How to use Kali Linux correctly!

If you have just installed Kali Linux, or want to become an ethical hacker, you can come to the right place. In this article I covered the Kali Linux tutorial so that beginners become advanced users.

After installing Kali Linux, you can find a solution to find out how you are using it. I am confronted with these problems as well. However, after covering these tutorials, you need to create your own tutorials and gradually understand this article. Ask that the network connection is good, first read these hacking terms, then go to the kali Linux tutorial.

Hacking terms you need to know about 


phishing scams 

         Phishing scams are a way of attacking online accounts (Facebook, Gmail, etc.) by creating a fake login page similar to the original login page. When you open the phishing page, it looks like the original page.

The advance version of phishing:
Desktop Phishing

Tabnapping

Desktop Phishing: This is a high level type of phishing. This is the same as the above method, but URLs are not replaced by computers this way. This process is affected. Opening facebook.com will open a hacker's fake page, but the URL will not be changed. All modern browsers detect desktop phishing and you need physical access to create phishing scam pages. If you need more information, please search for google for beginners.

Tabnapping: If you open many tabs while browsing the internet, you can easily hack your account in this way. In this attack, if the victim clicks the link from another site, for example, you and I are friends on Facebook and send this message via the Facebook link. Opening a link and opening another tab in 2-3 will replace the URL on the Facebook tab page with another page. Your account will be automatically canceled. You log in to your account again, I will get your password and you will be redirected to Facebook.com

Keylogger: This is the hardware software that records all words that the victim has entered from keywords. The main purpose of the keyboard recorder is to record passwords and user names by recording online accounts such as FB to record keywords. There are two types of keyloggers
  1. Software keylogger: These are software which records every keystroke. You can download free keylogger from the internet or make own if you can good knowledge of programming.
  2. Hardware Keylogger: Hardware keylogger are is hardware device which needs to connect to computer then it records our keystrokes. Nowadays Hardware keyloggers are attached to the keyboard for hacking credit cards etc. Here are some hardware keyloggers

I thinks this is enough for now. I'll post more about it later so tuned...

Comments

Popular Posts