Understanding of Web Architecture and Components in Ethical Hacking

Understanding of Web Architecture and Components in Ethical Hacking

Understanding of Web Architecture and Components in Ethical Hacking:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners  And why we  use  ethical hacking  to make  more interactive and  secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of  Ethickal and Cyber Security   in the light of cyberpoint9.com  best Hindi  Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How  the  Ethical Hacking works in our today’s Technical Field. This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!

WEB ARCHITECTURE AND COMPONENTS
===============================

1. Domain Name : It is a unique identity in the Form of name which can accessible globally. eg. buffclue.com , google.com is a unique identity which helps in accessing the website.

2. Web Hosting Space : The space where we want to build and produce our web application. Eg. GoDaddy, BigRock
ICANN provide these hosting spaces to Go-daddy  etc.

3. Operating Systems : On which Operating System we want to build our website. Eg. Linux, Windows.

4. Server Type : Which type of server we are using to host our website. Request and Response of the application.
Windows – IIS – Internet Information Services.
Linux – Apache Tomcat , Red Hat , NginX etc.

= Shared Servers
= Dedicated Servers

How to find?

https://www.yougetsignal.com/tools/web-sites-on-web-server/

5. Web Technology : Which type of Web Technology we are using to create our WEbsite. THese are thge programming languages on which we create our web application.

Client Side Scripting Language :

Which is used to develop the Front End Application and the user only accessing the control menu of that Programming Language.
Eg. HTML , Java-script, C sharp, Python etc.

Server Side Scripting Language :

These are those languages which are used for creating and maintain server side configuration of a website.
Eg. PHP, ASP, JSP, PYTHON, SQL etc.

Server is OS which always responds to the requests of clients.

Clients are those which only requests to the server.

What is Database :

Database is that system which stores all the data of a web application we are hosting in a server. It is known as the backbone of the web application. Where data is stored in the form of Rows and columns.
It helps in storing all the files situated in a database.
Windows – MSSQL
Linux – MySQL, PostgreSQL

SQL – Structured Query Language which helps us creating a Database in a Server.

But these all resources needs money and finance.

——————————————————————-

What is Local Hosting
=============
Local Hosting is a technology in which we stores and hosts a Database in our “localhost” Computer. This website can be hosted and accessed in a LAN or a Intranet Network.

LOCAL HOST SERVERS
==================
So, they are Server applications which makes our normal operating system and make them act like a server.

WINDOWS – WAMPP

W – WINDOWS
A – APACHE
M – MSSQL
P – PERL
P – PYTHON

LINUX – LAMPP

L – LINUX
A – APACHE
M – MYSQL
P – PERL
P – PYTHON

XAMPP – Cross Platform Server
X – Cross Platform
A – APACHE
M – MYSQL
P – PERL
P – PYTHON

——————————————————————

What is WEB SECURITY MISCONCEPTIONS
===========================

HTTP / HTTPS – SSL   Secured = Secure Socket Layer
Encryption
Tunneling
Secure Socket

= If a Website is using https instead of http, its not secured either.
= If I am using a Good Firewall than I am secured.
= If I am using IDS and IPS the I am secured.

 IDS = Intrusion Detection System
 IPS = Intrusion Prevesion System
——————————————————————

SCRIPTING LANGUAGES
===================

Methods used in Scripting Languages
===================================

1. GET = It shows Data which is being traveled from Server to Clients in the URL only. It is the unsecured method of data travelling between client and server.

2. POST = It doesn’t show anything in the URL that from where that data is travelling.

What is Client Side Scripting
======================

The scripting programming language we are gonna be using is HTML.

HTML
====

Hyper Text Markup Language
||
Hyperlinks

This is the application used for creating client side web pages.

HTML PRACTICALS
================

1. Starting of html scripting
<html>

… Tell me the code written is in HTML

</html>

<head>
..
.. It is used to define the header like title of the web page,name in the tab
</head>

<title> ……
Name of the Title
…</title>

<body>

… Used for the content of the web page

</body>

5. Heading = Used to provide the heading
<h1> – <h6>
As the number increases the font size decreases.
<h1>Heading</h1>
<h2>Heading</h2>
<h3>Heading</h3>


HTML TAGS
=========

<p> = Paragraph
<br> = Break Statement
<ul> = Helps in indentation
<a href> = Hyperlink Reference </a>
<b> = Bold
<btn> = Button
<a> = Action
<li> = Line Indentation
<h1> = Heading
<imgsrc> = Image Source
<form action> = Form Clicking Action

Basicpage.html
==============
<html>
<head>
<title>Basic</title>
</head>
<body>
<a href=”http://www.cyberpoint9.com“><h1>Ethical Hacking</h1></a>
<h2>Black Hat Hacker</h2>
<p>These are the bad guys.<br>
<ul> <li>They Just Work For money.</li>
<li>They bring chaos to the cyber world.</li>
<li>Very Very Bad guys.</li></p>
</ul>
<h2>White Hat Hacker</h2>
<h3>Script Kiddies</h3>
<h3>N00bZ</h3>
<img src=”anonymous.jpg”>
<form action=”secpage.html”>
First Name: <input type=”text”><br>
Last Name : <input type=”text”><br>
Username : <input type=”text”><br>
Password : <input type=”password”><br>
<input type=”submit” value=”submit”>
</form>
</body>
</html>

=============
Secpage.html
=============
<html>
<head>
<title>Welcome</title>
</head>
<body>
<h1>Hello user, you are welcome to my web site</h1>
</body>
</html>

————————————————————————————-

Server Side Scripting
=====================

This language is only used to maintain and configure Server Side Scripting. eg. PHP

XAMPP Server Practical Steps
============================

= After installing,
= Start apache
= Start MySQL

There are 3 ways for opening a server hosted file
c:\xampp\htdocs
The file which I want to host, I will place it in htdocs folder.

1. localhost/filename.html
2. 127.0.0.1/filename.html
For opening the same file in other devices which are connected in LAN.
3. IP Address/filename.html


 

Tagged with: , , ,
3 comments on “Understanding of Web Architecture and Components in Ethical Hacking
  1. Magnificent website. Lots of useful information here. I am sending it to some pals ans also sharing in delicious. And certainly, thank you for your effort!

  2. It¦s really a nice and useful piece of info. I am happy that you simply shared this helpful information with us. Please keep us informed like this. Thanks for sharing.

  3. Appreciate the recommendation. Will try it out.

Leave a Reply

Your email address will not be published. Required fields are marked *

*