-->

Welcome to Hacking Truth

When You Think About Hacking Definately Hackers Will Think About You - Kumar Atul Jaiswal.

About Us

WE ARE CREATIVE

We are creative we do things a bit differently, and that's the way we like it!.

Hacking is about ingenuity in any walk of life. “Creative solution” or “being entrepreneurial” have replaced hacking in the vocabulary of most because of the distancing people want to make from the computer hackers. We don't want to be tainted by the malicious intent that the word hacker has become associated with. A few thoughts on brain hacks for driving creative thinking forward.

Services

What We Do?

Ethical Hacking

In computer networking, Hacking is any technical effort to manipulate behaviour of network Hacking is historically referred to constructive, clever technical work that was not necessarilyrelated to computer systems.

Web App Penetration Testing

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities.

Bug Bounty

Achieve Continuous, Results-Driven, Hacker-Powered Security Testing at Scale. Run a private or public Bug Bounty Program, fully managed by Hacking Truth experts or own security team.

CLEAN CODE

The result is a knowledge base that describes the way we think when we write, read and clean code. Readers will come away from this book understanding.How to write good code and how to transform bad code into good code.

PROGRESS AND ACCORDIANS

Stop learning then stop winning, so I try to take myself to a new level every single day and I must learn something new every single day so that I can update myself well.

24/7 Support

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Nulla ducimus aliquam asperiores modi. Labore, quisquam.

124

HAPPY CLIENTS

144

COMPLETE PROJECT

216

CUP OF COFFIE

8

AWARDS

TEAM

MEET OUR AWESOME TEAM

We are a team, this is your point of view , but we are not just a team, we are puzzles, if one of the people has left this team, then unfortunately we will not be a team because the puzzle never becomes from one single.

Ethical hacking 70%
Web Pentesting 60
Bug Bounty50
YouTube N Blogger 85%
image
Kumar Atul jaiswal
Ethical Hacker
image
HackerBoY
Web Penetester
image
Kumar Atul Jaiswal
Ethical Hacker
image
HackerBoY
Web Penetester
Ethical Hacking Course

Choose the perfect Course

Cryptography Video Course

One-Time-purchase
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon

Footprinting N Reconnaissance

One-Time-purchase
  • Unique Content
  • Valuable Price
  • Beginer To Advance
  • Therotical content
  • Practical Videos
  • Full Support

Hacking In Termux

One-Time-Purchase
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
  • Coming Soon
img

Kumar Atul Jaiswal

Founder, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

img

HackerBoY

CEO, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

img

Kumar Atul Jaiswal

Founder, Hacking Truth

Hi, my self kumar atul jaiswal. I am self taught White Hat Hacker, Programmer, Web Developer, Web Penetester by profession but I am a YouTuber by passion and a Computer science student from India. Nice to meet You.

Blog

LATEST FORM Blog

CEH hacking

 

 

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the C|EH exam is 312-50. 

 

CEH

 

This certification has now been made a baseline with a progression to the C|EH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.

 

Hacking

 
Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities. The EC-Council offers another certification, known as Certified Network Defense Architect (CNDA). This certification is designed for United States Government agencies and is available only to members of selected agencies including some private government contractors, primarily in compliance to DOD Directive 8570.01-M.[1] It is also ANSI accredited and is recognized as a GCHQ Certified Training (GCT).

 

 


Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities. The EC-Council offers another certification, known as Certified Network Defense Architect (CNDA). This certification is designed for United States Government agencies and is available only to members of selected agencies including some private government contractors, primarily in compliance to DOD Directive 8570.01-M.[1] It is also ANSI accredited and is recognized as a GCHQ Certified Training (GCT).

 

 

 

 

 

 

 

 

Bash Scripting IF with AND or OR logic

Bash Scripting IF with AND or OR logic

 

 

In Linux, all tasks from execution of services to loading and unloading of modules are carried out by programs and all programs need to be executed. You use the commands to access all the basic features of kernel. Shell scripting is a way to automate such tasks, and bash is one of the language, that has capabilities enough to be called as scripting as well as a language that can be used for programming on the POSIX platform, for small tasks.  Bash Scripting IF with AND or OR logic


Using If Statement

You can use if condition with single or multiple conditions. Starting and ending block of this statement is define by ‘if’ and ‘fi’. Create a file named ‘simple_if.sh’ with the following script to know the use if statement in bash. Here, 10 is assigned to the variable, n. if the value of $n is less than 10 then the output will be “It is a one digit number”, otherwise the output will be “It is a two digit number”. For comparison, ‘-lt’ is used here. For comparison, you can also use ‘-eq’ for equality, ‘-ne’ for not equality and ‘-gt’ for greater than in bash script.


#!/bin/bash
n=10
if [ $n -lt 10 ];
then
echo "It is a one digit number"
else
echo "It is a two digit number"
fi

 

Run the file with bash command.

 

Bash Scripting IF with AND or OR logic

 

OR

 




Using if statement with AND logic:

Different types of logical conditions can be used in if statement with two or more conditions. How you can define multiple conditions in if statement using AND logic is shown in the following example. ‘&&’ is used to apply AND logic of if statement. Create a file named ‘ifWithLogic1.sh’ to check the following code. Here, the value of username and password variables will be taken from the user and compared with ‘admin’ and ‘secret’. If both values match then the output will be “valid user”, otherwise the output will be “invalid user”.

 

#!/bin/bash
echo "Enter username"
read username
echo "Enter password"
read password

if [[ ( $username == "admin" && $password == "secret" ) ]]; then
echo "valid user"
else
echo "invalid user"
fi

 

Run the file with bash command.

 


 

OR




Using if statement with OR logic:


‘||’ is used to define OR logic in if condition. Create a file named ‘ifWithLogic.sh’ with the following code to check the use of OR logic of if statement. Here, the value of n will be taken from the user. If the value is equal to 15 or 45 then the output will be “You won the game”, otherwise the output will be “You lost the game”.


#!/bin/bash
echo "Enter any number"
read n

if [[ ( $n -eq 15 || $n  -eq 45 ) ]]
then
echo "You won the game"
else
echo "You lost the game"
fi

 

Run the file with bash command.

 

 




 



I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)

 

Disclaimer


This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



- Hacking Truth by Kumar Atul Jaiswal


 
Contact

Send Us A Email

Address

Contact Info

The page name itself is a call-to-action; Treat it with some respect.!

Address:

15, Ranchi, India, 834002

Phone:

404

Email:

kumaratuljaiswal222@gmail.com

atulthehacker222@gmail.com