24/7 Phone Services +91- 7477466951
support@drop.org.in UKHRA, Durgapur, West Bengal 713363

Service Details

Free Hacking Course For Learner’s

In DROP its not always about money we love to give opportunity to deserving students. As, said said by a wise man Knowledge is the most Powerful thing in this universe as a part of our Social Working project And We Support Learner’s for getting proper knowledge about cyber security. […]

Hacking Course | DROP.ORG.IN Ethical Hacking Learning

Hot Deal: Yacht Build Package15%
Off

We are always ready to best solution for your problem.

Complete Service Offer Details:

In DROP its not always about money we love to give opportunity to deserving students. As, said said by a wise man Knowledge is the most Powerful thing in this universe as a part of our Social Working project And We Support Learner’s for getting proper knowledge about cyber security.

 Free Online Training from DROP Organization

free ethical hacking class in hindi

CHALO KARE BHARAT KO SAFE

Ethical Hacking Class | HOW TO GET STARTED IN BUG BOUNTY | Full Information

Types of Hacker

Types of Hackers and What They Do: White, Black, and Grey
  • Black Hat‘ Hackers.
  • White Hat‘ Hackers.
  • Grey Hat‘ Hackers.
  • Green Hat‘ Hackers.
  • Blue Hat‘ Hackers.
  • Script Kiddie
  • Sponsored‘ Hackers.

What is payload and Exploit

  • Exploit‘: An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.
  • Payload‘ : In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action.

Vulnerabilities, Zero Day, Daisy Chaining, Doxing, Botnet

  • Vulnerability – is the existence of a weakness (design or implementation error) that can lead to an unexpected event compromising the security of the system.
  • Zero-Day attack – is an attack that exploits the computer vulnerability before software engineer releases a patch.
  • Daisy Chaining– it involves gaining access to a network and /or computer and then using the same information to gain access to multiple networks and computers that contains desirable information.
  • Doxing – Publishing personally identifiable information about an individual or organization.
  • Bot – is a software application that can be controlled remotely to execute or automate predefined tasks.

Identity Theft By Hackers

Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.

CIA Model ( Confidentiality, Integrity and Availability )

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. The model is also sometimes referred to as the AIC triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence Agency.

What is Protocol in Networking?

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.

SSRF Bug Bounty

Server-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker’s choosing.

XSS Attack Tutorial

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

HOW TO GET STARTED IN BUG BOUNTY

The Bug Bounty Reward program encourages security researchers to identify and submit vulnerability reports regarding virtually everything that bears the Bitdefender brand, including but not limited to the website, products and services.

Bug Bounty | Nmap Tutorial | Version, OS, Scan

Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.

Business logic Vulnerabilities

Business logic vulnerabilities are flaws in the design and implementation of an application that allow an attacker to elicit unintended behavior. This potentially enables attackers to manipulate legitimate functionality to achieve a malicious goal.

Idor Vulnerability | Insecure Direct Object Reference (IDOR)

Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly. The term IDOR was popularized by its appearance in the OWASP 2007 Top Ten.

Command injection

It is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell.

Broken authentication

Broken authentication is an umbrella term for several vulnerabilities that attackers exploit to impersonate legitimate users online

Signaling System 7 (SS7)

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network. Nodes in an SS7 network are called signaling points.

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

CSV Injection

CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with ‘=’ will be interpreted by the software as a formula.

path traversal attack

A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder.