HACKING PART ALL top 10 part see..

🛡️ Ethical Hacking — āĻāĻ•-āĻĒেāϜ āĻ—াāχāĻĄ (Part 1–6, 8–10)

āĻĒাāϰ্āϟ ā§§: Ethical Hacking āĻ•ী? āĻ•েāύ āϜāϰুāϰি?

"āĻš্āϝাāĻ•িং" āĻļāĻŦ্āĻĻāϟি āύিāϝ়ে āĻ­ুāϞ āϧাāϰāĻŖা āĻĻূāϰ āĻ•āϰা āϜāϰুāϰি। Ethical Hacking āĻšāϞো āĻ…āύুāĻŽāϤি āύিāϝ়ে āϏিāϏ্āϟেāĻŽ/āύেāϟāĻ“āϝ়াāϰ্āĻ•/āĻ“āϝ়েāĻŦ āĻ…্āϝাāĻĒেāϰ āĻĻুāϰ্āĻŦāϞāϤা āĻ–ুঁāϜে āĻŦেāϰ āĻ•āϰে āϰিāĻĒোāϰ্āϟ āĻ•āϰা—āϝাāϤে āϏিāϏ্āϟেāĻŽ āφāϰāĻ“ āύিāϰাāĻĒāĻĻ āĻšāϝ়।

✅ āĻ…āύুāĻŽāϤিāϏāĻš āϟেāϏ্āϟ 🧾 āĻĻাāϝ়িāϤ্āĻŦāĻļীāϞ āϰিāĻĒোāϰ্āϟিং 📜 āφāχāύেāϰ āĻ…āύুāĻ—āϤ
āϝাāϰ āϝা āϞাāĻ—āĻŦে: āĻŦেāϏিāĻ• āύেāϟāĻ“āϝ়াāϰ্āĻ•িং, āĻĒ্āϰোāĻ—্āϰাāĻŽিং (Python/Bash/JS), āĻāĻŦং āϟুāϞāϏ (Nmap, Wireshark, Metasploit āχāϤ্āϝাāĻĻি) āĻŦ্āϝāĻŦāĻšাāϰেāϰ āĻĻāĻ•্āώāϤা।

āĻ•েāύ āĻļিāĻ–āĻŦে?

  • 🔒 āϏাāχāĻŦাāϰ āύিāϰাāĻĒāϤ্āϤা āĻŦাāĻĄ়াāϤে
  • đŸ’ŧ āĻ­াāϞো āĻ•্āϝাāϰিāϝ়াāϰ āϏুāϝোāĻ—
  • đŸŽ¯ āύিāϜেāϰ āĻ…্āϝাāĻ•াāωāύ্āϟ/āĻĄিāĻ­াāχāϏ āϏুāϰāĻ•্āώিāϤ āϰাāĻ–āϤে

āĻĒাāϰ্āϟ ⧍: āĻĒāϰিāĻŦেāĻļ āĻĒ্āϰāϏ্āϤুāϤি — Termux & Pydroid3

# Termux āϏ্āϟোāϰেāϜ āĻĒাāϰāĻŽিāĻļāύ

termux-setup-storage

āφāĻĒāĻĄেāϟ/āφāĻĒāĻ—্āϰেāĻĄ

pkg update && pkg upgrade -y

āĻĒ্āϰাāĻĨāĻŽিāĻ• āϟুāϞāϏ

pkg install python git nano -y pip install --upgrade pip

āĻ…āϤিāϰিāĻ•্āϤ āϰেāĻĒো (āĻĒ্āϰāϝ়োāϜāύে)

pkg install root-repo unstable-repo

āĻ­াāϰ্āϏāύ āϝাāϚাāχ

python --version git --version 
āϟিāĻĒāϏ: āĻĒ্āϰāϝ়োāϜāύে pkg clean āĻĻিāϝ়ে āĻ•্āϝাāĻļ āĻ•্āϞিāϝ়াāϰ āĻ•āϰুāύ; Python āĻ­াāϰ্āϚুāϝ়াāϞ āĻāύāĻ­াāϝ়āϰāύāĻŽেāύ্āϟ āĻŦ্āϝāĻŦāĻšাāϰ āĻ•āϰāϞে āĻĄিāĻĒেāύāĻĄেāύ্āϏি āφāϞাāĻĻা āĻĨাāĻ•ে।

āĻĒাāϰ্āϟ ā§Š: Linux/Termux āĻ•āĻŽাāύ্āĻĄ āĻŦেāϏিāĻ•

# āĻĢাāχāϞ/āĻĄিāϰেāĻ•্āϟāϰি

ls -la cd storage/shared pwd mkdir recon_lab rm -r old_folder

āĻāĻĄিāϟāϰ

nano script.py vim notes.txt

āĻĒাāϰāĻŽিāĻļāύ/āϰাāύ

ls -l chmod +x run.sh ./run.sh python3 script.py

āĻĒ্āϝাāĻ•েāϜ āĻŽ্āϝাāύেāϜাāϰ

pkg install nmap pkg update && pkg upgrade pip install requests beautifulsoup4 pip list 

āĻĒাāϰ্āϟ ā§Ē: Footprinting & Reconnaissance

Passive OSINT āĻĨেāĻ•ে āĻļুāϰু āĻ•āϰে Active āϏ্āĻ•্āϝাāύ—āϏāĻŦāĻ•িāĻ›ুāχ āĻļুāϧু āĻ…āύুāĻŽোāĻĻিāϤ āϟাāϰ্āĻ—েāϟে!

# WHOIS

whois example.com

DNS āϰেāĻ•āϰ্āĻĄāϏ (āĻĒ্āϰāĻĨāĻŽে dnsutils āχāύāϏ্āϟāϞ)

pkg install dnsutils dig example.com ANY +noall +answer

theHarvester (āχāĻŽেāχāϞ/āϏাāĻŦāĻĄোāĻŽেāχāύ)

pip install theharvester theharvester -d example.com -b google -l 200

Sublist3r / Amass

pip install sublist3r sublist3r -d example.com -o subs.txt pkg install amass amass enum --passive -d example.com -o amass_subs.txt

Active Recon

nmap -sn 192.168.1.0/24 pkg install inetutils traceroute example.com nmap -sV -p 80,443 example.com 

āĻĒাāϰ্āϟ ā§Ģ: Scanning & Enumeration

# Nmap āĻŦেāϏিāĻ•

nmap -p- target.com nmap -sC -sV target.com nmap -A target.com nmap -p 22,80,443,3306 target.com

NSE

ls /data/data/com.termux/files/usr/share/nmap/scripts/ nmap --script http-vuln* -p80,443 target.com nmap --script smb-enum* -p445 target.com

Enumeration āϟুāϞāϏ

pkg install enum4linux enum4linux -a 192.168.1.10 pkg install snmp snmpwalk -v1 -c public 192.168.1.10 rpcclient -U "" 192.168.1.10 

āĻĒাāϰ্āϟ ā§Ŧ: Vulnerability Analysis

āĻ…āϟোāĻŽেāĻļāύ + āĻŽ্āϝাāύুāϝ়াāϞ āϟেāϏ্āϟ = āĻļāĻ•্āϤিāĻļাāϞী āĻ­āϞāύাāϰেāĻŦিāϞিāϟি āĻ…্āϝাāϏেāϏāĻŽেāύ্āϟ।

# Nikto (āĻ“āϝ়েāĻŦ āϏাāϰ্āĻ­াāϰ āϏ্āĻ•্āϝাāύ)

pkg install nikto nikto -h http://target.com -o nikto_report.txt

wfuzz (āĻĄিāϰেāĻ•্āϟāϰি āĻĢাāϜিং)

pip install wfuzz wfuzz -c -z file,/usr/share/wordlists/dirb/common.txt --hc 404 

http://target.com/FUZZ | tee wfuzz_report.txt 
āύিāϰ্āĻĻেāĻļāύা: CVE/NVD āĻĻেāĻ–ে āĻুঁāĻ•িāϰ āĻŽাāϤ্āϰা (CVSS) āĻŦোāĻো āĻāĻŦং āϰিāĻŽেāĻĄিāϝ়েāĻļāύ āϞিāĻ–ে āϰাāĻ–ো।

āĻĒাāϰ্āϟ ā§­: āϏেāĻĢ āϞ্āϝাāĻŦ (āύিāϰাāĻĒāĻĻ āĻŦিāĻ•āϞ্āĻĒ)

āφāĻĒāύাāϰ āĻĻেāϝ়া "Sample Virus Creation" āĻ…āύুāϰোāϧāϟি āĻুঁāĻ•িāĻĒূāϰ্āĻŖ āĻšāĻ“āϝ়াāϝ় āĻāĻ–াāύে āĻāĻ•āϟি āύিāϰাāĻĒāĻĻ āĻŦিāĻ•āϞ্āĻĒ āϝোāĻ— āĻ•āϰা āĻšāϝ়েāĻ›ে—āϝাāϤে āĻ•োāύো āĻ•্āώāϤি āύা āĻ•āϰে āĻļেāĻ–া āϝাāϝ়।

  • ✔️ File Monitoring: āĻāĻ•āϟি āĻĄিāϰেāĻ•্āϟāϰিāϤে āύāϤুāύ/āĻĒāϰিāĻŦāϰ্āϤিāϤ āĻĢাāχāϞ āϞোāĻ— āĻ•āϰা
  • ✔️ Backup & Restore: āĻĢাāχāϞ āĻ•āĻĒি, āĻš্āϝাāĻļ āϝাāϚাāχ, āĻ•্āϞিāύāφāĻĒ
  • ✔️ Startup Message (Local App Only): āĻ•āύāϏোāϞে āϏ্āĻŦাāĻ—āϤāĻŽ āĻŦাāϰ্āϤা (āϏিāϏ্āϟেāĻŽ āĻ•āύāĻĢিāĻ— āύা āĻ›ুঁāϝ়ে)
"""

āϏেāĻĢ āϞ্āϝাāĻŦ āϏ্āĻ•্āϰিāĻĒ্āϟ: āĻ•োāύো āϏিāϏ্āϟেāĻŽ-āĻĢাāχāϞ āĻĒāϰিāĻŦāϰ্āϤāύ āĻ•āϰে āύা। āĻļুāϧু āĻāĻ•āϟি āϞ্āϝাāĻŦ āĻĢোāϞ্āĻĄাāϰে āĻ•াāϜ āĻ•āϰে āĻāĻŦং āϰিāĻŽুāĻ­েāĻŦāϞ। """ import hashlib, os, shutil, time

LAB = "safe_lab" os.makedirs(LAB, exist_ok=True)

1) Backup & Verify

def sha256(p): h = hashlib.sha256() with open(p,'rb') as f: for ch in iter(lambda: f.read(8192), b''): h.update(ch) return h.hexdigest()

src = os.path.join(LAB, "sample.txt") with open(src, 'w', encoding='utf-8') as f: f.write("demo data\n")

bkp = os.path.join(LAB, "sample.txt.bak") shutil.copy(src, bkp) print("✓ āĻŦ্āϝাāĻ•āφāĻĒ āϤৈāϰি:", bkp) print("✓ āĻš্āϝাāĻļ āϝাāϚাāχ:", sha256(src) == sha256(bkp))

2) Directory Monitor (polling)

print("Watching for changes in:", LAB) base = {f: os.path.getmtime(os.path.join(LAB,f)) for f in os.listdir(LAB)} for _ in range(3): # āĻ›োāϟ āĻĄেāĻŽো time.sleep(1) now = {f: os.path.getmtime(os.path.join(LAB,f)) for f in os.listdir(LAB)} added = set(now) - set(base) changed = {f for f in now if f in base and now[f] != base[f]} for f in added: print("+ added:", f) for f in changed: print("~ changed:", f) base = now

3) Cleanup (optional)

os.remove(bkp) print("✓ āĻ•্āϞিāύāφāĻĒ āϏāĻŽ্āĻĒāύ্āύ") 
āĻ•েāύ āĻāχ āĻŦিāĻ•āϞ্āĻĒ? āϏিāĻ•িāωāϰিāϟি āĻļেāĻ–া āĻŽাāύে āϏিāϏ্āϟেāĻŽেāϰ āĻ“āĻĒāϰ āĻĻাāϝ়িāϤ্āĻŦāĻļীāϞ āĻĒāϰীāĻ•্āώা—āĻ•্āώāϤি āĻ›াāĻĄ়া āĻĢāϞাāĻĢāϞ āĻ…āύুāĻļীāϞāύ।

āĻĒাāϰ্āϟ ā§Ž: Web Architecture & HTTP/HTTPS āĻĢ্āϞো

# curl āĻĻিāϝ়ে GET/POST

curl -i http://127.0.0.1:5000/hello curl -i -X POST -d "user=Md&msg=Hi" http://127.0.0.1:5000/hello

mitmproxy (āĻļুāϧু āύিāϜেāϰ āϞ্āϝাāĻŦ āϟ্āϰাāĻĢিāĻ•েāϰ āϜāύ্āϝ)

pip install mitmproxy mitmproxy --showhost 
Simple Flask āĻĄেāĻŽো (āĻļিāĻ•্āώাāĻŽূāϞāĻ•)
from flask import Flask, request, make_response app = Flask(name)

@app.route('/hello', methods=['GET','POST']) def hello(): user = request.values.get('user','Guest') resp = make_response(f"Hello, {user}!") resp.set_cookie('sessionid','abc123', httponly=True) return resp

if name == 'main': app.run(host='0.0.0.0', port=5000) 

āĻĒাāϰ্āϟ ⧝: OWASP Top 10 āĻĒāϰিāϚিāϤি

āϏāĻŦāϚেāϝ়ে āĻĒ্āϰāϚāϞিāϤ ā§§ā§Ļāϟি āĻ“āϝ়েāĻŦ āĻĻুāϰ্āĻŦāϞāϤা—āωāĻĻাāĻšāϰāĻŖ, āĻĒ্āϰāĻ­াāĻŦ āĻ“ āĻĒ্āϰāϤিāĻ•াāϰ āϏংāĻ•্āώিāĻĒ্āϤāĻ­াāĻŦে:

  • Injection → Prepared Statements, Input Validation
  • Broken Authentication → MFA, āϏেāĻļāύ āĻŽ্āϝাāύেāϜāĻŽেāύ্āϟ
  • Sensitive Data Exposure → HTTPS/TLS, At-Rest Encryption
  • XXE → āύিāϰাāĻĒāĻĻ XML Parsers
  • Broken Access Control → RBAC, Server-side Checks
  • Security Misconfiguration → Hardened Config, Audit
  • XSS → Output Encoding, CSP
  • Insecure Deserialization → Integrity Checks
  • Known Vulns → āύিāϝ়āĻŽিāϤ āφāĻĒāĻĄেāϟ
  • Insufficient Logging → Centralized Logging & Alerting
āĻĒ্āϰ্āϝাāĻ•āϟিāϏেāϰ āϜāύ্āϝ: OWASP Juice Shop (āύিāϜ āϞ্āϝাāĻŦ āĻĒāϰিāĻŦেāĻļে)।

āĻĒাāϰ্āϟ ā§§ā§Ļ: SQL Injection (āĻļিāĻ•্āώাāĻŽূāϞāĻ•)

āϧāϰāύ: Error/Union, Blind (Boolean/Time), Out-of-band। āĻĒ্āϰāϤিāĻ•াāϰ: Parameterized Query, ORM, Input Validation, WAF।

# SQLMap (āĻ…āύুāĻŽোāĻĻিāϤ āϞ্āϝাāĻŦ āϟাāϰ্āĻ—েāϟে)

sqlmap -u "http://target.local/vuln.php?id=1" --batch --dbs 
āϏāϤāϰ্āĻ•āϤা: āϏāϰ্āĻŦāĻĻা āĻ•েāĻŦāϞāĻŽাāϤ্āϰ āφāĻĒāύাāϰ āĻ…āύুāĻŽোāĻĻিāϤ āϏ্āĻ•োāĻĒে āϟেāϏ্āϟ āĻ•āϰুāύ।

© Ethical Learning — āφāχāύ āĻŽেāύে āĻļেāĻ–া। āĻāχ āĻĄāĻ•ুāĻŽেāύ্āϟ āĻļিāĻ•্āώাāĻŽূāϞāĻ• āωāĻĻ্āĻĻেāĻļ্āϝে āϤৈāϰি।

Comments

Popular posts from this blog

Facebook Recovery Rule

My Favourite Sir