Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,155,681 members, 7,827,517 topics. Date: Tuesday, 14 May 2024 at 12:59 PM |
Nairaland Forum / Magimazda's Profile / Magimazda's Posts
(1) (2) (of 2 pages)
Certification And Training Adverts / Re: Learn Ethical Hacking From Scratch by magimazda: 2:03pm On Feb 14, 2019 |
Escalze: Now throughout the course, we're going to be using a number of penetration testing tools. You can go ahead and install each of these tools manually or save time and effort and use an operating system designed for hacking. We're going to use an operating system called Kali Linux and it's just a flavor of Linux based on Debian. It comes with all the programs and the applications that we need to use preinstalled and preconfigured. This means that we can just install this operating system and then start learning how to hack. There are two options to install. You can install it as a virtual machine inside your current operating system or you can install it on your main machine/PC as your main operating system. Throughout the course, we're actually going to be using it as a virtual machine because using it as a virtual machine works exactly the same as installing it as your main OS. This is because it'll be completely isolated from your computer as it's only going to run inside a virtual box. So if you break it or if you mess things up it's very very easy to fix. It's very easy to go back to other snapshots, backups, other configurations and you also won't lose any functionality by using it as a virtual machine. That's why I always use it as a virtual machine. In this lecture, I'm going to cover how to install it as a virtual machine inside a virtual box. Now I'm going to be doing the steps on a Windows 10 computer but these steps are exactly the same regardless of what operating system you use. If you're on Mac OS or on Linux you just have to download the virtual box version for your computer and then the steps shown in this lecture are exactly the same after installing virtual box. Here's the link to download Kali Linux: https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/ Scroll down and make sure you click on the Kali Linux Virtual Box Images, not on the VMware images. And then download the version of Karli that's compatible with your system. So if you have a 64 bits computer, download the 64 bits. If you have a 32 bits computer download the 32 bits. You can find out how to check your computer bits here: [for Mac] https://www.chiefarchitect.com/support/article/KB-01230/determining-if-your-computer-is-32-bit-or-64-bit.html; [for windows] https://www.chiefarchitect.com/support/article/KB-01230/determining-if-your-computer-is-32-bit-or-64-bit.html; [for Linux] https://www.fastwebhost.in/blog/how-to-find-if-linux-is-running-on-32-bit-or-64-bit/ Now click on the right link and it will start the download for you. (As of the time of this post the Kali Linux OS is 3.6 GB) If you're using Internet Explorer or Edge browser then you're going to have to right click and save target as. On Chrome and Firefox, you can just click the link. When you're done downloading Kali Linux, please indicate by leaving a comment and we'll proceed. Cheers 2 Likes 1 Share
|
Certification And Training Adverts / Re: Learn Ethical Hacking From Scratch by magimazda: 12:47am On Feb 14, 2019 |
Escalze:OP is still here o. I'm sorry for keeping you waiting guys. I'll be posting at least once a day from now till we finish. If I can't, I'll tell you. Thank you so much for your patience. |
Certification And Training Adverts / Re: Learn Ethical Hacking From Scratch by magimazda: 5:37am On Feb 13, 2019 |
As mentioned earlier, the course will be very practical. In order to be able to do this, we need a lab where we can learn and execute attacks. To do this, we're going to use a program called a virtual box. Virtual Box is a program that lets us install other Operating Systems inside our own computers. So if you have a computer, and want to install other computers on your computer, you can get a virtual machine. A Virtual Machine or VM (this is what I'll be calling it from now) is very important for us to use to set up for penetration testing and to set up the lab where we will hack from. It's important to note now that the VM is like a completely separate work machine. You have nothing to lose by installing an operating system (OS) inside a VM. The OS will perform just like you installed it on a separate laptop. So basically instead of having four or five computers/laptops around us so we can try to hack into them, we are going to install these computers as VMs inside our own computer. Now, this may be a bit vague, but once we do this it will become very clear to you how this is going to work. So basically, we're gonna have three computers inside our main computer. For me, my main computer is Windows 10 and I am not going to do anything with that. This is just my OS where I make these posts from. Then we'll have an attacker OS, and it will be Kali Linux, (I'll explain about Kali Linux in a bit). Once we install that, then we will install two victims. Victim 1 will be a normal Windows OS and Victim 2 will have an operating system called Metasploitable. (I will talk about what it is.) So basically we will have our own OS, and then we will have three separate machines in this host OS, which are the ones we want to use for penetration testing attacks. And they will be Kali Linux (the machine we use to attack) and 2 other victim machines or OSs. All this is possible, because of the program Virtual Box. Virtual box is free and you can download it from the link below. First of all download and install Virtual Box from [url] https://www.virtualbox.org/wiki/Downloads[/url] (It's about 210mb for Windows users.) There is a virtual box for Windows, Mac OS X, and Linux operating system. Download the virtual box version compatible with your operating system. It's simple and easy. Now, in the next few lectures, we have to learn how to install Kali Linux and the two victim machines. I will talk about what these machines do and why we are gonna use them. If you're done installing Virtual Box, please indicate by leaving a comment. Thanks all! 3 Likes
|
Art, Graphics & Video / Re: Annie Leibovitz Photography Masterclass by magimazda: 4:57am On Feb 13, 2019 |
Timagex: I can tell you based on reviews. This is not a course where you get technical instructions. You get to see behind-the-scenes footage of Annie at work for Rolling Stone Magazine. You get to understand why and how she directs her photo subjects as a portrait photographer. You get assimilate how a professional's mind works and why she makes certain decisions. You will not get technical details like what camera she uses or, what settings to use when taking your own pictures, or how many people to have on set. You will have only her mindset on photography to emulate. However, let's discuss on whatsapp for more details. Thanks |
Art, Graphics & Video / Re: Annie Leibovitz Photography Masterclass by magimazda: 4:51am On Feb 13, 2019 |
Paulo3ree: 08180479356 |
Art, Graphics & Video / Re: Annie Leibovitz Photography Masterclass by magimazda: 8:30pm On Feb 11, 2019 |
Timagex:I can give you the Masterclass for ₦10,380. I don't take pictures. |
Certification And Training Adverts / Re: Learn Ethical Hacking From Scratch by magimazda: 8:01am On Feb 06, 2019 |
Engrbenny:You are welcome sir |
Webmasters / Re: Recommend A Reliable Bulk SMS Company/site by magimazda: 3:23am On Feb 06, 2019 |
Amac2019: I know you'd do the same for me. 1 Like |
Art, Graphics & Video / Re: Annie Leibovitz Photography Masterclass by magimazda: 2:54am On Feb 06, 2019 |
naturefellow: Ok. Message me your no. we'll chat on whatsapp. |
Art, Graphics & Video / Re: Annie Leibovitz Photography Masterclass by magimazda: 2:53am On Feb 06, 2019 |
jeffcheddy: Anywhere in Lagos. |
Certification And Training Adverts / Learn Ethical Hacking From Scratch by magimazda: 2:48am On Feb 06, 2019 |
Hello and welcome. I'll be your instructor for this course and where you'll learn how to become an ethical hacker from scratch. I will assume that you have no experience in ethical hacking and will take you to a high intermediate level. The first section of section of this course will teach you how to create your own lab so that you can practice ethical hacking on your own computer. You'll learn how to install Linux systems, interact with them and set up other systems to try and hack into them. Then we're going to move in into our four main penetration testing sections. The first thing that you're going to learn is how that particular style of penetration testing works. And then we're going to learn how to test the security of that system. For example on the network penetration testing the first thing you're going to learn is how networks work and how devices interact with each other. And then you'll learn how to try and hack into these devices and control all the connections around you. You'll learn how to set up a fake access point for people to connect to so you can capture all the data they send or receive. You'll also learn how to get the password for any Wi-Fi network. WEP, WPA or WPA encryptions. You also learn a very large number of powerful attacks which will allow you to gain access to any account accessed by any computer in your network. You'll be able to get usernames, passwords, images, pictures; basically anything that computers on your network send or receive. Then we'll move into the gaining access section and where you'll learn to gain access to computer systems using two methods: 1. Server side attacks 2. Client side attacks You'll discover weaknesses in two programs installed on the target computer and use those weaknesses to gain full access to that computer. Then we're going to move into the client side attacks in which we're going to be learning about the client using social engineering. We'll create undetectable back doors hidden in things like pictures. You'll also learn how to gain access to any computer (if that computer exists in your network) using fake updates and fake downloads. Next we'll move into the post exploitation section in which you'll learn how to control the devices that you already have. We'll see how you can open the web cam, manage the files, download or upload files and capture all the keystrokes that the person enters on their keyboard. We'll also learn how to use the hacked computer in order to gain access to other computers. Then we'll enter the last section of our penetration testing section which is going to be the Web site penetration testing. You'll learn to penetrate Web sites and gather comprehensive information. And we're going to see how to discover and exploit a large number of very serious vulnerabilities. Once done with each of these sections, you'll learn how to protect yourself and how to protect your systems from the attacks. 6 Likes |
Programming / Re: Need A Serious Web Developer /application Developer For A Various Projects by magimazda: 2:04am On Feb 06, 2019 |
Okontami: Hi Okontami, Please see https://londontome.com. Whatsapp only 08180479356 |
Webmasters / Re: Recommend A Reliable Bulk SMS Company/site by magimazda: 1:55am On Feb 06, 2019 |
Amac2019: Hi, I can recommend two: http://smslive247.com/ and http://tracksend.co/ (these guys actually track the messages and tell you how many people opened them) |
Webmasters / Re: . by magimazda: 1:28am On Feb 06, 2019 |
Naijajeodax: Bro, Let's solve this your hosting problem today. You can move your Wordpress site to my UK based hosting for a N3273.56 monthly payment. The hosting is never down. If it goes down, you'll get your money back for that month. Simple. Oh and you can have your first month free as a test. If you're interested Whatsapp only: 08180479356 Phone calls and texts: 09079320298 Cheers |
Science/Technology / Re: Owls Are Not Witches: See Some Facts You Did Not Know About Them by magimazda: 4:18am On Jan 29, 2019 |
israelboy1: That's why all those people ran, jumped and drowned in the canal during Ikeja Bomb blast, they saw people running, without knowing the cause of it and followed. Ji... ma sun; stay woke ppl. Make informed decisions. Word to the wise! |
Art, Graphics & Video / Annie Leibovitz Photography Masterclass by magimazda: 9:29am On Oct 31, 2018 |
Anybody interested? 1 Like |
Webmasters / Re: Learn Web Design LIVE On Nairaland!!! by magimazda: 9:25am On Oct 31, 2018 |
Please text 08180479356 for nanodegree web developer course from udacity.com |
Webmasters / Udacity Courses by magimazda: 9:23am On Oct 31, 2018 |
Please text 08180479356 for nanodegree courses on udacity.com |
Programming / Re: Africans And Nigerians On The Dark Web by magimazda: 9:01am On Oct 30, 2018 |
airsaylongcon: Visit: https://thehiddenwiki.org 1 Like 2 Shares |
Web Market / N600/30 Days For Unlimited Hosting by magimazda: 4:35pm On Aug 07, 2018 |
Do you want: unlimited Monthly Bandwidth - so your site can take heavy traffic and still be fast Unlimited Email Accounts - so you can make as many company emails as you want Unlimited MySQL Databases - so you can store unlimited information An SSL certificate -so you can process payments Daily backups - so your data is never lost for N600/30 days? |
Programming / Re: I Want To Learn From Scratch How Yo Build An App Like UBER by magimazda: 3:51pm On Aug 07, 2018 |
emmanuelbrown26:contact 08180479356 |
Education / Re: The Ancient Pyramids - I Know How It Was Built, Why It Was Built, Who Built It. by magimazda: 2:20am On Dec 01, 2016 |
freecocoa: paranorman is right bout time travel. Google Einstein's books and study the theory of relativity if you wish to know how. |
Programming / Re: I Want To Learn From Scratch How Yo Build An App Like UBER by magimazda: 5:45pm On Nov 30, 2016 |
you could also try udacity.com. They have a really good free android beginners course |
Music/Radio / For Artistes And Producers by magimazda: 2:44pm On Nov 30, 2016 |
Hi everyone, I am part of a team of people who believe in making solutions for Nigerians. And I've got 2 Questions... 1. Music producers, do you need an online platform to sell your beats (instrumentals) to artistes around the world? 2. Artistes, do you need a platform to buy great beats (instrumentals) from producers around the world? Please leave your answers and any other suggestions below. Have a good December! |
Music/Radio / Re: What Music Are You Listening To Right Now? by magimazda: 1:52pm On Nov 30, 2016 |
don't let me down - chainsmokers |
(1) (2) (of 2 pages)
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 54 |