PDF HOW TO HACK - Hackers Zone

 HOW TO HACK

HACKING SECRETS EXPOSED

A BEGINNER'S GUIDE

By: Srikanth Ramesh howtohack.

Copyright Notice

This book shall not be copied or reproduced unless you have obtained specific permissions for the same from the author Srikanth Ramesh. Any unauthorized use, distribution or reproduction of this eBook is strictly prohibited.

Liability Disclaimer

The information provided in this book is to be used for educational purposes only. The creator of this book is in no way responsible for any misuse of the information provided. All of the information presented in this book is meant to help the reader develop a hacker defence attitude so as to prevent the attacks discussed. In no way shall the information provided here be used to cause any kind of damage directly or indirectly. The word "Hack" or "Hacking" used extensively throughout this book shall be regarded as "Ethical Hack" or "Ethical hacking" respectively. You implement all the information provided in this book at your own risk.

? Copyright 2014 by Srikanth Ramesh. All rights reserved.

Table of Contents

PREFACE

Chapter 1 - Introduction

WHAT IS HACKING? HACKER CLASSIFICATION ESSENTIAL TERMINOLOGIES HACKING FAQS

Chapter 2 - Essential Concepts

COMPUTER NETWORK NETWORK HOST NETWORK PROTOCOL NETWORK PORT NETWORK PACKET DOMAIN NAME SYSTEM (DNS) FIREWALL PROXY SERVER

Chapter 3 - Introduction to Linux

WHY LINUX? WINDOWS VS. LINUX CHOOSING A LINUX DISTRIBUTION RUNNING LINUX FROM A LIVE DISK LINUX BASICS FURTHER REFERENCES

Chapter 4 - Programming

WHY PROGRAMMING? WHERE SHOULD I START?

Chapter 5 - Footprinting

WHAT IS FOOTPRINTING? INFORMATION GATHERING METHODOLOGY COUNTERMEASURES

Chapter 6 - Scanning

DETECTING LIVE SYSTEMS TYPES OF SCANNING TOOLS FOR SCANNING OS FINGERPRINTING CONCEALING YOUR IDENTITY COUNTERMEASURES

Chapter 7 - Hacking Passwords

DICTIONARY ATTACK BRUTE-FORCE ATTACK RAINBOW TABLE PHISHING ATTACK

COUNTERMEASURES

Chapter 8 - Hacking Windows

GAINING ACCESS TO THE SYSTEM DUMPING THE PASSWORD HASHES CRACKING THE WINDOWS PASSWORD COUNTERMEASURES

Chapter 9 - Malware

MALWARE VARIANTS AND COMMON TECHNIQUES COUNTERMEASURES

Chapter 10 - Hiding Information

WINDOWS HIDDEN ATTRIBUTE NTFS ALTERNATE DATA STREAMS STEGANOGRAPHY USING TOOLS FOR HIDING INFORMATION

Chapter 11 - Sniffing

TYPES OF SNIFFING TECHNIQUES FOR ACTIVE SNIFFING DNS CACHE POISONING MAN-IN-THE-MIDDLE ATTACK TOOLS FOR SNIFFING COUNTERMEASURES

Chapter 12 - Denial of Service

WHAT IS DENIAL OF SERVICE (DOS) ATTACK? DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK COUNTERMEASURES

Chapter 13 - Wireless Hacking

WIRELESS NETWORK BASICS WIRELESS SNIFFING WIRED EQUIVALENT PRIVACY (WEP) WI-FI PROTECTED ACCESS (WPA) DENIAL OF SERVICE (DOS) ATTACKS COUNTERMEASURES

Chapter 14 - Web Application Vulnerabilities

WEB APPLICATION BASICS TYPES OF WEB APPLICATION VULNERABILITIES TOOLS FOR VULNERABILITY SCANNING

Chapter 15 - Hacking Internet Users

COMMON HACKING TECHNIQUES

CONCLUSION

PREFACE

Congratulations on your purchase of "Hacking Secrets Exposed: A Beginner's Guide". This book will take you through the concepts of computer hacking in a very simple and easy to follow manner so that even the readers with no prior knowledge of hacking should be able to easily understand the concept. To start off, all you need is a little working knowledge of computers, operating system (Windows) and an Internet connection.

Many of the popular books that I have read on ethical hacking are mostly suitable only for those who already have a considerable amount of knowledge in the field. Also, these books dive too much into the theory part presenting the reader with lots of unnecessary explanation, thereby adding to the bulk of the book. This may cause the reader to gradually lose interest in the book or quit reading in the mid way.

So, I decided to come up with a book that demands no prior knowledge of the topic and is easy for the readers to follow and comprehend at every point. Instead of stuffing the book with conventional paragraphing kind of content, I prefer to present the topics in an easy to follow manner by including bullet points, illustrations and practical examples. This may keep the book slender but it still manages to effectively appeal to the reader's quest for knowledge. I have also decided to drop obsolete concepts and techniques from the book and only keep those that are active and feasible in the present day scenario.

When you finish reading this book, you should be able to apply the knowledge and skills that you have gained in many ways:

You can adopt the hacker's mindset and start to think and react to situations and problems just like the hacker would do. After all, hacking is just a mindset more than a skill set!

You should easily be able to protect yourself from all those wicked hackers out there by maintaining the security of your online accounts, web server or your own personal computer.

This book lays the foundation required to start off your career as an ethical hacker where you can begin to apply the knowledge and skills in your profession.

HOW TO USE THIS BOOK?

This book will cover the concepts of computer hacking for both Windows and Linux operating systems. For Windows based practical examples and illustrations, I have used my Windows 8.1 PC. For Linux based examples I have used Kali Linux 1.0.9a live DVD. Since most examples are not specific of the operating system version, you can implement them on any version of Windows and Linux installed on your computer.

Each chapter including all the concepts presented in this book are laid out in a hierarchical

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download