0 ratings 0% found this document useful (0 votes) 645 views 134 pages Hacking - Computer Hacking, Security Testing, Penetration Testing and Basic Security PDF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Hacking - Computer Hacking, Security Testing, Pene... For Later
HACKING
HTT TGR RUt TD MLSE
aa UMTS TASTE
CE YLHACKING
Computer Hacking, Security Testing,
Penetration Testing And Basic Security
Gary Hall & Erin Watson
|
GARY WALL & ERIN WATSON© Copyright 2016 - All rights reserved.
‘The contents of this book may not be reproduced, duplicated or transmitted without direct written permission from the
author.
Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages,
or monetary loss due to the information herein, either directly or indirectly.
‘This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, use, quote or
paraphrase any part or the content within this book without the consent of the author.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment purposes only. Every
attempt has been made to provide accurate, up to date and reliable complete information. No warranties of any kind are
expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical
or professional advice. The content of this book has been derived from various sources. Please consult a licensed
professional before attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances are is the author responsible for any losses,
direct or indirect, which are incurred as a result of the use of information contained within this document, including, but
not limited to, —errors, omissions, or inaccuracies.Table of Contents
Introduction
PART I: INTO THE WORLD OF HACKING
Chapter 1: What is Hacking?
Chapter 2: Hacking and Basic Security
Chapter 3: The Ethical Hacking Plan
Chapter 4: The Hacker’s Methodology
PART II: THE HACK ATTACK
Chapter 5: How to Hack a Smartphone
Chapter 6: How to Hack Operating Systems
Cl 7: Social Engineering Hacki
Cl 8: Physical Securi
Chapter 9: How to Hack Passwords
C 10: Hacking Websi 1. Web Applicati
C 11: Hacking Wireless Ne
PART III: THE AFTERMATH
Chapter 12: Why Hacking Is Absolutely Necessary
Chapter 13: The Do’s and Don’ts of Hacking
C 14: Predicting the F f Hacki
Conclusion
ResourcesIntroduction
Most people don’t really understand what hacking is about, much less how to go about it.
It’s something that we just watch in movies or hear about on the news. This book,
Hacking, Computer Hacking, Security Testing, Penetration Testing And Basic Security,
is meant to help you understand hacking techniques in a broader and deeper way.
Hacking is commonly viewed as an illegal activity that is designed to steal data or money.
Though it is true that some hackers out there use their skill for criminal activities, this is
not what hacking is really about. Hacking is simply a way of discovering ignored or
unintended uses of a product or situation and then coming up with new ways of solving a
problem.
In this book, you will learn how you can protect yourself from some of the most prevalent
hacking schemes to date. How? By learning how to hack! That’s right. It would be
inconceivable to expect to protect yourself and property from hackers without first
understanding how hacking actually works.
If you want to stay ahead of hackers and perform your own counter-hack, you are in luck.
You grabbed the right book. In here you will learn about the modern tools and advanced
techniques that ethical and criminal hackers use. Not only will you learn how to search for
weaknesses in a security system, you will also get to know how to identify a system that is
under attack.
There are strategies that have been outlined here that will help you test the vulnerability of
any system and prevent you from falling into black hat traps. This book is aimed at
helping you improve information security for personal use as well as professionally. It is
therefore very important that understand how electronic devices can be compromised
without you even being aware of it.
The book uses simple language that beginners can understand. Experienced hackers who
need to learn certain aspects of hacking in an in-depth manner can also use the book. This
book provides great tips on how to become an ethical hacker for an organization that
needs to fix any vulnerabilities in its systems.
The book is split into three parts, each discussing a different theme. Part | sets us off into
the world of hacking, its history, and where we are now. Part II talks about the functionalart of hacking various systems, networks, and applications. Finally, part III relates to what
to do and what not to do regarding ethical hacking, and what the future holds for hacking.
You can start with any part that interests you and maneuver as you see fit.
‘We hope that by the time you finish reading this book, you will have learned enough to
better protect yourself and also perform some ethical hacking of your own.PART I: INTO THE WORLD OF HACKINGChapter 1: What is Hacking?
When the word hacking is mentioned, what kind of images come to mind? Do you think
of criminals and vandals trying to steal data or spy on others? Do you think of someone
sitting in front of an array of computers, sending out encrypted programs to people in
order to gain unauthorized access to their computers remotely?
The truth is that the majority of people view hacking as an illegal activity. While it is tue
that criminal hackers do exist, they are actually just a small minority. Hacking is simply
finding an alternative or unintended use of computer hardware or software, so as to
enhance their applications and solve problems.
This is the technical definition of hacking. Hacking is using the technology available in
new and counterintuitive ways in order to solve problems that conventional techniques
cannot. It is only in our current digital age that hacking has become synonymous with
bypassing security, illegally accessing another person’s computer, and wrecking havoc.The History of Hacking
Back in the late 1870’s, Bell Telephone Company hired several teenage boys to work as
switchboard operators. These boys decided to engage in some technological mischief by
intentionally misdirecting and disconnecting phone calls, listening in on conversations,
and other kinds of pranks. Though this was not called “hacking” back then, it was the
earliest recognized incident of misusing technology. It is even believed that this was one
of the reasons that the company decided to only hire female workers as operators.
Fast forward about 100 years later, in the 1950’s. The word “hack” was used to refer to a
shortcut or technique used to bypass the original operation of a system. The term was
coined by MIT model train enthusiasts who received a donation of old telephone
equipment, which they then used to create a complicated system for controlling their
model trains. They were able to engineer a way to allow multiple operators to manipulate
the track by dialing the telephone. These are considered to be the original hackers because
they were able to take the equipment that they had and discover a new an inventive use for
it.
A number of these model train hackers then became curious about the new computer
systems that were being introduced on their campus. They were programming geeks that
‘wanted to change the existing computer programs to make them better, customize them for
special applications, and mostly just to have fun. The end result was that they produced
modified and more elegant versions of the original programs. They weren’t just content to
write programs that solved problems; they wanted their programs to solve problems in the
best ways possible.
In the 1970’s, there arose a different type of hacker whose focus was on exploiting the
telephone system. These were referred to as “phreakers,” and their aim was to figure out
how the electronic switching system worked so that they could make free long-distance
phone calls. This is an example of one of the first anti-establishment movements that
would later give birth to personal computer hackers.
‘As personal computers became more common in the 1980's, hackers were able to acquire
their own devices and use the new technology to expand their reach. They quickly learned
how to use modems to dial into and gain access to other people’s personal computers. It
was at this time that Stephen Levy published Hackers: Heroes of the Computer
Revolution, where he stated that there should be unlimited and total access to computers in
order to understand how the world works. The desire to dissect, understand, and better
appreciate computer programming in order to gain more knowledge would later be
regarded as the Hacker Ethic.In the late 1980’s, there emerged a group of hackers who felt that exploring systems for
benign reasons such as learning wasn’t enough anymore. This younger generation decided
to start hacking for personal profit by engaging in criminal activities. This included selling
pirated video games, software, and even distributing worms and viruses to take down
entire systems. They formed cyber-gangs that went after sensitive data in large institutions
and governments. Law enforcement stepped in and anti-hacking legislation was soon
passed. Many of these cyber-gang members were arrested and prosecuted.
The latest frontier in hacking is known as “whacking.” This involves finding unsecured
Wireless Access Points (WAPs) and connecting to them. This has become more prevalent
due to increased use of Wi-Fi.Types of Hackers
How is it possible to differentiate between good hackers who want to share the benefits of
technological advances and those who want to steal from people? Initially, the term
cracker was used to describe hackers who tampered with a system and broke the law for
profit. Those who followed the principles of the Hacker Ethic were the good guys and
were simply referred to as hackers. The good hackers were offended that the media was
associating hacking with criminal activities carried out by a few individuals and decided to
coin the term cracker.
However, times have changed and the word cracker is rarely used anymore. Today,
hackers are generally divided into:
1. Black hat hackers
These are criminals who intentionally break into systems and steal information or money.
They are also known as malicious hackers or crackers and they usually hack devices for
selfish purposes.
2. White hat hackers
These are also known as ethical hackers. They only hack devices and systems in order to
find potential vulnerabilities and then figure out ways of preventing those weaknesses
being exploited. White hat hackers ensure that they release updates to the public to patch
up system vulnerabilities. They are constantly searching for new vulnerabilities in systems
and devices in order to make them more efficient and secure. This is not an easy task, and
that is why ethical hackers form communities to share their knowledge.
3. Grey hat hackers
These are hackers who are motivated by profit as well as ethical reasons. They tend to use
both legal and illegal means to exploit a system. They gain access to a person’s system,
inform them of the vulnerability they have found, and then provide suggestions on how to
improve their security.The Motivations for Hacking
Though hacking is considered something that is reserved for programmers, anyone can
learn how to hack, There are generally four major reasons why people engage in hacking:
© To gain legal and authorized access to a system in order to test its security, expose
any vulnerability that may exist, and fix them.
* To gain illegal access into a system out of pure curiosity or pride. This is usually
what motivates most amateur hackers who simply download ready-to-use tools off
the Internet. Such hackers are commonly referred to as “script-kiddies,” and they
often target random organizations and systems just to be disruptive. Most of the
hacking events that the media highlights are usually script-kiddies who are looking
for an opportunity to be a nuisance.
© To gain unauthorized access in order to maliciously destroy information or tamper
with it.
© To gain access to a computer system so as to steal data and sell it to other parties.
Corporations or governments usually hire these.
Regardless of what your motivations are, always remember that there are many different
ways to learn how to hack. As technology advances and knowledge evolves, new and
more effective ways of attacking or protecting systems are being created.
Anyone who owns a Smartphone or computer needs to lean how to hack. You need to be
motivated to learn how your own devices and systems work so that you can adjust and
make them better. You probably receive tens of downloads, messages and emails on your
portable electronic devices on a daily basis, yet do you really pay attention to what you
allow into your system?
If you want to protect yourself from black hat hackers, you will need to start thinking like
one. This means that you have to gain the relevant knowledge, understand the motivations
of an attack, and the tools that can be used against you. This will be the first step in
understanding how to defend yourself and even launch your own counterattack.What You Need
Hacking may seem daunting at first, especially if you have never practiced it before.
However, all you really need is knowledge of computer use and an ability to follow
written instructions. You may not know how to write computer code yet, but that is OK.
This book contains some instructions on the coding software and operating system you
need. On the other hand, if you truly want to become an expert hacker, then you will have
to learn how to code.
There are specific skills and requirements that you must have to become a hacker, such as:
1. Mid-level computer skills
Your computer skills need to involve more than just typing and browsing the Internet. You
must be able to use Windows command module effectively or create a network.
2. Networking skills
Hacking is predominantly an online activity, so you need to understand the terms and
concepts related to online networks, such as routers, packets, ports, public and private IPs,
WEP and WPS passwords, DNS, TCP/IP, subnetting and many others.
3. Database skills
It is important that you learn and master database management systems (e.g. MySQL and
Oracle) in order to understand the techniques that hackers use to penetrate your databases.
4, Use of Linux OS
The vast majority of hackers use the Linux operating system because unlike Mac and
Windows, it allows you to tweak programs as you want. Nearly all the hacking tools you
will come across are developed for Linux.
5. Scripting skills
Sooner or later you will have to learn how to create your own hacking tools, and you
cannot do this without developing the necessary scripting skills. By creating and editing
your own scripts, you will no longer have to rely on tools provided by other hackers, thus
enhancing your ability to defend your system. Black hat hackers are good at creating
hacking tools, so you must match them for knowledge if you want to stay secure. You
should consider learning a scripting language like Python or Ruby on Rails.6. Use of virtualization software packages
Before you try out a hack on a real life system, you should first run it through
virtualization software that will provide a safe setting for your test. You need to know how
to use a virtual workstation, for example, VMWare Workstation, so that you avoid
damaging your own computer or mobile device.
7. Understand security concepts and technologies
There are a lot of elaborate security concepts and technologies in the field of information
technology. As a hacker, you must know the ones that are most important for your use, for
example, firewalls, Public Key Infrastructure (PKI), Secure Sockets Layer (SSL), among
others.
8. Reverse engineering skills
This involves taking a piece of software or hardware apart in order to understand how it
works, and then convert it into a tool that is technically more advanced. One of the things
you will realize is that most hackers are able to make better hacking tools by reverse
engineering the malware of other hackers. With such skills, you will be able to be a more
effective hacker.Chapter 2: Hacking and Basic Security
The majority of people are generally aware that hackers and malicious users can attack
their systems. However, most people don’t really understand the specific attacks that they
are vulnerable to, much less the key signs that a hacker has infiltrated their system.Detecting Hacker Attacks
A malicious hacker can exploit your system vulnerabilities in a number of ways. An attack
may come through one specific exploit, several different exploits at once, a
misconfiguration in one of your system components, or probably a backdoor that was
created during a past attack.
This is why it is often difficult to determine whether you have been hacked or not,
especially if you are not an experienced user. If you want to learn how to be an ethical
hacker, it is important that you also be able to detect if someone else has hacked your
system. The information below consists of guidelines that you can use to help you detect
possible hacker attacks.
Remember that it is impossible to be fully certain that your system has been compromised
just because your machine displays the behaviors indicated. However, if your system does
show a number of these signs, then it is likely that you have been hacked.
The guidelines below relate to machines that run either Windows operating system or
UNIX.
For Windows OS:
* An unusually high level of outgoing network traffic. In case you are using ADSL or
a dial-up account and you detect a suspiciously large volume of outgoing traffic, yet
you aren’t actively uploading anything, your system could be under attack. A
malicious hacker could be using your computer to send out spam, or a network
worm could be using your system to replicate and distribute itself. However, if you
are using a network cable to browse the web, then it gets a bit tricky because your
outgoing and incoming traffic are usually almost the same.
Elevated levels of disk activity and unknown files in your root directory. Most
malicious hackers tend to run massive scans on the computers of their targets,
looking for any documents or files of value. The scans tend to increase disk activity
even when the computer is in an idle state. These scans are meant to unearth
passwords for websites, online payment accounts or bank login information. There
are also some worms that infect your system and then search for documents
containing email addresses. These can then be used to spread the worm to other