ebook img

Hacking. Computer Hacking, Security Testing,Penetration Testing, and Basic Security PDF

134 Pages·2016·19.36 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Hacking. Computer Hacking, Security Testing,Penetration Testing, and Basic Security

HACKING COMPUTER HACKING, SECURITY TESTING, PENETRATION TESTING AND BASIC SECURITY GARY HALL & ERIN WATSON HACKING Computer Hacking, Security Testing, Penetration Testing And Basic Security Gary Hall & Erin Watson ‘ART HALL ERIN WATSON ® Copyright 2016 - All rights reserved. ‘The cantons ofthis book may net be reproduced, duplicated ot wansmlued without dict welll permission from tke author Lrver na ereamstances wil ary legal resporsitilityo blame he ell against the ps ‘or nnetary lose to the iafervation hein eigherdivectly o tects efor any reparation, damages, Legal Notice: ‘This book is copyright protected. This i only for pesonal use. You cannot amend, disuibute, sell, usc, quote or paraphrase any pata the content within this book without she censent nF the autho, Disclaimer Notice: lease note the information contained within this document i far educateal ad entvtainment purposes only, Pvery “aempt has been made to provide accurate, up to cate and -eliable complete information. No wartntes of any hind are “exprened or imglied. Readers acknowledge thar the author is nce engaging inthe cendaring of legal, financial, medical fr professional advice. The eantant at this bok has een derived from various sauces, Please consult a lcensed rofessional store attempting any techniques cutie tr this book, ‘By reading cis documert, the reader aprees that under no circumstances are isthe author respoasisle for any losses, Jlrs or indinect. wich ene incurred asa est nf the use of ifermation contained within ths Coeument, inching, hit not into i, evens, emissions, or aremacies Table of Contents Introduction PART I: INTO THE WORLD OF HACKING Chapter 1: What is Hacking? Chapter 3: The Ethical Hacking Plan Chapter 4: The Hacker’s Methodology PART II: THE HACK ATTA‘ Chapter 5: How to Hack a Smartphone Chapter 6: How to Hack Operating Systems Chapter 7: Social Engineering Hacking Chapter 9: How to Hack Passwords Chapter 10: Hacking Websites and Web Applications Chapter 11: Hacking Wireless Networks PART IL: THE AFTERMATII Chapter 12: Why Hacking Is Absolutely Necessary Chapter 13: The Do’s and Don'ts of Hacking c : Predicti FE {Hack Conclusion Resources Introduction Most people don’t really understand what hacking is about, much less how 0 go about i Its something that we just watch in movies or hear ahout on the news. This book, Hacking, Computer Hacking, Security Testing, Penetration Testing And Basic Security, is meant to help you understand hacking techniques in a broader and deeper way. Hacking is commonly viewed as an illegal activity that is designed ro steal dara or money. Though it is true that some hackers out there use their skill for criminal activities, this is ‘not what hacking is really about. Hacking is simply a way of discovering ignored or unintended uses of a product or situation and then coming up with new ways of solving a problem. In this book, you will learn how you can protect yourself from some of the mast prevalent hacking schemes to date. How? By learning how to hack! That's right. It would be inconceivable to expect to protect yourself and property from hackers witaout first understanding how hacking actually works, If you want to stay ahead of hackers and perform your own counter-hack, you are in luck, You grabhed the right hook, In here you will learn shout the modern tools and advanced techniques that ethical and criminal hackers use. Not only will you lear how to search for ‘weaknesses in a security system, you will also get to know how to identify a system that is under attack. ‘There are strategies that have been cutlined here that will help you test the vulnerability of any system and prevent you from falling into black hat traps. This book is aimed at helping you improve information security for personal use as well as professionally. It is therefore very important that understand how electronic devices can he compromised without you even being aware of it The hook uses simple language that beginners can understand, Experienced hackers whn ‘need to leam certain aspects of hacking in an in-depth manner can also use the book. This hook provides great tips an how to become an ethical hacker for an organization that needs to fix any vulnerabilities in its systems, ‘The book is split into three parts, each discussing a different theme, Part | sets us off into the world of hacking, its history, and where we are now, Part II talks about the functional arc of hacking various systems, networks, and applications. Finally, pert III relates to what to do and what not to do regarding ethical hacking, and what the future holds for hacking, ‘You can start with any part that interests you and maneuver as you see fit, ‘We hope that by the time you finish reading this book, you will have learned enough to hetter protect yourself and also perform some ethical hacking of your own. PART I: INTO THE WORLD OF HACKING Chapter 1: What is Hacking? ‘When the word hacking is mentioned, what kind of images come to mind? Do you think of criminals and vandals trying to steal data ar spy on others? 0 you think of someone sitting in front of an array of computers, sending out encrypted programs to people in order to gain unauthorized access to their computers remotely? The truth is that che majority of people view hacking as an illegal activity. While it is true that criminal hackers do exist, they are actually just a small minority. Hacking is simply finding an elternative or unintended use of computer hardware or software, so. as to enhance their applications and solve problems. This is the technical definition of hacking. Hacking is using the technology available in ‘new and counterintuitive ways in order to solve problems that conventional techniques cannot. It is only in our current digital age that hacking has become synonymous with bypassing security, Megally accessing another person's computer, ard wrecking havoc The History of Hacking Back in the late 1870's, Bell Telephone Company hired several teenage boys to work as switchboard operators. These boys decided to engage in some technological mischicf by intentionally misdirecting and disconnecting phone calls, listening in on conversations, and other kinds of pranks. Though this was not called “hacking” back then, it was the earliest recognized incident of misusing technology. It is even believed that this was one of the reasons that the company decided to only hire female workers as operators, Fast forward about 100 years later, in the 1950's. ‘The word “hack” was used to refer to a shortcut or technique used to bypass the original operation of a system, The term was coined by MIT model train enthusiasts who received a donatioa of old telephone equipment, which they then used to create a complicated system for controlling their ‘model trains. They were able to engineer a way to allow multiple operators to manipulate the track by dialing the telephone, These are considered to be the original hackers because they were able to take the equipmen: that they had and discover a new an inventive use for it A number of these model train hackers then became curious about the new computer systems that were being introduced on their campus. They were programming geeks that wanted to change the existing computer programs to make them better, customize them for special epplications, and mostly just to have fun, The end result was that they produced ‘modified and more elegant versions of the original programs. They weren’t just content to write programs tha: solved problems; they wanted their programs to solve problems in the best ways possible, In the 1970's, there arose a different type of hucker whose focus was on exploiting the telephone system. These were referred to as “phreakers,” and their aim was to figure out how the electronic switching system worked so that they could make free long-distance phone calls. This is an example of one of the first anti-establishment movements that ‘would Later give birth to personal computer hackers. ‘As personal computers became more common in the 1980’s, hackers were able to acquire their own devices and use the new technology to expand their reach, They quickly learned how to use madems to dial into and gain access to other people’s personal computers. It was at this time that Stephen Levy published Hackers: Heroes of the Computer Revolution, where he stated that there should be unlimited and total access to computers in order to understand how the world works. The desire to dissect, understand, and better appreciate computer programming in order to gain more knowledge would later be regarded as the Hacker Ethic. In the late 1980’s, there emerged a group of hackers who felt that exploring systems tor benign reasons suc as leaming wasn’t enough anymore. This younger generation decided to start hacking for personal profit by engaging in criminal activities. This included selling pirated video yames, software, and even distributing, worms and viruses to take dawn entire systems. They formed cyber-gangs that went after sensitive data in large institutions and governments. Law enforcement stepped in and anti-hacking legislation was soon passed, Many of these cyber gang members were arrested and prosecuted. ‘The latest frontier in hacking is known as “whacking,” This involves finding unsecured Wireless Access Points (WAPs) and connecting to them, This has become more prevalent due to increased use of Wi-Fi.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.