Description
In today’s time where geographical boundaries are easily covered by Internet and computers with click of a button, there are lies risks within the ecosystem. Hacking somebody’s details could lead to damages and losses.
In this book we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system. It is a humble effort to make students understand with help of Diagram and Images the procedures through which the vulnerabilities are exploited.
It is written in simple and lucid language to be understood by one and all.
Table of Contents
PART-A. BASICS OF HACKING
Chapter 1: Introduction to Hacking.
Chapter 2: Introduction to Ports & Protocols.
Chapter 3: Virtualization & Introduction to Kali Linux.
Chapter 4: Foot-printing.
Chapter 5: Scanning.
PART-B. PERFORMING THE HACK
Chapter 6: Hacking Into System.
Chapter 7: Trojans & Backdoors.
Chapter 8: Viruses & Worms.
Chapter 9: Sniffing, Packet Analysis & Session.
Chapter 10: Social Engineering.
Chapter 11: Cryptography.
Chapter 12: Steganography.
Chapter 13: Vulnerability Assessment.
Chapter 14: Deep Web & Dark Net.
PART-C. ADVANCE HACKING
Chapter 15: Denial of Service.
Chapter 16: Web Application & Web Server Penetration Testing.
Chapter 17: Wireless Network Exploitation.
Chapter 18: Additional References.
Author
Harsh Bothra
Harsh Bothra is a Computer Science Engineer, Information Security Researcher & Ethical Hacker. He Authored a book Titled Hacking : Be A hacker With Ethics Recommended by MHRD, AICTE & NITTTR, Harsh is a Founder & CEO of Cyber Square info Solutions, Present Chapter Leader of OWASP Bikaner and former OWASP- Jaipur Chapter Lead for more than two years. He has been actively training students across various reputed institutions. Alongside, Harsh also works in developing software & web applications. Harsh has a significant interest in exploring various technical domains and spreading his knowledge through online & offline mediums.
Average rating
4.00
1 review
Only logged in customers who have purchased this product may leave a review.
Deepak kumar (verified owner) –
Nice book and perfect besic knowledge