SERVICES | Hackers House Nepal

- Cyber Security Solutions | - Ethical Hacking Trainings/Workshops | - IT Security Solutions for Business, Office | - Cyber Security Awareness Campaigns

Penetration Testing Solutions

Penetration testing (or pen testing) is the practice of attacking your own IT systems, just as an attacker would, in order to uncover active security gaps on your network.

Network Security Solution

Testing your network infrastructure which includes servers,routers firewalls for vulnerabilities, misconfiguration and design. Securing this section must be your top priority.

Cyber Security Trainings

You will get workshop based training approach and learn Ethical Hacking. Workshop includes wide range of offensive and defensive hacking tools, theories, research papers. All for educational and cybersecurity purpose.

10. Hacking Phase : Pt.1 – ADS Lab

Content For Ethical Hacking Workshop, Nepal.  Prepared by : Bijay Acharya (CEHv9.) | BABA Computers, Pokhara 10. Hacking Phase : Pt.1 – ADS Lab ADS : Alternate Data Stream | Hiding Files Steps : Start with making new directory. In image below, I’ve created “adslab“. Now, follow along (this part will be explained by instructor in workshop)

READ MORE

9. Scanning Systems

Content For Ethical Hacking Workshop, Nepal.  Prepared by : Bijay Acharya (CEHv9.) | BABA Computers, Pokhara – We are still in phase of gathering information about our host. Scanning is advancement to footprinting. – Here, basically we perform port scanning, to find out open or closed port. – Hacking means gaining access to system. – But remember, before […]

READ MORE

8. Kali Linux

Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and Network security assessments. After, successful installation of Virtual Lab (with installation of Kali Linux), we will first run some basic kali linux commands. We will make students familiar with Kali Linux OS interface/Layouts. This is all about Getting Comfortable with […]

READ MORE