Hacking Phases || Reconnaissance | Scanning | Gaining and Maintaining Access | All in Hindi

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ก.พ. 2020
  • Welcome to another exciting episode from Cyberwings Security!
    Hacking is a complex process that involves multiple phases. In this video, we will discuss the five common phases of hacking in detail:
    Reconnaissance: The first phase of hacking is reconnaissance, where the attacker gathers information about the target system. This information can be obtained from a variety of sources, such as public records, social media, and website scraping.
    Scanning: Once the attacker has gathered enough information about the target system, they will begin scanning it for vulnerabilities. This involves using a variety of tools to identify open ports, running services, and known vulnerabilities.
    Gaining Access: Once the attacker has identified a vulnerability, they will attempt to exploit it to gain access to the target system. This can be done in a variety of ways, such as SQL injection, cross-site scripting, and password attacks.
    Maintaining Access: Once the attacker has gained access to the target system, they will need to maintain that access in order to achieve their goals. This may involve installing malware, creating backdoors, or escalating their privileges.
    Covering Tracks: Once the attacker has completed their goals, they will need to cover their tracks to avoid detection. This may involve deleting log files, disabling security features, or destroying evidence.
    This video will provide you with a comprehensive overview of the hacking phases, as well as examples and demonstrations of how each phase is carried out. Whether you are a security professional, a network administrator, or simply curious about how hacking works, this video is for you.
    Keywords: hacking, hacking phases, reconnaissance, scanning, gaining access, maintaining access, covering tracks, ethical hacking, penetration testing, cybersecurity
    Call to Action:
    Subscribe to our channel for more informative videos on cybersecurity and hacking.
    Connect with me:
    📷 Instagram: / rahulkumar_2620
    💼 LinkedIn: / rahul-kumar-b35794165
    📟 Join me on WhatsApp: whatsapp.com/channel/0029VaDX...
    🌐 Website: cws.net.in/
    📡 Telegram Channel: - t.me/Channel_CWS
    👍 If you find this video helpful, don't forget to give it a thumbs up and share it with your network. Subscribe to our channel for more insightful content on ethical hacking, digital forensics, and penetration testing.
    🔔 Hit the notification bell to stay updated whenever we release new videos! Have questions or ideas for future topics? Drop them in the comments below.
    #cybersecurity #ethicalhacking #digitalforensics #penetrationtesting #CyberwingsSecurity #InfoSec #OnlineSafety #DataProtection #CyberAwareness #CybersecurityExplained #TechTips #LearnCybersecurity #HackerSkills #CyberEducation #CyberTech #SecurityTools #CyberLearning #ITSecurity #CyberThreats #cybersecuritycareers #cybersecuritytips #cybersecurityforbeginners
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 19

  • @Vinay-hx2sz
    @Vinay-hx2sz 3 ปีที่แล้ว +4

    These lecture are awesome ❤️

  • @AshishKumar-cp9og
    @AshishKumar-cp9og 3 ปีที่แล้ว +4

    Sir please make full playlist on networking 🙏🏻🙏🏻

  • @karansirso6450
    @karansirso6450 4 ปีที่แล้ว +2

    it's amazing information video

  • @ROOH_E_MASIH
    @ROOH_E_MASIH ปีที่แล้ว

    Thanks bro lot of love n support from 🇨🇦

  • @techsci9661
    @techsci9661 3 ปีที่แล้ว

    U r fabulous brother ❤️❤️

  • @neetisingh96
    @neetisingh96 4 ปีที่แล้ว +1

    It's useful 👍

  • @techsci9661
    @techsci9661 3 ปีที่แล้ว

    Nice bro I love your videos

  • @zizuzuzu3958
    @zizuzuzu3958 ปีที่แล้ว +1

    bht mushkil sy koi channel mila hai jiski smjh bhi lag rahi hai
    please dvwa ki playlist bna dain ek

  • @AnkitYadav-mo2eh
    @AnkitYadav-mo2eh 4 ปีที่แล้ว

    Good information sir

  • @karansirso6450
    @karansirso6450 4 ปีที่แล้ว +4

    lagtaa hai aap ethical hacker ho

  • @gamerversez5372
    @gamerversez5372 ปีที่แล้ว

    Understood Sir

  • @sspkjoshimemes9873
    @sspkjoshimemes9873 ปีที่แล้ว +1

    👍

  • @HindiKahaniyanTV-vf2hu
    @HindiKahaniyanTV-vf2hu ปีที่แล้ว

    Sir please make full course in vulnerability

  • @makarsh29
    @makarsh29 6 หลายเดือนก่อน

    Reconnaissance
    Weaponization
    Delivery
    Exploitation
    Installation
    Command and control
    Actions on objectives

  • @rohitgaonkar4262
    @rohitgaonkar4262 ปีที่แล้ว

    Sir please make full play😊😊😊😊😊

  • @zizuzuzu3958
    @zizuzuzu3958 ปีที่แล้ว

    dvwa installation aur labs krwa dain please

  • @cehreceh3264
    @cehreceh3264 ปีที่แล้ว

    How he gets access

  • @VishalKumar-ez3rd
    @VishalKumar-ez3rd 2 ปีที่แล้ว

    Sir ji mujhe hacking sikhni hai mai kaha s sikhu hacking please sir RPL

    • @cyberwingssecurity
      @cyberwingssecurity  2 ปีที่แล้ว

      If you want training on ethical hacking, kindly contact on our WhatsApp
      +91-6399978274