Ethical Hacking Full Guide
Lesson 1: IP Address
IP (Internet Protocol) har device ka unique address hota hai internet par. Do main types hain:
- IPv4 (e.g., [Link])
- IPv6 (e.g., [Link])
Public IP internet pe visible hota hai. Hackers IP scan karke vulnerabilities dhoondhte hain.
Lesson 2: Ports & Protocols
Port ek digital darwaza hai jo system ki services ko access deta hai.
Common Ports:
- 80 (HTTP)
- 443 (HTTPS)
- 22 (SSH)
Protocols: Communication ke rules (HTTP, FTP, TCP, UDP).
Lesson 3: Firewall
Firewall ek guard hota hai jo traffic monitor karta hai. Types:
- Software (Windows Firewall)
- Hardware (Routers)
- Cloud (Cloudflare)
Hacker firewall ko bypass karta hai: Port Knocking, Reverse Shell, Encoded Payloads.
Lesson 4: Malware
Malware ka matlab hai 'Malicious Software'. Types:
- Virus: File infect karta hai
- Worm: Network mein khud spread hota hai
- Trojan: Fake program ban ke aata hai
- Ransomware: Data lock kar deta hai
Lesson 5: Types of Hackers
- Black Hat: Illegal hackers
- White Hat: Ethical hackers (permission ke sath)
- Grey Hat: Beech ka raasta
- Script Kiddie: Tools use karke show-off karta hai
Lesson 6: Phishing & Social Engineering
Phishing mein fake emails ya websites se logon ka data chura jaata hai.
Social engineering mein psychological tricks use ki jaati hain to fool people.
Lesson 7: MAC, DNS, DHCP
- MAC: Device ka unique hardware ID
- DNS: Website ka name to IP convert karta hai
- DHCP: IP automatically assign karta hai network mein
Lesson 8: Kali Linux
Kali Linux ek special OS hai ethical hacking ke liye. Ismein bohat saare built-in tools hote hain:
Nmap, Wireshark, Metasploit, Burp Suite etc.
Lesson 9: Linux Commands
- ls: file list karna
- cd: folder change karna
- pwd: current path
- ifconfig: IP details
Linux commands hacking mein bahut kaam aati hain.
Lesson 10: Nmap
Nmap ek network scanning tool hai.
Example:
- nmap [Link]
Isse pata chalta hai ke kaunse ports open hain aur kya services chal rahi hain.
Lesson 11: Wireshark
Wireshark se live network traffic sniff kiya ja sakta hai.
Hackers use karte hain passwords ya sensitive data pakarne ke liye.
Lesson 12: Metasploit
Metasploit exploitation framework hai jo known vulnerabilities ko exploit karta hai.
Iska use ethical hacking aur penetration testing mein hota hai.
Lesson 13: Website Testing
Burp Suite se websites ka security test kiya ja sakta hai.
SQL Injection, XSS, CSRF jaise bugs dhoondhne ke liye use hota hai.
Lesson 14: Password Cracking
- John the Ripper: Offline password cracker
- Hydra: Brute force tool for online services
Lesson 15: Bug Bounty
Bug bounty platforms (e.g., HackerOne, Bugcrowd) par ethical hackers ko rewards milte hain
agar woh legal tarike se bugs dhoondhte hain.
Lesson 16: TryHackMe & HackTheBox
Ye platforms practical labs provide karte hain hacking practice ke liye.
Free aur paid options available hain beginners aur pros ke liye.
Lesson 17: CTF Challenges
CTF (Capture the Flag) ek hacking competition hoti hai jisme tasks solve karke points milte hain.
Lesson 18: Safe Lab Setup
VirtualBox + Kali Linux ka use karke ek secure practice lab bana sakte ho.
Internet se isolate rakhna important hai.
Lesson 19: Cyber Law
Har hacking legal nahi hoti. Ethical hacking mein permission lena zaroori hota hai.
Pakistan mein cybercrime laws exist karte hain (PECA Act 2016).
Lesson 20: Cybersecurity Career
Cybersecurity ka future bright hai:
- Jobs: SOC Analyst, Penetration Tester, Security Consultant
- Certifications: CEH, OSCP, CompTIA Security+