Kakar Security Edition 1

Kakar Security Edition 1 (1)

Table of Contents

Kakar Security Edition 1 (1)

Kakar Security Edition 1

Cybersecurity MCQS. 38

Computer MCQS. 73

Reverse Engineering. 81

Install the Ghidra reverse engineering tool 81

How to install Ghidra on a MacBook. 83

Hacking Challenges with Hackertest.net. 87

Level 1. 87

Level 2. 91

Level 3. 94

Level 4. 96

Level 5. 97

Level 6. 99

Level 7. 101

Level 8. 105

Level 9. 110

Level 10. 113

Level 11  117

Kakar Security Edition 1 (2)

Level 12. 119

Level 13. 122

Level 14. 125

Level 15. 129

Level 16. 132

Level 17. 136

Level 18. 140

Level 19. 142

Level 20. 145

Computer Networking. 152

1: What is Networking?. 152

2: Reasons for building networks?. 153

3: Pros and Cons of Computer Networks?. 154

What is Computer Networking?. 155

Types of Networks. 156

4: Types of Devices. 157

1: Network Devices: 157
2: End User Devices: 157

Kakar Security Edition 1 (3)

What is a URL?. 158

IPv6 Neighbor Discovery Protocol 159

IPv6 — NDP (Neighbor Discovery Protocol): 159

Network Scanning. 160

What is Network Scanning?. 160

Network Scanning Methodology. 160

Types of Network Scans. 161

Default Ports. 162

How to Countermeasures for SMTP. 163

How to Countermeasures for LDAP. 164

How to Countermeasures for SMB. 165

Footprinting and Reconnaissance?. 166

What is Footprinting and Reconnaissance?. 166

Types of Footprinting and Reconnaissance. 167

Use of Footprinting and Reconnaissance. 168

DoS and DDoS. 169

Kakar Security Edition 1 (4)

DoS and DDoS tools. 169

What is DoS?. 170

What is a DDoS Attack?. 171

Basic Categories of DoS and DDoS Attack Vectors  172

Volumetric Attacks (bps): 172
Protocol Attacks (pps): 172
Application Layer Attack (rps): 172

Taking down Web Servers with Slowloris | Low and Slow Denial of Service. 174

Enumeration. 175

What is Enumeration?. 175

Types of Enumeration. 176

Enumeration websites. 177

SQL Injection. 178

Complete Website Hacking using SQL Injection. 178

Introduction to SQL: Definition. 178

SQL Operations: Usage. 179

Kakar Security Edition 1 (5)

Introduction to Parameters. 179

Manipulating Parameters. 179

Identifying Parameters. 180

What is SQL Injection? 181

Types of SQLi 182
In-Band SQLi 182

Blind Based SQLi or Inferential SQLi 182

Out-of-Band SQLi 183

1: Error-based SQLi: 184
2: Union-based SQLi: 184
3: Inferential SQLi: 185
4: Boolean-based Blind SQLi: 185
5: Time-based Blind SQLi: 185

SQLi Methodology: 187

SQL Injection tools: 188

Practical SQL Injection. 189

How to Hack a Website Using SQL Injection. 191

Kakar Security Edition 1 (6)

Command Prompt. 194

Command Prompt Commands. 194
How to remove the Windows activation watermark  199
USB complete formatting in the Command Prompt  200
Website nameserver information, nslookup in the command prompt. 203
Find the Server IP. 206
Find the Subnet Mask. 207

Flutter. 208

Unable to locate Android SDK in Flutter. 208
Install Flutter in Windows. 209

Android Studio. 224

The Android SDK location should not contain whitespace, as this can cause problems with the NDK tools. 224

Unable to locate Android SDK. 226

Install Android Studio on a MacBook Pro. 228

Kakar Security Edition 1 (7)

How to convert a PDF file into an app in Android Studio. 231

Python. 235

Basic Views: 235

Top 20 useful Python modules and libraries. 236

Web Scraping: 236

Web Development: 236

Data Analysis: 238

Data Science: 239

Machine Learning: 239

Graphical User Interface: 241

Hobby: 242

E-commerce. 243

Dropshipping websites for E-commerce. 243

Cybersecurity devices. 245

SDR Devices. 245

Hacking Gadgets. 256

Kakar Security Edition 1 (8)

USB to TTL Devices. 263

Google Parameters. 270

Google Advanced Search Operators (Google Parameters) 270

Footprinting. 272

What is Footprinting?. 272

What is the objective of Footprinting?. 272

Types of Footprinting?. 272

Search Engines for Intelligence Gathering. 273

Website Analyzer. 274

Footprinting and Reconnaissance (Perform Footprinting through web services) 275

Bootable USB. 276

How to create a Windows 11 Bootable USB Drive  276

Session Hijacking. 280

Session Hijacking – What is Session Hijacking | Complete Process of Session Hijack. 280

Kakar Security Edition 1 (9)

What is Session Hijacking?. 280

Why is Session Hijacking Successful?. 281

Session Hijacking Process: 282

Types of Session Hijacking: 283

Session Hijacking in the OSI Model: 284

Network Level Hijacking: 284
Application-Level Hijacking: 284

The CIA Triad. 285

1: Confidentiality. 285

Measures: 285

Integrity. 285

Measures: 286

Availability. 286

Measures: 286

Penetration Testing: 287

Penetration Testing Phases: 287

Penetration Testing Methodologies: 288

System Hacking. 289

Kakar Security Edition 1 (10)

System Hacking Methodology: 289

Password Cracking: 290

Types of Password Attacks: 291

1: Active Online Attacks: 291
2: Passive Online Attacks: 291

Default Password: 293

Offline Attack: 294

5 common ways hackers hack any computer system    295

SIEM (Security Information and Event Management) 296

What is SIEM?. 296

1: Centralized Logging: 296
2: Risk Management: 297
3: Compliance: 298

SIEM Components: 299

1: Collection: 299
2: Normalization: 299

Kakar Security Edition 1 (11)

3: Correlation: 299
4: Alerting: 299

SIEM Features and Capabilities. 301

1: Threat Hunting: 301
2: Reporting and Dashboards: 301
3: Access Control: 301

SIEM USE Cases. 302

1: Compliance: 302
2:  Threat Hunting: 302
3: Incident Response: 302

How to Select a SIEM Solution. 303

1: Features: 303
2: Price and ROI: 303
3: Scalability: 303

Closing Thoughts. 303

1: Get Buy-In: 304
2: Plan and Implement: 304
3: Maintain and Optimize: 304

Kakar Security Edition 1 (12)

Cryptography. 305

What is Cryptography?. 305

Table of Contents: 306

What is Encryption?. 307

Properties of Encryption: 308

Symmetric Encryption: 309

Asymmetric Encryption: 310

Encryption Ciphers: 311

Stream Cipher: 311
Transposition: 311
Substitution: 311

Hash Function: 313

Importance of Cryptography: 314

Attack Scenario: Poor Key Management: 315

Poor Key Management Threats include: 315

Key Management: 316

Elements of the key management system include: 316

Kakar Security Edition 1 (13)

KeyStore: 317

Digital Certification: 318

A Digital certificate includes: 318

Types of Digital Certificates: 318

OSCP (Offensive Security Certified Professional) 319

How to prepare for OSCP | OSCP Guide | OSCP Path | OSCP Roadmap. 319

Level – 1 Fundamentals. 319

Level – 2 | Tools: 322

Level – 3: 323

Level – 4: 323

Wireless. 325

Types of Wireless Encryption: 325

WEP: 325

WPA: 325

WAP2: 325

Types of Wireless Threats: 327

Wireless Hacking Methodology: 328

SQLmap. 329

How to install SQLmap on Windows. 329

SQL (Structured Query Language) 331

What is SQL?. 331

2: What can we do with it?. 331

3: SQL is a non-procedural language: 331

4: SQL is all about data: 332

5: Difference between Database Administrator (DBA) and Data Scientists?. 332

1: DBA: 332

2: Data Scientists: 332

6: Difference between DBMS and RDBMS?. 333

7: SQL Data Types: 336

1: Numeric: 336

2: Data/Time: 336

3: Character/String: 336

4: Unicode Character/String: 336

5: Binary: 336

6: Miscellaneous: 336

Password Cracking. 337

Ophcrack. 337

Install HashCalc. 339

Windows Firewall 341

How to block HTTP websites with Windows Firewall 341

Secure the Computer from the Black Hat Hacker  347

MAC (Media Access Control) 355

Technitium MAC Address Changer. 355

Social Engineering. 356

What is Social Engineering?. 356

Types of Social Engineering: 356

Human-based Social Engineering: 356

Computer-based Social Engineering: 357

Mobile-based Social Engineering: 357

Open-Source Intelligence (OSINT) 358

Maltego. 358

Install the Maltego. 358

OSINT Information Gathering. 361

1: What is OSINT?. 361

2: OSINT Techniques?. 361

3: OSINT and Cybersecurity. 362

4: OSINT Interesting Website. 364

Web server. 366

Hacking Web server and Application servers. 366

What is the Web Server?. 366

What are the Web Server attacks?. 366

What is the Web Server attack Methodology?  367

What are the Web Application concepts?. 368

What is the Web Application hacking Methodology?  368

Web application penetration testing. 369

Smart Web Vulnerability Scanner. 369

Scan the IP Addresses. 371

Website information gathering. 376

What is Information Gathering?. 376

Types of information gathering. 377

What are we looking for?. 377

Scan all the ports. 378

Install Netcat. 379

Cloud Computing. 383

Types of Cloud Computing?. 383

OWASP (Open World-Wide Application Security Project) 384

2017 OWASP Top 10. 384

What is OWASP?. 384

2021 OWASP Top 10. 386

MITRE ATT&CK. 387

1: What is MITRE ATT&CK?. 387

2: What is MITRE ATT&CK Framework?. 387

3: Components of MITRE ATT&CK Framework?. 388

4: Using MITRE ATT&CK Framework for Threat Detection. 389

5: Case Studies: Real-Life Examples of using MITRE ATT&CK framework. 389

6: MITRE ATT&CK website. 390

7: Impact of Cyber Attack. 391

For all types of Business: 391

For Utilities, all the above plus cyber-physical consequences: 392

8: Tough questions for Defenders. 392

Content writing. 393

What is copywriting?. 393

Importance of copywriting: 393

How to write a copy that converts?. 394

Must use tools for copywriters: 394

What is content writing?. 395

What is content marketing?. 396

Content writing and Content marketing skills?. 397

Content writer: 397

Content Marketer: 397

Common mistakes made by content writers: 398

Proofreading and Editing Tips: 400

Proofreading vs Editing Skills: 402

Proofreading: 402

Editing: 402

Importance of Editing and Proofreading: 403

How to write a Case study?. 404

Write about your ideal customer: 404

Cover the story from A to Z: 404

Readability: 405

Use Data and Real Numbers: 405

Mention specific strategies: 405

Don’t forget CTA: 406

What is a case study?. 407

Benefits of a case study: 407

Sections in a case study: 407

Problems or Challenges: 408

Solution: 408

Results: 408

Email writing mistakes: 410

How to write an Email professionally?. 411

Formal Emails: 411

Email writing: 411

Types of emails: 415

Role of Emails in Marketing: 415

Welcome Email: 415

Special offer Email: 415

Newsletter Email: 415

Survey Email: 416

Request Email: 416

Announcement Email: 416

Additional Email types: 416

eCommerce product description writing: 418

Product Description: 418

Variety of products sold online: 418

Importance of good description: 419

How to write a product description: 420

Writing product description: 420

Know your audience: 420

Optimize for search engines: 420

What is Press release? Writing, Types, and Benefits of Press release. 422

What is a Press release?. 422

Types of a Press Release: 422

How to write a Press release (PR)?. 424

What are Frequently Asked Questions (FAQs)?. 425

FAQs: 425

Benefits of FAQs: 425

Where to use FAQs: 426

How to write impactful FAQs for a website?. 427

Writing FAQs: 427

Characteristics of Good FAQs: 427

Know common queries of the audience: 427

Keep answers short: 428

Bonus tips: 428

What are email marketing lists?. 429

How to write the about us page content?. 430

Shows companies: 430

Core elements: 430

Writing process: 431

What is Niche?. 432

Why is finding a niche important?. 432

How to find the right niches?. 432

What is content spinning/rewriting?. 433

Why do some people use article rewriting tools?  434

Why avoid content spinning?. 434

What should you do then?. 435

Should you use article rewriting tools?. 435

10 most common copywriting mistakes that Hamper sales. 436

What is copywriting. 436

Common mistakes to avoid. 436

Content readability. 438

1: Use easy and familiar words: 439

2: Keep sentences and paragraphs short: 440

3: Break up the content: 441

4: Keep the audience in mind: 442

5: Use visual elements: 443

6: Use transition words: 444

7: Tools to use: 445

8 common grammatical errors writers make | Avoid grammar mistakes in content writing. 446

1: Too much passive voice: 446

2: Using ‘They’ for singular subjects: 446

3: Apostrophe (‘) mistakes: 447

4: Using both first and third person: 447

5: Its vs It’s: 447

6: Then vs Than: 448

7: There, Their, and They’re: 448

How to write content for a website?. 450

What is web content writing?. 450

How to write web content?. 450

Writing tips: 451

Pro tips: 451

How to write bullet point content?. 453

What are bullet points?. 453

Write effective bullet point content: 453

Bonus tips: 454

Terminologies related to email marketing. 455

Some of the basic terminologies related to email marketing: 455

How to write amazing a landing page content?. 457

What is landing page?. 457

Importance of landing page: 457

Writing with one target audience in mind: 458

Writing landing page content: 458

Writing landing page content: 458

Don’t forget the basics: 459

Landing page characteristics: 459

What is plagiarism?. 460

Importance of things to know: 460

Top plagiarism checker tools: 461

What is ghostwriting?. 463

Who is a Ghostwriter?. 463

Why do people choose Ghostwriters?. 463

Benefits of becoming a Ghostwriter: 463

Things to know while ghostwriting: 464

Ask for details and Instructions: 464

What is technical writing?. 466

Types of Technical content: 466

Skills required: 467

Career in content writing?. 468

Why choose content writing as your career option?  468

Demand for content writers: 468

Career opportunities: 468

Full-Time content writing jobs: 469

Freelance content writing gigs: 469

10 best websites for free stock images: 471

Free VS Royalty-Free: 471

Things to Avoid: 471

Website for free images: 471

How to write a blog post?. 474

What is a blog post?. 474

Setups to write a great blog post: 474

How to write a Product review that converts?. 476

Why write reviews?. 476

Things to remember: 476

Write product review: 477

How to write articles fast: 11 pro tips. 479

CCTV camera hacking. 480

Protocols used by CCTV: 480

Vulnerabilities in CCTV: 480

Network Scanning (NMAP): 481

Network Scanning: 481

Types of scans: 481

Vulnerabilities. 483

What is Vulnerability?. 483

Types of Vulnerabilities?. 483

Common Vulnerabilities and Exposures. 484

Buffer Overflow Vulnerability. 485

What is Concurrency?. 485

What are the Concurrency parts?. 485

What is the difference between Multiprocessing and Multithreading?. 485

What is Scheduling?. 485

Where can you look for it?. 486

What is Click Jacking?. 487

Examples of Clickjacking! 487

Dangers of Clickjacking?. 487

Authentication-based Vulnerability. 488

Grammarly. 489

How to use Grammarly to enhance your English writing. 489

An ideal tool for: 489

Key features of Grammarly: 489

Use Grammarly on various platforms: 490

Grammarly Premium VS Free: All Features, Benefits, Cost, Differences. 490

Benefits of Grammarly Premium: 491

All features of the Free version: 491

Limitations: 491

Top 5 secure operating systems for privacy and anonymity. 493

1: Tails (The Amnesic Incognito Live System). 493

2: Qubes operating system. 494

3: Whonix. 495

4: Subgraph operating system. 495

5: IprediaOS. 496

Cybersecurity Certifications. 498

Exposure Management Certification (Free) 498

Module 1 Quiz: 498

Module 2 Quiz: 501

Module 3 Quiz: 504

Module 5 Quiz: 507

Module 5 Quiz: 510

Introduction to Ethical Hacking in Hindi 514

Introduction to Cybersecurity. 518

What is Cybersecurity?. 518

What is the importance of Cybersecurity?. 518

What is the Threat?. 518

What is the Risk?. 519

What is Risk Management?. 519

1: Risk Identification: 520

2: Risk Assessment: 520

3: Risk Treatment: 520

What are the Cybersecurity Policies and Procedures?  521

1: Cybersecurity Policies: 521

2: Cybersecurity Procedures: 522

Key Components of Policies and Procedures. 522

Access Control Policies and Procedures: 523

Data Protection Policies and Procedures: 523

Incident Response Policies and Procedures: 523

Network Security Policies and Procedures: 524

Acceptable Use Policies and Procedures: 524

Remote Access Policies and Procedures: 525

Key Components of Cybersecurity Policies and Procedures-2. 525

Network Security: 527

Introduction to Ethical Hacking. 529

What is Hacking?. 529

What are the types of Hackers?. 529

What are the Computer Security Threats?. 529

Goals of Ethical Hacking: 530

Skills required by Ethical Hacking: 530

Process of Ethical Hacking: 531

Web Application Domain: Common Attacks. 531

Types of Android Attacks: 532

Network Application Domain. 532

There are two main types of network attacks: 532

Network Application Domain: Types of Network Attacks. 533

Network Application Domain: Examples. 534

Screenshot. 536

How to screenshot on Windows. 536

5 most secure web browsers for hackers. 541

1: Epic Privacy Browser. 541

2: DuckDuckGo Browser. 541

3: Brave Browser. 542

4: LibreWolf Browser. 543

5: Tor Browser. 543

Top 5 Hacking GUI Tools. 545

1: Burp Suite. 545

2: zapproxy. 545

3: Umit. 546

4: OpenStego. 547

5: Nmap. 547

Hacker search engines. 549

1: Shodan. 549

2: ZoomEye. 549

3: FOFA. 550

RAT (Remote Access Trojan) 551

Install Remcos. 551

Best Free Computer System Information Tools. 555

Speccy. 555

Check the computer system information with the help of software. 557

Uninstall pre-installed software from Windows. 559

HTTrack website copier: How to clone any website | extract website data. 561

Install Sandboxie. 564

a. 566

Install Resource Hacker. 565

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top