireless Key
- Backtrack 5R3 Basics
- Reaver Tool in action

*Everything here is for awareness concept. Don’t try these methods for bad purpose. Apply these knowledge for good purpose and prepare yourself for DEFENCE from these kind of attacks.
- Bijay Acharya

Tuesday, January 6, 2015

Virtual Lab For Research | Penetration Test & Ethical Hacking - IT WORKSHOP | POKHARA

https://www.youtube.com/user/studentvideotutorial

 This video is a live shoot of IT WORKSHOP held on Pokhara Nepal, From Poush 08 to Poush 18, 2071

Video Explains : - Virtual Box & Vmware Concept - Ethical Hacking Research Method - Installation of BackTrack 5R3 & Kali Linux Concept - Need of RAM and Processor

 Instructor : Bijay Acharya
Twitter.com/acharya_bijay

 *This Screenshot Video was done by Free Trail Version of Camtasia recorder, downloaded from http://www.techsmith.com/camtasia.html

 *Desktop BG is of Windows 7 Registered Version * Image of BT5R3 and Kali Linux was downloaded from https://www.kali.org/