IDENTITY

Who is R4 Research ?

Anonymous Hacker Who Don't Know How to hack ...

I don't know where i START ,but i have a great idea about where i will STOP.

  • Birthday: Anonymous
  • Website: www.Anonymous.com
  • Phone: +Anonymous0
  • City: City : Anonymous
  • Age: Anonymous
  • Degree: Anonymous
  • PhEmailone: email@Anonymous.com
  • Freelance: Anonymous

⚠️Warning !⚠️ All Details in R4 research website is only for Awareness and Education purpose only , so we will not take responsibilities of malicious activities made by anyone.

Hacking Access 101

The steps you need to go.

Information Gathering

More Information Gathering

Hacking Stage

Gaining Access

  • Password Hacking
  • Windows password Hacking

Backdoors Installing

Maintaining Access

Clearing Stage

Clearing Tracks

Programming

The steps you need to go.

Languages

Coding Methods

Copy & Paste

Codes

APP Development

How make an App

Android

Java

Sytem App

Python

Database

Databases & tools

Web App

Progressive Web App

none

Projects

My Works

view

Adobe Illustrator

Design

Inkscape

Design

none

Design

none

Design

App Packages

Specific for Hacking

Reconnaissance

This is the first phase where the Hacker tries to collect information about the target. It may include Identifying the Target, finding out the target’s IP Address Range, Network, DNS records, etc.

Scanning

This phase includes usage of tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data.

Gaining Access

In this phase, hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. The hacker has finished enumerating and scanning the network and now decide that they have a some options to gain access to the network.

Maintaining Access

Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Once the hacker owns the system, they can use it as a base to launch additional attacks.

Clearing Track

Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity. They will not deliver a direct attack or any scanning technique that would be deemed “noisy”.

Linux

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged in a Linux distribution.

Windows

Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity. They will not deliver a direct attack or any scanning technique that would be deemed “noisy”.

Debian Packaging

A Debian "package", or a Debian archive file, contains the executable files, libraries, and documentation associated with a particular suite of program or set of related programs. Normally, a Debian archive file has a filename that ends in .deb

Cyber Forensics

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media

Softwares

Downloadable

  • All
  • Hacking
  • Programming
  • APP
  • Design

KALI

Linux

Parrot

linux

Illusrator

Adobe

Designed by ART Agency