Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of HackerThis Book is open Secret Knowledge of Hacker and Penetration Tester. Computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I’ve seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. |
Contents
WINDOWS PASSWORD HACKING | |
SYSTEM HACKING | |
MALWARE VIRUSES | |
EMAIL HACKING | |
WEB APPLICATION HACKING | |
MOBILE HACKING | |
HACKING WLAN | |
FIREWALL IDS HONEY POTS | |
BUFFER OVERFLOW | |
SQL INJECTION | |
SOCIAL ENGINEERING | |
CRYPTOGRAPHY | |
Common terms and phrases
Address myIP Administrator application attack browser buffer overflow called command prompt Computer Forensic cookies Counter measure create Cryptography Cyber Cyber law database desktop detect Disable domain Domain hacking downloaded email header encrypted example exec execute exploits Facebook Facebook account firewall folder footprinting Google search Google’s hackers hashes honeypot Index input install Interaction Internet intitle inurl IP address keylogger keystrokes Linux lock login look Malicious code malware menu method Microsoft MySQL Network DBMSSOCN OPENROWSET SQLoledb operating system options Orkut packet password Phishing port scanning pwd Pass123 query remote reset Right click Rootkit Samsung screen script Secret Codes SIM lock social engineering spam spyware SQL Injection SQL Server stack steganography stored string syntax sysxlogins techniques temp toolbar Uploading username varchar virus viruses vulnerable webcams Windows XP wireless network WLAN