ETHICAL HACKING
A Comprehensive Beginner's Guide
to Learn About the Effective Strategies of Ethical Hacking
Book Timeline
Part One: Introduction to Hacking & Types of Hackers
Chapter One: An Introduction to Hacking
Types of Hacking
Advantages & Disadvantages of Hacking
Types Of Hackers
Chapter Two: Famous Hackers in the World's History
Kevin Mitnick
Ian Murphy
Mark Abene
Johan Helsinguis
Linus Torvalds
Jonathan James
Robert Morris
Gary McKinnon
Kevin Poulsen
Chapter Three: An Introduction to Ethical Hacking
Terminology
Ethical Hacking Commandments
Part Two: Hacking Tools, Skills and Hacking Process
Chapter Four: Ethical Hacking Tools
EtherPeek
QualysGuard
SuperScan
WebInspect
LC4
NMAP
Metasploit
Burp Suit
Angry Ip Scanner
Cain & Abel
Chapter Five: Ethical Hacking Skills
Programming Skills
Linux
Virtualization
Cryptography
DBMS or Database Management System
Networking Skills
Social Engineering
Wireshark
Chapter Six: The Ethical Hacking Process
Step One: Formulate Your Plan
Step Two: Execute the Plan
Step Three: Evaluate the Results
Chapter Seven: The Phases of Ethical Hacking
Reconnaissance
Scanning
Gain Access
Maintain Access
Cover Your Tracks
Part Three: Setup up the Virtual System and Installation of the Tools and Software
Chapter Eight: Reconnaissance
Passive Reconnaissance Tools
Active Reconnaissance Tools
Chapter Nine: Footprinting – A Reconnaissance Phase
Branches of Footprinting
Tools
Advantages
Counter Measures
Tricks and Techniques
Part Four: Network Penetration Testing
Chapter Ten: What Is Penetration Testing?
Types of Penetration Testing
Example
Quick Tips
Chapter Eleven: Different Types of Network Systems
Local Area Network or LAN
Wide Area Network or WAN
WAN, LAN and Home Networking
Other Types of Networks
Part Five: Pre-Connection Attacks
Chapter Twelve: Fingerprinting
Important Elements to Determine the Operating System
Basic Steps
What Is Port Scanning?
What Is Ping Sweep?
Chapter Thirteen: Sniffing
Types
Tools
Chapter Fourteen: Exploitation
Types of Exploitation
Search Engines
Tools
Quick Fix
Chapter Fifteen: Enumeration
NTP Suite
Quick Fix
Part Six: Network Penetration Testing – Gaining Access
Chapter Sixteen: Man-In-The-Middle Attacks
The Attack Progression
Quick Fix
Chapter Seventeen: ARP Poisoning
What Is An IP And MAC Address?
Exercise One
An Introduction to ARP Spoofing or Poisoning
How to Configure the ARP Entry in Windows
ARP Poisoning – Exercise
Chapter Eighteen: DNS Poisoning
DNS Poisoning
How to Avoid DNS Poisoning?
Chapter Nineteen: How to Hack Using the SQL Injection Tool
Step 1
Chapter Twenty: Using Wireshark For Packet Information
The Pop-Up Menu
Part Seven: Gaining Access to Computer Devices
Chapter Twenty-One: Server Side Attacks
Server-side attack basics
Chapter Twenty-Two: Password Hacking
Quick Tips
Chapter Twenty-Three: Password Cracking Using Python
Adding a Python Module
Creating an FTP Password Cracker in Python
Part Eight: Basics of Linux Operating System
Chapter Twenty-Four: Introduction To Kali Linux
What is Kali Linux?
Installing and Preparing Kali Linux
Installing Kali Linux Using USB-Method
Dual Boot Kali Linux Installation
Installing Kali Linux on Hyper-V
Starting Installation Process
Conclusion
References
ETHICAL HACKING
Best Tips and Tricks of Ethical Hacking
Introduction
Contents of the Book
Chapter 1: What is Ethical Hacking?
A Brief History of Ethical Hacking
Ethical Hacking 101
Types of Hackers
What Are the Dangers Your System Faces?
A Look at Ethical Hacking Rules
The Tools You Need for the Journey
Chapter 2: Ethical Hacking Process, Plan and Methodology
Motives of a Malicious Hacker
Deciphering the Ethical Hacking Process
The Methodology You Need for Your Ethical Hacking Plan
Putting the Plan Into Action
Chapter 3: What Does Physical Security Have to do with Ethical Hacking?
The Potential of a Physical Security Attack
Hackers Can Exploit the Loopholes in Physical Security
Watch the Layout
Why Is Physical Penetration Important?
Reconnaissance
Beef up Your Security
Chapter 4: Don’t Underestimate the Dark Potential of Social Engineering
What Are the Types of Social Engineering Attacks?
The Methodology of Social Engineering Attacks
Deceit through Tech
How to Prevent Against Social Engineering Attacks?
Chapter 5: Attack on Network
An Overview of Network Vulnerabilities
War Dialing Attack
Wireless Networks
Implications of Wireless Network Vulnerabilities
Chapter 6: The Network
Potential Loopholes
Chapter 7: Attack on Web Sites and Web Applications
Injection Attacks
Insecure Login
Chapter 8:
How to Hack
Hacking Passwords With Python
How to Hack Into Operating Systems
Hacking Email Passwords
Setting up Smart Phones Pentesting Lab
Chapter 9: Malware
Trojan Horse
Virus
Rootkits
Spyware
Logic Bombs
Conclusion
References
ETHICAL HACKING
Advanced and Effective Measures of Ethical Hacking
Introduction
Chapter One: Introduction to Ethical Hacking
What is Hacking?
Who Is A Hacker?
Types of Hackers
Who is an Ethical Hacker?
Can Hacking Be Ethical?
Skills Of Ethical Hackers
Reasons Why Ethical Hackers Need Vulnerability Research
Chapter Summary
Chapter Two: How to Conduct Ethical Hacking
How do Ethical Hackers Perform Their Function
Different Approaches to Ethical Hacking
Ethical Hacking Testing
How to Choose a Testing Method
Ethical Hacking Evaluation
Implications of Computer Crime
Chapter Summary
Chapter Three: Security
Threat and Vulnerability
What is an Attack?
Security Breaches
Element of Security
Accountability
Reusability
Security, Functionality, and Ease of Use Triangle
The Growth of Hacking
Phases of Security
Effect of Attacks on Business
Phase One Of The Attack
Phase Two
Phase Three
Phase Four
Phase Five
Types of Hackers Attacks
Chapter Summary
Chapter Four: Pre-Attack Stage
Footprinting
Unearthing Initial Information
Chapter Summary
Chapter Five: Scanning
What Is Scanning?
Step One: Live System Check
Step Two: Check for Open-Ports
Scanning Methods
Chapter Summary
Chapter Six: How to Probe the Network
Preparing the Proxy
Anonymizers
Surfing Anonymously
Tunnel Creation and Destruction
Spoofing IP Addresses
Tools
Chapter Summary
Chapter Seven: Anonymizer Tools
Primedius Anonymizer
ShealthSurfer
Browzar
Torpark
Psiphon
Proxy+
ProxySwitcher
HTTP-Tunnel
HTTPort
Spoofing Tools
Chapter Summary
Chapter Eight: Enumeration
What Is Enumeration?
Techniques for Enumeration
What Is an Access Token?
Chapter Summary
Chapter Nine: Simple Network Management Protocol (SNMP)
What is an SNMP?
Management Information Bases (MIBs)
SNMP Service Enumeration
SNMP Enumeration Countermeasures
SNMP UNIX Enumeration
SNMP UNIX Countermeasures
Chapter Summary
Chapter Ten: System Hacking
Cracking Passwords
How to Perform Automated Password Guessing
Chapter Summary
Chapter Eleven: Keyloggers and Spyware
Keystroke Loggers
Software Keyloggers
Keylogger and Spyware Countermeasures
How to Hide Files
Chapter Summary
Chapter Twelve: Steganography
What Is Steganography?
How to Hide Information in Image Files
How to Cover Tracks
Chapter Summary
Chapter Thirteen: Penetration Testing
What Is Penetration Testing?
What Is A Security Assessment?
Types of Penetration Testing
Chapter Summary
Chapter Fourteen: Penetration Testing Tool
Defect Tracking Tools
Disk Replication Tools
Traceroute Tools and Their Services
System Software Assessment Tools
Keyloggers and Screen Capturing Tools
Security Assessment Tools
NetIQ Security Manager
Multiple OS Management Tools
Chapter Summary
Conclusion