Hacking : Guide to Computer Hacking and Penetration Testing
By Alex Nordeen
4.5/5
()
About this ebook
If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.
It also covers the testing methods used by ethical hackers to expose the security loopholes in the system. Once familiar with the basic concept of hacking in this book, even dummies can hack a system. Not only beginners but peers will also like to try hands-on exercise given in the book.
Practical Hacking Guide. Covers the following
Table Of Content
Chapter 1: Introduction
What is hacking?
Common hacking terminologies
What is Cybercrime?
What is ethical hacking?
Chapter 2: Potential Security Threats
What is a threat?
What are Physical Threats?
What are Non-physical Threats?
Chapter 3: Hacking Tools & Skills
What is a programming language?
What languages should I learn?
What are hacking tools?
Commonly Used Hacking Tools
Chapter 4: Social Engineering
What is social engineering?
Common Social Engineering Techniques
Social Engineering Counter Measures
Chapter 5: Cryptography
What is cryptography?
What is cryptanalysis?
What is cryptology?
Encryption Algorithms
Hacking Activity: Hack Now!
Chapter 6: Cracking Password
What is password cracking?
What is password strength?
Password cracking techniques
Password Cracking Tools
Password Cracking Counter Measures
Chapter 7: Trojans, Viruses and Worms
What is a Trojan?
What is a worm?
What is a virus?
Trojans, viruses and worms counter measures
Chapter 8: Network Sniffers
What is IP and MAC Addresses
What is network sniffing?
Passive and Active Sniffing
What is ARP Poisoning?
What is a MAC Flooding?
Sniffing the network using Wireshark
Chapter 9: Hack Wireless Networks
What is a wireless network?
How to access a wireless network?
Wireless Network Authentication
How to Crack Wireless Networks
Cracking Wireless network WEP/WPA keys
Chapter 10: DoS(Denial of Service) Attacks
What is DoS Attack?
Type of DoS Attacks
How DoS attacks work
DoS attack tools
Chapter 11: Hack a Web Server
Web server vulnerabilities
Types of Web Servers
Types of Attacks against Web Servers
Web server attack tools
Chapter 12: Hack a Website
What is a web application? What are Web Threats?
How to protect your Website against hacks ?
Hacking Activity: Hack a Website !
Chapter 13: SQL Injection
What is a SQL Injection?
How SQL Injection Works
Other SQL Injection attack types
Automation Tools for SQL Injection
Read more from Alex Nordeen
Learn SAP MM in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SAP Basis in 24 Hours Rating: 5 out of 5 stars5/5Learn HANA in 24 Hours Rating: 5 out of 5 stars5/5Learn SQL in 24 Hours Rating: 5 out of 5 stars5/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Learn JavaScript in 24 Hours Rating: 3 out of 5 stars3/5Learn SAP SD in 24 Hours Rating: 0 out of 5 stars0 ratingsBusiness Analysis : Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SAP HR in 24 Hours Rating: 5 out of 5 stars5/5Learn Software Testing in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SQLite in 24 Hours Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Learn PMP in 24 Hours Rating: 0 out of 5 stars0 ratingsC++ Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Data Warehousing in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Excel in 24 Hours Rating: 4 out of 5 stars4/5Learn AngularJS in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Selenium in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn MongoDB in 24 Hours Rating: 5 out of 5 stars5/5Learn R Programming in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn SAP BI in 24 Hours Rating: 3 out of 5 stars3/5Learn PHP in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn DBMS in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn C Programming in 24 Hours Rating: 0 out of 5 stars0 ratingsC# for Beginners: Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Operating System in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Cassandra in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Design and Analysis of Algorithms in 24 Hours Rating: 0 out of 5 stars0 ratingsLearn Hadoop in 24 Hours Rating: 0 out of 5 stars0 ratings
Related to Hacking
Related ebooks
Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5Hacking Rating: 3 out of 5 stars3/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Hacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCEH: Certified Ethical Hacker v11 : Exam Cram Notes - First Edition - 2021 Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsLearn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5
Security For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratings
Reviews for Hacking
3 ratings0 reviews
Book preview
Hacking - Alex Nordeen
Table Of Content
Chapter 1: Introduction
What is hacking?
Common hacking terminologies
What is Cybercrime?
What is ethical hacking?
Chapter 2: Potential Security Threats
What is a threat?
What are Physical Threats?
What are Non-physical Threats?
Chapter 3: Hacking Tools & Skills
What is a programming language?
What languages should I learn?
What are hacking tools?
Commonly Used Hacking Tools
Chapter 4: Social Engineering
What is social engineering?
Common Social Engineering Techniques
Social Engineering Counter Measures
Chapter 5: Cryptography
What is cryptography?
What is cryptanalysis?
What is cryptology?
Encryption Algorithms
Hacking Activity: Hack Now!
Chapter 6: Cracking Password
What is password cracking?
What is password strength?
Password cracking techniques
Password Cracking Tools
Password Cracking Counter Measures
Chapter 7: Trojans, Viruses and Worms
What is a Trojan?
What is a worm?
What is a virus?
Trojans, viruses and worms counter measures
Chapter 8: Network Sniffers
What is IP and MAC Addresses
What is network sniffing?
Passive and Active Sniffing
What is ARP Poisoning?
What is a MAC Flooding?
Sniffing the network using Wireshark
Chapter 9: Hack Wireless Networks
What is a wireless network?
How to access a wireless network?
Wireless Network Authentication
How to Crack Wireless Networks
Cracking Wireless network WEP/WPA keys
Chapter 10: DoS(Denial of Service) Attacks
What is DoS Attack?
Type of DoS Attacks
How DoS attacks work
DoS attack tools
Chapter 11: Hack a Web Server
Web server vulnerabilities
Types of Web Servers
Types of Attacks against Web Servers
Web server attack tools
Chapter 12: Hack a Website
What is a web application? What are Web Threats?
How to protect your Website against hacks ?
Hacking Activity: Hack a Website !
Chapter 13: SQL Injection
What is a SQL Injection?
How SQL Injection Works
Other SQL Injection attack types
Automation Tools for SQL Injection
Chapter 1: Introduction
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and cybercrime. Cybercrime is using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data etc. Cybercrimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
How can they protect themselves?
In this article, we will introduce you to ethical hacking.
What is hacking?
There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.
Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
What is Cybercrime?
Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using mobile phones via SMS and online chatting applications.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computerfraud:Intentional deception