What is footprinting in ethical hacking? What is the techniques used for footprinting?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
Who is the most dangerous hacker?
What laptops hackers use?
Who is the best hacker in the world?
What laptops do hackers use?
What tools do real hackers use?
What are the 3 types of hackers?
What os do hackers use?
How do hackers hack passwords?
What software do hackers use?