Tag Archives: ethical hacking nepal

CEH Course Pt.2 – Scanning

After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization’s infrastructure and data.

It is in this phase that we get to know:

  • Live systems on the network by pinging
  • Find out services that are run on target
  • Find the TCP and UDP ports and services
  • Find the Operating System running on the target

Types of Scanning

  1. Port Scanning : To find open ports and services on target
  2. Network Scanning:  Find IP address in the network of the target
  3. Vulnerability Scanning: Find weakness or vulnerabilities on the target

Read CEH Questions for Exam here >  CEH QUESTIONS

Continue reading CEH Course Pt.2 – Scanning

[In Nepali] Learn Ethical Hacking – Part 6 : Passive Reconnaissance

‪#‎update‬ ‪#‎part6‬ ‪#‎released‬
‪#‎nhc‬ ‪#‎admin‬ here

– Learn Ethical Hacking [in nepali], Part 6 video tutorial is uploaded.

– In this video, I’ll give a lab demo on ‪#‎PassiveReconnaissance‬.‪#‎Reconnaissance‬ is a process of gathering information about target system. We will see ‪#‎Netcraft‬ & ‪#‎whois‬ in action here.

– This video series is all about Ethical Hacking. So, utilize the knowledge for security purpose and do not perform illegal activities. Stay Safe.

– Register now for NHC Forum here : http://nhc.bijayacharya.com/

Free Course – Ethical Hacking

Kali Linux Command Line Tutorials 1 – Introduction


Ethical Hacking “A DEFENCE DIET”

 This Video Explains about :
1. Introduction to Ethical Hacking “Overview”
– Category of Hackers, Ethical Hacking, Warnings.
– Penetration Test,Testing Models
2. Revealing Asterisk
– Hacking Passwords Behind ‘dots/asterisk’ from Facebook Login Page.
3. KeyLogging Attack
– Local Attack with Software
– Recording each keystrokes of pressed keys/text
– Effective if used brilliantly
– Can be used to hack all kind of emails and passwords.
4. Phising Attack
– Fake Link Creation and Phising Users.
– Getting all login credential of targeted users.
– ‘Must Have Knowledge’ for all Internet users.
5. Virtual Lab for Hacking Research Continue reading Ethical Hacking “A DEFENCE DIET”

IT SOLUTION POKHARA (Introduction to our channel – Pokhara, Nepal)

How to Start Networking in Backtrack

This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of “new” people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo)

1. To start networking in Backtrack 4 final issue the following command.

/etc/init.d/networking start

This will attempt to start all the interfaces in the /etc/network/interfaces file.

root@bt:~# cat /etc/network/interfaces
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp

auto eth1
iface eth1 inet dhcp

auto eth2
iface eth2 inet dhcp

auto ath0
iface ath0 inet dhcp

auto wlan0
iface wlan0 inet dhcp

If you don’t have or don’t want some of these interfaces then simply remove the from this file and they will not start.

If you need to set a static IP just set the variables in the /etc/network/interfaces file

auto eth0
iface eth0 inet static

You will also need to make sure you set a nameserver in /etc/resolv.conf

root@bt:~# cat /etc/resolv.conf

So for example if all you have is eth0 and wlan0 on your system and you want them both to get a adress via DHCP then remove every thing else for the file with the exception of the lo interface. Here is a example.

root@bt:~# cat /etc/network/interfaces
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp

auto wlan0
iface wlan0 inet dhcp

Now if are lazy and want all this to start at boot you can simply issue this command as root

update-rc.d networking defaults

This will create all the proper sym-links

What about ssh?

So while I am on the subject I may as well go over ssh. In order to use ssh on backtrack 4 final you need to generate the keys first.


after that you can start ssh like this:

/etc/init.d/ssh start

or you can add it to the boot sequence like this:

update-rc.d ssh defaults

Well thats enough to get up and running. I hope this was somewhat helpful to any one just getting started with backtrack.

Installing nVidia Video Card drivers

Those of us using Nvidia Chipsets… After finishing the HDD install:

Start Networking and connect to the internet.

/etc/init.d/networking start
wicd && wicd-client &

Find your card:

lspci|grep nVidia

My lspci output

Now go to nVidia Driver Downloads. Select the card that you have (as highlighted on my lspci in the above linked image), and download the driver for 32-Bit Linux TO YOUR /root DIRECTORY.

Once it’s downloaded, press <Ctrl>+<Alt>+<Backspace> to kill your X session.

Now type the following on the command line (Press the TAB key at <tab> for tab completion):

sh NV<tab>

And hit the <Enter> key. Run through the installer.

Now run:

apt-get install nvidia-settings

Now, when you’re back in the BT GUI, click the KDE Menu (little dragon, bottom left-hand side of the screen) and you will find Nvidia X Server Settings under the System menu.

You’re done, and X is configured to like your card!

Install BackTrack in VMWare : How To

Install BackTrack in VMWare.

    1. Follow the basic install instructions here to get BackTrack installed in a VMware machine.
    2. Log into BackTrack. To install the VMWare drivers, the kernel source and headers need to be in place. By default in the BackTrack 4 final release, the kernel (denoted by {version} ) is configured and ready. However in some cases, you might need to make sure you have the latest kernel sources by typing in:


 apt-get update apt-get install linux-source cd /usr/src tar jxpf linux-source-{version}.tar.bz2 ln -s linux-source-{version} linux cd linux zcat /proc/config.gz &gt; .config make scripts make prepare


    1. Now that your kernel sources and headers are in place, run the “Install VMWare tools” for the specific guest VM.
    2. Mount the VMWare tools virtual cd, copy over the VMWare tools package and run the installer:


mount /dev/cdrom3 /mnt/cdrom cp /mnt/cdrom/VMwareTools-{version}.tar.gz /tmp/ cd /tmp/ tar zxpf VMwareTools-{version}.tar.gz cd vmware-tools-distrib ./vmware-install.pl


  1. Complete the VMWare tools installation as required. Run “fix-splash” to reintroduce the green framebuffer console. Reboot.