Description
In today’s time where geographical boundaries are easily covered by Internet and computers with click of a button,there are lies risks within the ecosystem.Hacking somebody’s details could lead to damages and losses.
In this book we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system.It is a humble effort to make students understand with help of Diagram and Images the procedures through which the vulnerabilities are exploited.
It is written in simple and lucid language to be understood by one and all.
Table of Contents
PART-A. BASICS OF HACKING
Chapter 1: Introduction to Hacking
Chapter 2: Introduction to Ports & Protocols
Chapter 3: Virtualization & Introduction to Kali Linux
Chapter 4: Foot-printing
Chapter 5: Scanning
PART-B. PERFORMING THE HACK
Chapter 6: Hacking Into System
Chapter 7: Trojans & Backdoors
Chapter 8: Viruses & Worms
Chapter 9: Sniffing, Packet Analysis & Session
Chapter 10: Social Engineering
Chapter 11: Cryptography
Chapter 12: Steganogrpahy
Chapter 13: Vulnerability Assessment
Chapter 14: Deep Web & Dark Net
PART-C. ADVANCE HACKING
Chapter 15: Denial of Service
Chapter 16: Web Application & Web Server Penetration Testing
Chapter 17: Wireless Network Exploitation
Chapter 18: Additional References
Author
Harsh Bothra
Harsh Bothra is a Computer Science Engineer, Information Security Researcher & Ethical Hacker. He Authored a book Titled Hacking : Be A hacker With Ethics Recommended by MHRD, AICTE & NITTTR, Harsh is a Founder & CEO of Cyber Square info Solutions, Present Chapter Leader of OWASP Bikaner and former OWASP- Jaipur Chapter Lead for more than two years. He has been actively training students across various reputed institutions. Alongside, Harsh also works in developing software & web applications. Harsh has a significant interest in exploring various technical domains and spreading his knowledge through online & offline mediums.</p
Deepak kumar –
Nice book and perfect besic knowledge