How to Hack Computers: how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning pdfdrive com



Download 0,66 Mb.
Pdf ko'rish
bet1/33
Sana22.01.2023
Hajmi0,66 Mb.
#901107
  1   2   3   4   5   6   7   8   9   ...   33
Bog'liq
How to Hack Computers how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning ( PDFDrive )




Contents
Contents
Chapter 1 – Introduction
What it Takes to Become a Good Hacker
Chapter 2 - An Overview of Hacking
Chapter 3 – Attack Types and Famous Viruses
1. Code Red
2. Sasser
3. Zeus
4. The I Love You Attack
5. Melissa
6. The Conficker Worm
7. MyDoom
8. Stuxnet
9. Crypto Locker
10. Flashback
In Summary
Chapter 4 – Ethical Considerations and Warnings
Chapter 5 – Networking Fundamentals
Understanding the OSI Model and Networking Terminology
IP Addressing Essentials
Subnet Masks
Two Special Network Addresses
MAC Addresses
ARP (Address Resolution Protocol)
Ports and Firewalls


In Summary
Chapter 6 - The Hacker’s Tool Belt
Vulnerability Scanners
Port Scanners
Layer 4 Scanners
Packet Sniffers
Password Cracking Utilities
Chapter 7 – Utilizing VMWare
Chapter 8 – Introduction to Ping Sweeps, Port Scanning, and NMAP
Ping Sweeps
Operating System Identification
Port Scanning
NMAP Footprinting Procedures: Installing NMAP
NMAP Footprinting Procedures: Ping Sweeps
NMAP Footprinting Procedures: Port Scanning
NMAP Footprinting Procedures: Operating System Identification
In Summary
Chapter 9 – Using Metasploit to Hack Devices
Basic Metasploit Commands
Chapter 10 – Wireless Password Hacking
VMWare Wireless Password Cracking Caveats
Docker Demonstration
Using Reaver to Crack Passwords
In Summary
Chapter 11 – Web-Based Vulnerabilities
SQL and SQLi Attacks
Cross-Site Scripting Techniques (XSS)
XSS Details and Web Browsers
Ways to Prevent SQLi and XSS


In Summary
Chapter 12 – OpenVAS
Installing OpenVAS
User and Port Configuration
Chapter 13 – Social Engineering
Types of Social Engineering Attacks
An Email from a Trusted Party
A False Request for Help
Baiting Targets
How to Protect Yourself from Social Engineering
Chapter 14 – Man-In-The-Middle Attacks
How to Perform a Man-In-The-Middle Attack
Chapter 15: Cracking Passwords
Password Cracking
Password Cracking Utilities
John the Ripper
Ophcrack
L0phtcrack
Cain & Abel
In Summary
Chapter 16 – Protecting Yourself from Hackers
Software Updates
Change Default Usernames and Passwords
Use Strong Passwords
Properly Configure Your Firewalls
Antivirus and Antimalware Software Solutions
Using VPNs
Backing Up Your Data
Web Browser Security


Final Thoughts



Download 0,66 Mb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9   ...   33




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish