Hacking : Guide to Computer Hacking and Penetration Testing
By Alex Nordeen
5/5
()
About this ebook
If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.
It also covers the testing methods used by ethical hackers to expose the security loopholes in the system. Once familiar with the basic concept of hacking in this book, even dummies can hack a system. Not only beginners but peers will also like to try hands-on exercise given in the book.
Practical Hacking Guide. Covers the following
Table Of Content
Chapter 1: Introduction
What is hacking?
Common hacking terminologies
What is Cybercrime?
What is ethical hacking?
Chapter 2: Potential Security Threats
What is a threat?
What are Physical Threats?
What are Non-physical Threats?
Chapter 3: Hacking Tools & Skills
What is a programming language?
What languages should I learn?
What are hacking tools?
Commonly Used Hacking Tools
Chapter 4: Social Engineering
What is social engineering?
Common Social Engineering Techniques
Social Engineering Counter Measures
Chapter 5: Cryptography
What is cryptography?
What is cryptanalysis?
What is cryptology?
Encryption Algorithms
Hacking Activity: Hack Now!
Chapter 6: Cracking Password
What is password cracking?
What is password strength?
Password cracking techniques
Password Cracking Tools
Password Cracking Counter Measures
Chapter 7: Trojans, Viruses and Worms
What is a Trojan?
What is a worm?
What is a virus?
Trojans, viruses and worms counter measures
Chapter 8: Network Sniffers
What is IP and MAC Addresses
What is network sniffing?
Passive and Active Sniffing
What is ARP Poisoning?
What is a MAC Flooding?
Sniffing the network using Wireshark
Chapter 9: Hack Wireless Networks
What is a wireless network?
How to access a wireless network?
Wireless Network Authentication
How to Crack Wireless Networks
Cracking Wireless network WEP/WPA keys
Chapter 10: DoS(Denial of Service) Attacks
What is DoS Attack?
Type of DoS Attacks
How DoS attacks work
DoS attack tools
Chapter 11: Hack a Web Server
Web server vulnerabilities
Types of Web Servers
Types of Attacks against Web Servers
Web server attack tools
Chapter 12: Hack a Website
What is a web application? What are Web Threats?
How to protect your Website against hacks ?
Hacking Activity: Hack a Website !
Chapter 13: SQL Injection
What is a SQL Injection?
How SQL Injection Works
Other SQL Injection attack types
Automation Tools for SQL Injection
Read more from Alex Nordeen
Learn SQL in 24 Hours Rating: 5 out of 5 stars5/5Learn SAP MM in 24 Hours Rating: 0 out of 5 stars0 ratingsPython: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Learn HANA in 24 Hours Rating: 5 out of 5 stars5/5Learn Operating System in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SAP Basis in 24 Hours Rating: 5 out of 5 stars5/5C++ Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Software Testing in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Data Warehousing in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Selenium in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SQLite in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn C Programming in 24 Hours Rating: 0 out of 5 stars0 ratingsC# for Beginners: Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn R Programming in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn PHP in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SAP BI in 24 Hours Rating: 3 out of 5 stars3/5Learn AngularJS in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Design and Analysis of Algorithms in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn DBMS in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn JSP in 24 Hours Rating: 0 out of 5 stars0 ratings
Related to Hacking
Related ebooks
Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 4 out of 5 stars4/5CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition Rating: 4 out of 5 stars4/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Ubuntu Using Hacking Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsCybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5Mastering Kali Linux for Web Penetration Testing Rating: 4 out of 5 stars4/5The Core of Hacking Rating: 0 out of 5 stars0 ratingsCEH Certified Ethical Hacker Study Guide Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 4 out of 5 stars4/5Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Gray Hat Hacking the Ethical Hacker's Rating: 5 out of 5 stars5/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Web Penetration Testing: Step-By-Step Guide Rating: 5 out of 5 stars5/5
Security For You
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Computer Forensics For Dummies Rating: 4 out of 5 stars4/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsHow to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Rating: 4 out of 5 stars4/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsCyber War: The Next Threat to National Security and What to Do About It Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CISSP For Dummies Rating: 4 out of 5 stars4/5HackerTools Crack With Disassembling Rating: 2 out of 5 stars2/5Codes and Ciphers Rating: 5 out of 5 stars5/5CompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsThe Art of Selling Cybersecurity Rating: 0 out of 5 stars0 ratingsBlack Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters Rating: 4 out of 5 stars4/5Hacking Android Rating: 5 out of 5 stars5/5
Reviews for Hacking
4 ratings0 reviews
Book preview
Hacking - Alex Nordeen
Table Of Content
Chapter 1: Introduction
What is hacking?
Common hacking terminologies
What is Cybercrime?
What is ethical hacking?
Chapter 2: Potential Security Threats
What is a threat?
What are Physical Threats?
What are Non-physical Threats?
Chapter 3: Hacking Tools & Skills
What is a programming language?
What languages should I learn?
What are hacking tools?
Commonly Used Hacking Tools
Chapter 4: Social Engineering
What is social engineering?
Common Social Engineering Techniques
Social Engineering Counter Measures
Chapter 5: Cryptography
What is cryptography?
What is cryptanalysis?
What is cryptology?
Encryption Algorithms
Hacking Activity: Hack Now!
Chapter 6: Cracking Password
What is password cracking?
What is password strength?
Password cracking techniques
Password Cracking Tools
Password Cracking Counter Measures
Chapter 7: Trojans, Viruses and Worms
What is a Trojan?
What is a worm?
What is a virus?
Trojans, viruses and worms counter measures
Chapter 8: Network Sniffers
What is IP and MAC Addresses
What is network sniffing?
Passive and Active Sniffing
What is ARP Poisoning?
What is a MAC Flooding?
Sniffing the network using Wireshark
Chapter 9: Hack Wireless Networks
What is a wireless network?
How to access a wireless network?
Wireless Network Authentication
How to Crack Wireless Networks
Cracking Wireless network WEP/WPA keys
Chapter 10: DoS(Denial of Service) Attacks
What is DoS Attack?
Type of DoS Attacks
How DoS attacks work
DoS attack tools
Chapter 11: Hack a Web Server
Web server vulnerabilities
Types of Web Servers
Types of Attacks against Web Servers
Web server attack tools
Chapter 12: Hack a Website
What is a web application? What are Web Threats?
How to protect your Website against hacks ?
Hacking Activity: Hack a Website !
Chapter 13: SQL Injection
What is a SQL Injection?
How SQL Injection Works
Other SQL Injection attack types
Automation Tools for SQL Injection
Chapter 1: Introduction
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and cybercrime. Cybercrime is using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data etc. Cybercrimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
How can they protect themselves?
In this article, we will introduce you to ethical hacking.
What is hacking?
There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.
Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
What is Cybercrime?
Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using mobile phones via SMS and online chatting applications.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computerfraud:Intentional deception
