Hvis du vil lære at hacke (Om du vil bruge det legalt eller ej), kan jeg anbefale E-bogen "Hacking For Beginners - a beginners guide for learning ethical hacking", som er en bog som lære dig at hacke servere, hvordan det fungere, hvordan man hacker windows, hvordan trojans fungere, trådløst (wifi) hacking, Mobil hacking, Scanning af porte, Sniffers, Linux hacking, hvordan man laver en virus. Også er der den anden del af det - den lærer dig at beskytte dig mod det, hvordan man skifter IP adresse, hvordan man beskytter sig mod hackere, osv.
Bogen er skrevet til ethical hacking, altså til white hat hackere, som beskytter systemer, men hacking er et meget interessant emne, specielt fordi du får en forståelse for styresystemer - at det hele bare er en masse filer pakket ind i en grafisk skal, og at det er super nemt at bryde igennem sikkerheden..
Her ligger indholdsfortegnelsen :-P
SECTION 1:- The Theatrical concepts and Explanation.
1. Concept of Ethical Hacking……………………………………………………………………………………………………………..……. 12
What Is Hacking …………………………………………………………………………….…………………………………………………………….….. 12
Types of hacker ………………………………………………………………………………………………...………………………………………….…. 13
Why hackers hack? ……………………………………………………………………………………………………………………………………….…. 15
Preventions from hacker ……………………………………………………………………………………………………………………..………..… 15
Steps Performed by hackers ………………………………………………………………………………………………………………………....….16
Working of an Ethical hacker ………………………………………………………………………………………………………………………….…17
2. Email Hacking ……………………………………………………………………………………………………………………..….…..……… 19
How Email Works? ……………………………………………………………………………………………………………………………………….…. 19
Email service protocols ……………………………………………………………………………………………………………………………….…...20
Email spoofing …………………………………………………………………………………………………………………………………………….….. 21
PHP Mail sending script …………………………………………………………………………………………………………………………….……. 22
Email Spamming …………………………………………………………………………………………………………………………………………..... 23
Phishing …………………………………………………………………………………………………………………………………………………….……. 23
Prevention from phishing ………………………………………………………………………………………………………………………….……. 24
Email Tracing …………………………………………………………………………………………………………………………………………….……. 24
Keystroke loggers ……………………………………………………………………………………………………………………………………….….. 26
Securing Your Email account ………………………………………………………………………………………………………………………….. 27
3. Windows Hacking and Security.…...……………………………………………………………………………………….…………… 28
Security Architecture of Windows………………………………………………………………………………………………………………….. 28
Windows user account Architecture………………………………………………………………………………………………………………. 29
Cracking Windows User Account password …………………………………………………………………………………………………... 30
Windows User Account Attack …………………………………………………………………………………………………………………....… 33
Counter Measures of Windows Attack ………………………………………………………………………………………………………….. 33
To hide a file behind a image …………………………………………………………………………………………………….………………..… 34
Make a private folder…………………………………………………………………………………………………………………………………….. 35
To run net user in Vista and Windows 7 …………………………………………………………………………………………………..…... 37
Hacking For Beginners – Manthan Desai 2010
Brute Force Attack ……………………………………………………………………………………………………………………………………….… 38
Rainbow table attack …………………………………………………………………………………………………………….…………………….…. 39
Counter Measures for Windows Attack ………………………………………………………………………………….………………….….. 40
4. Trojans in Brief ………………………………………………………………………………………………….………………….………..…. 42
Knowing the Trojan ………………………………………………………………………………….………………………………………………...…. 42
Different Types of Trojans ……………………………………………………………………………………………………………………….…….. 43
Components of Trojans …………………………………………………………………………………………………………………..…………….. 45
Mode of Transmission for Trojans …………………………………………………………………………………………………………….…… 47
Detection and Removal of Trojans ………………………………………………………………………………………………………………... 48
Countermeasures for Trojan attacks ………………………………………………………………………………………………………….…. 48
5. Attacks on web servers and Security ……….………………………………………………………………………….………….…. 49
Introduction to Web Servers..………………………………………………………………….………………………………………………...…. 49
The Basic Process: How Web servers work …………………………………………………………………………………………….………. 49
Attacks on Web servers …………………………………………………………………………………………………………………………….…... 50
Web Ripping …………………………………………………………………………………………………………………………………………….….… 50
Google Hacking …………………………………………………………………………………………………………………………………………..…. 51
Protecting Your Files from Google ……………………………………………………………………………………………………………….... 53
Cross Site Scripting (XSS) …………………………………………………………………………………………………………………….……….… 54
Directory Traversal Attack …………………………………………………………………………………………………………….…..………..… 55
Database Servers ………………………………………………………………………………………………………………………………….……….. 57
Login Process on the websites ………………………………………………………………………………………………….……….………….. 58
SQL injection …………………………………………………………………………………………………………………………………………….…… 58
Input validation on the SQL Injection ……………………………………………………………………………….……………………….…… 59
PHP Injection: Placing PHP backdoors …………………………………………………………………………………………………….…….. 60
Directory Access controls ……………………………………………………………………………………………………………………………... 62
How Attackers Hide Them While Attacking …………………………………………………………………………………………….….…. 62
Types of Proxy Servers ………………………………………………………………………………………………………………………………..… 63
6. Wireless hacking …………………………………..………………………………………………………………………………..…….….. 65
Wireless Standards …….……………………………………………………………………………………………………………………………….… 65
Services provided by Wireless Networks ……………………………………………………………………………………………………….. 67
Hacking For Beginners – Manthan Desai 2010
MAC address filtering …..…………………………………………………………………………………………………………………………….…. 68
WEP key encryption …………………………………………………………………………………………………………………………………….… 69
Wireless attacks ……………………………………………………………………………………………………………………………………….……. 69
MAC spoofing ……………………………………………………………………………………………………………………………………….……….. 70
WEP cracking ……………………………………………………………………………………………………………………………………………..….. 70
Countermeasures for Wireless attacks …………………………………………………………………………………………………….….…. 71
7. Mobile Hacking – SMS & Call forging…………………………………………………………………………….…………..…..…….72
What Does It Involve ……………………………………………………………………………………………………………………………..…..….. 72
Call Spoofing / Forging ……………………………………………………………………………………………………………………….……..…… 74
SMS Forging …………………………………………………………………………………………………………………………………………………… 75
Bluesnarfing ………………………………………………………………………………………………………………………………………………..... 76
8. Information gathering and Scanning ……………………………………………………………………………….………………….78
Why Information gathering? ………………………………………………………………………………………………………………………….. 78
Reverse IP mapping ………………………………………………………………………………………………………………………………….……. 78
Information Gathering Using Search Engine …………………………………………………………………………………………….……. 79
Detecting ‘live’ systems on target network …………………………………………………………………………………………….……… 81
War diallers ……………………………………………………………………………………………………………………………………………….….… 81
9. Sniffers ……………………………………………….………………………………………………………………………….….………..….… 82
What are Sniffers ? ………………………………………………………………………………………………………………….………………….…. 82
Defeating Sniffers………………………………………………………………………………………………………………….……………………..…. 83
Ant Sniff ……………………………………………………………………………………………………………………………….……………………..…. 83
10. Linux Hacking..…………………………………….…………………………………………………………….………….………….…...… 85
Why Linux?..............…………………………………………………………………………………………………………………………………...….. 85
Scanning Networks …………………………………………………………………………………………………………………………………..……. 86
Hacking tool Nmap ……………………………………………………………………………………………………………………………………..…. 87
Password cracking in Linux ………………………………………………………………………………………………………………………..….. 87
SARA (Security Auditor’s Research Assistant) ……………………………………………………………………………………………..…. 88
Linux Root kits …………………………………………………………………………………………………………………………………………..…… 88
Linux Tools: Security Testing tools …………………………………………………………………………………..………………………….…. 90
Linux Security Countermeasures ……………………………………………………………………..………………………………………..…... 90
Hacking For Beginners – Manthan Desai 2010
SECTION 2:- The Tutorial based hacks and explaination as online.
1. How to Chat with your friends using MS-DOS ……………………………………………………….………………..…………………... 93
2. How to change your IP address ………………………………………………………………………………………………………………….… 94
3. How To fix corrupted XP files …………….………………………………………………………………………………………………………… 95
4. Delete an “Undeletable” File / Folder ……………………………………………………………………………………………………….... 96
5. What is Steganography? ………………………………………………………………………………………………………………………..…… 100
6. What Is MD5 Hash & How to Use It? ………………………………………………………………………………………………………..... 101
7. What is Phishing and Its Demo ……………………………………………………………………………………………………………….….. 103
8. How to view hidden passwords behind asterisk (********) ……………………………………………………………..……….. 106
9. Hacking Orkut Account Using Cookie Stealing ……………………………………………………………………………….…………... 108
10. Tab Napping A New Phishing Attack …………………………………………………………………………………………….……………. 110
11. How to Check The email is original or Not ……………………………………………………………………………………….………… 113
12. Hack facebook account using facebook hacker …………………………………………………………………………….….………... 116
13. What Are Key loggers ?.................................................................................................................................. 118
14. How to remove New Folder virus ………………………………………………………………………………………..……….……….... 120
15. Mobile hack to call your friends From their own Number …………………………………………………….….…………….… 121
16. Get Orkut Scraps on Mobile for free using Google SMS Channel!................................................................. 124
17. Internet connection cut-off in LAN/Wi-Fi ……………………………………………………………………….………………….…….. 127
18. WEP cracking using Airo Wizard……………………………………………………………………………………………………….………. 129
19. 12 Security tips for online shopping ……………………………………………………………………………………………….……..... 133
20. How to check if Your Gmail account is hacked or not ………………………………………………………………………….…… 134
21. Beware of common Internet Scams and Frauds ………………………………………………………………………….…………… 137
22. 12 Tips to maintain a virus free PC………………………………………………………………………………………………………….… 138
23. 10 Tips for Total Online Security………………………………………………………………………………………………………………. 140
24. What to do when your Orkut account is hacked…………………………………………………………………………………..….. 142
25. Making a computer virus …………………………………………………………………………………………………………………….….. 143
26. SQL injection for website hacking…………………………………………………………………………………………………………….. 147
27. How a ‘Denial of service’ attack works …………………………………………………………………………………………………….. 151
28. XSS vulnerability found on You Tube explained ………………………………………….………………………………………….... 154
Hacking For Beginners – Manthan Desai 2010
29. Hacking Deep Freeze …………………………………………………………………………………………………………………………………. 157
30. How to watch security cameras on internet ………………………………………………………………………………………..……. 159
31. List of PC file Extensions…………………………………………………………………………………………………………………………….. 161
32. Nice List of Windows Shortcuts …………………………………………………………………………………………………………………. 185
33. How to find serial numbers on Google ………………………………………………………………………………………………………. 191
34. How to create a CON folder in Windows …………………………………………………………………………………………………… 192
35. 10 Reasons why PC’s crash you must know………………………………………………………………………………………………… 195
36. How to use Kaspersky for Lifetime without Patch ……………………………………………………………………………………… 200
37. Disguise as Google Bot to view Hidden Content of a Website …………………………………………………………………… 201
38. How to Download Facebook videos ………………………………………………………………………………………………………….. 203
39. Hack a website by Remote File Inclusion ………………………………………………………………………………………………….. 205
40. What is CAPTCHA and how it works?…………………………………………………………………………………………………….….. 207
41. Hack Password of any Operating System …………………………………………………………………………………….…………... 209
42. Windows PowerShell Security in Brief………………………………………………………………………………………………………. 211
43. What is Secure Sockets Layers (SSL)? ……………………………………………………………………………………………………….. 216
44. Make a Private folder With your password ………………………………………………………………………………………………. 220
45. Making a Trojan using Beast 2.06……………………………………………………………………………………………………………… 222
46. Hacking yahoo messenger for multi login ………………………………………………………………………………………………… 228
47. 5 Tips to secure your Wi-Fi a connection …………………………………………………………………………………………………. 229
48. Upgrade Windows 7 to any higher version ……………………………………………………………………………………………… 230
49. World’s top 10 internet hackers of all time ……………………………………………………………………………………….…….. 231
50. The complete History of hacking …………………………………………………………………………………………………………….. 238
- Vil lige tilføje at det ikke er svært at hacke, man kan få en masse tools som gør det for dig, men den vigtigste del af hacking er at man sletter sine spor efter sig så man ikke bliver opdaget; og lige netop den del er sindssyg svær, og det er bedst ikke at bruge tools til den del, da tools godt kan overse en masse ting.
Indlæg senest redigeret d. 17.07.2012 12:24 af Bruger #16945