ebook img

Infinity Ethical Hacking: Learn basic to advance hacks PDF

73 Pages·2020·1.115 MB·English
by  SappArthur S
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Infinity Ethical Hacking: Learn basic to advance hacks

Infinity Ethical Hacking Learn basic to advance hacks Arthur S Sapp © Copyright 2020 - All rights reserved. The contents of this book may not be reproduced, duplicated or transmitted without direct written permission from the author. Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly. Legal Notice: This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part of the content within this book without the consent of the author. Disclaimer Notice: Please note the information contained within this document is for educational and entertainment purposes only. Every attempt has been made to provide accurate, up to date and reliable information. No warranties of any kind are expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. The content of this book has been derived from various sources. Please consult a licensed professional before attempting any techniques outlined in this book. By reading this document, the reader agrees that under no circumstances are is the author responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, —errors, omissions, or inaccuracies. Table of Contents INFINITY ETHICAL HACKING Learn basic to advance hacks INTRODUCTION Who is this book intended for? The difference between ethical hacking and cracking The Hacker Ethic CHAPTER 1: WHAT IS ETHICAL HACKING? What is ethical hacking? The need for ethical hackers What is the difference between ethical hacking and cracking? Roles and responsibilities of an ethical hacker CHAPTER 2: HACKING AS A CAREER The different types of ethical hacking Black Box Ethical hacking White Box Ethical hacking Gray Box Ethical Hacking The History of White Hat Hacking CHAPTER 3: MAKING MONEY FREELANCE What is freelancing? The pros and cons of going freelance Benefits Cons Start freelancing I have experience, now what? I have no experience, what should I do? Premiums CHAPTER 4: THE THREE HATS Black hats Zero Day vulnerability? Black Hat Hacker Example White hats White Hat Hacker Example Gray hats Gray Hat Hacker Example CHAPTER 5: ETHICAL HACKING EXPLAINED The evolution of hacking Examples: mischief or criminal? What does it mean to be an ethical hacker? Responsibilities of an Ethical Hacker Hacker Ethics and Code of Conduct CHAPTER 6: SCAN YOUR SYSTEM Port Scan Network scan Vulnerability scan Live system check War Dialing Ping Check ports and their status CHAPTER 7: PENETRATION TESTS The purpose of penetration testing Responsibilities for Cloud Pen testing How often should you perform penetration tests? Penetration test tools Penetration Testing Strategies Penetration testing of cloud-based applications Step 1: Make sure you understand how the cloud provider policy works Step 2: Come in with a plan Step 3: Choose which tools you will use Step 4: Observe the answer Step 5: Find and remove vulnerabilities General advice on Cloud Pen Testing How can local security and cloud security be compared? CHAPTER 8: MOST COMMON SECURITY TOOLS SolarWinds Log and Event Manager Screenshot of SolarWinds Log and Event Manager SolarWinds Network Configuration Manager SolarWinds User Device Tracker Wireshark Nessus Professional Sniffing TCP dump Kismet Nikto OpenVAS OSSEC Nexpose GFI LanGuard Security tools for the cloud Bitglass Skyhigh Networks NetsCheap CipherCloud Okta Cloud Penetration Testing from the customer's point of view The responsibilities of consumers and suppliers Penetration testing Depends on the Cloud Service Model IaaS model PaaS model SaaS model Things to remember as a customer of Cloud Penetration Testing CHAPTER 9: WHAT DO I NEED TO KNOW The nature of the work What is behind the surface of the track? What do you usually do? What are the general assumptions people make about work? How many hours a day do you work? Are there any tips and shortcuts that can help you get to work? Can you do things to differentiate yourself from the rest of the white hats? What about the job is the worst and how do you deal with it? Where is the pleasure in work? What makes it so attractive? Customers and general advice Is there anything you want your customers to know before seeking your help? How much can you earn with this work? How do you progress in this area? What do customers tend to be over or undervalued? What is the most important thing to remember? CONCLUSION Introduction Let's think back to just over 10 years ago. The entire area of IT security was basically unknown. In the 1990s, there were hardly any professionals who could say they were working in cyber security, and even fewer knew what the area was going to be. Security was essentially just anti-virus software. You know, that pesky pop- up that yells at you every time you try to get a file from the Internet. Sure, packet filtering routers and similar technologies were also popular, but it wasn't really considered important. At the time, the concept of a hacker was more like the hacker memes we have today. It was mostly from movies Hollywood made ... or just referred to someone who got a low score while playing golf. It was ignored. Nobody really saw hacking as a threat. After all, what could be won at that time? It was mainly seen as an annoying triviality that pops up every now and then. Today we understand that it is a huge threat that can affect large multi-billion dollar companies and even our governments. It was ignored and at the time it was clear why. Unfortunately, later on, the entire IT industry would feel the impact hackers could leave behind. Today, the number of IT system security professionals worldwide is more than 61 thousand. This is not without reason. In fact, the cyber security field is not only growing, but growing faster than the already growing technology industry according to the ISC. There are now more security companies than anyone to remember and trust me, most of them doing work far more important than just an antivirus. Cyber security has even crept into the mainstream, with countless people authorizing things through their firewalls and using VPNs every day to watch videos not available at their location. There are so many ways to address security issues that it can be a real headache to think about it. Oh well, even considering the alternatives of a single program is enough to give you migraines from the sheer amount of competition out there. The world has changed enormously since the 1990s. I mean, remember the last day you spent without using an electronic device. Chances are you don't even remember that. So, what does all this change bring to your home? For your computer? Does this mean that every time your computer, phone or other smart device is turned on, you are pushed into a dangerous world? Well, that's pretty much what it means, because each of those changes led to the world and the criminals changing into it to meet the new environment as well. In the digital world, you will find a playground filled with mines that only need a single touch to detonate, if they even need to. Even the simplest things can cause quite a few problems for you. If you ever connect to the internet without a decent firewall, chances are your system will be hacked in minutes. Whenever you open a modest email from friends or family, there is always a chance that the email will open a back door to your system. This means that a hacker needs very little time to access even the most private parts of your computer. If you use your Internet Messaging program to download and run a file, don't be surprised if your desktop turns into a virus hot zone. Even when you browse trusted websites, you are completely open to hacker attacks. When this happens, your sensitive files are at risk of being taken or deleted. Unfortunately, the fear of being targeted by an online drive-by is often more than a fear and you can be attacked completely out of the blue. It is not uncommon. More often than not, people like to spread the dangers of cyber terrorism. However, the fear, uncertainty and doubt that people generally feel when it comes to this topic is anything but unjustified. People are often blind to the probability of a digital catastrophe. Organized crime and terrorism have their finger everywhere, including in the digital world. Multiple organized terrorist cells are often raided. When their computers are found, most of what is on them is cyber hacking plans and similar files that show how they would attack the infrastructure of the United States. You may remember August 14, 2003. This was the day when the greatest power outage in United States history occurred. About 20 percent of the U.S. population was without power for more than 12 hours. It is very easy to make yourself believe the most light-hearted story and say that some trees have fallen or strong winds have damaged part of the network. While this explanation may be correct, consider this: 3 days before the power outage, the Microsoft Blaster worm was released on the Internet. This worm is known as one of the most dangerous and volatile worms ever created. While this may have been a coincidence, one can only be skeptical. You might think that all fear and severity caused by cyber terrorism is not justified. You might think that since nothing has happened so far, nothing will happen. But think about this: no one expected 9-11 to happen. Everyone knew there was a security risk when it came to airport security and terrorism, but nothing was done about it. Skepticism is understandable and welcome, since skepticism is never bad. But you have to trust me when I say that cyber terrorism is a very dangerous but probable thing. You have to trust the media when they panic about minor cyber attacks because that's how it all starts. You have to be careful with this. A hacker is like a burglar. They try to keep an eye on your safety until they can point to a place where they can enter your safe space and grab your valuables. Every second of the day, there are hacker groups and organized criminals who dig for your safety. You should never let them succeed. No one should ever sit back and look at someone else who is dear to him and desecrating his safe space. Help yourself by learning more about this and use the resources available to you to protect yourself as much as possible. While increasing your security seems like something out of movies, I can assure you that you can do this quite easily. It's more about what you think than anything. You can compare it with sports or studying. As long as you are adamant and have a schedule where you do certain things, it will quickly become part of your life. If you don't integrate it into your daily schedule, you'll quickly start to forget about it and find excuses for not doing it. Security is a process and not a goal. So it is important that you make it part of your routine and soon you will be able to do it without thinking about it. However, if you avoid this, you will be hit sooner or later. The best thing to do for yourself right now is to educate yourself and gain some knowledge on the subject. You cannot protect yourself from something you do not understand, and you must protect yourself from it. It is not your right to protect yourself, but your duty. Getting to know something that can be dangerous to you is the best thing you can do to protect yourself. If you fill in the gaps in your knowledge, you can prepare for most things. What is well known and clear to see is that you should always keep up to protect yourself from malicious users everywhere. This is where the know- how in this book comes in and saves the day. It offers you a way to implement the technology currently available to us and the knowledge gathered over the years to keep your systems safe for a while. Keeping your system safe is impossible unless you get into the mind of the malicious user and use the knowledge you gain. See what tools they use and use the same

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.