- 40 bit encryption means there are 2^40 possible keys that could fit into the lock that holds your account information. That means there are billions of possible keys and using brute force is not an option. The only thing left now is a dictionary and rainbow attack. But it’s not only the security measure that banks use to secure information.
- 128 bit encryption means there are 2^88 times as many key combinations that are possible for 40 bit encryption. That means a computer would require exponentially more processing power and time than a 40-bit encryption to find the correct key.
BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering
BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering : BEHC (Born Ethical Hackers Club) has came up with second issue of its Ethical Hacking Class and Network security campaign. In our last issue we have learnt about basics of terms related to Ethical Hacking or simply Hacking and about how a hacker prepares or launches a hacking attempt or simply say hack attack. We have also discussed brief about different phases that involves in launching a hacking attempt like information gathering, scanning, gaining access, maintaining access and covering tracks respectively. This is what we have discussed in our last issue.
The topic of this issue is Footprinting or Information Gathering. This issue will teach you guys how to gather information about any victim or website. The information gathered can be used for launching Social Engineering attack, DDOS attack, Domain Hijacking attack, Domain Poisoning attack or even we can use this information to prepare word file which can be used for brute force attack.

Online Hacking class
In this issue we will learn about Information Gathering or Footprinting techniques. Because of lot of techniques involved in Foot Printing we have decided to publish the issue into two parts.
Below is the list of Footprinting techniques we are going to learn in first part.1
1. Finding IP address
3. Tracing routes
4. Who is data
5. DNS queries and DNS health check
1. Search Engine discovery or Reconnaissance
2. Spiders, Crawlers or Robots discovery
3. Web data Extraction
4. Reviewing Meta data and Javascript’s
5. Web application fingerprint
6. Web server fingerprint
7. People Search
BEHC Ethical Hacking Class First Book Online : Introduction to Ethical Hacking
![]() |
Born Ethical Hacking Club |
As a campaign that i introduced last month of teaching Ethical Hacking online by introducing a new group called BEHC i.e. Born Ethical Hackers club. Hackingloops proudly represents its very first book on Ethical Hacking. We have decided to publish the complete Ethical Hacking Course in form of weekly books. These books will contains all the necessary text, description that you need to learn hacking. Practical techniques will be supported by their respective video tutorials. All the doubts can be posted on Hacking class posts and I will cover them in my next postss.
This is the very first handbook of BEHC campaign and below is the list of topics being covered.
List of Topics covered in BEHC Ethical Hacking Class First Book : Introduction to Ethical Hacking
1. Introduction to BEHC
2. Hack , what is it?
3. Hacking and its introduction
4. Can hacking be Ethical?
5. Difference between Hackers and Crackers
6. Security and its three pillars ( confidentiality, integrity and availability )
7. How a Hacking attempt is launched
8. Different Phases of Hacking Attempt
9. Phases in Description
DOWNLOAD BEHC HACKING BOOK NOW
I hope you all will enjoy the book. Please report all the bugs or errors though above mentioned media and you can also suggest improvements.
All improvement suggestions will be heartily welcomed.
DOWNLOAD BEHC HACKING BOOK NOW
If you have any issues or concerns or doubts ask me in form of comments. A gesture of thanks is greatly appreciated.