This book outlines different tricks and techniques that an ethical hacker can use to assess the security of the systems, identify vulnerabilities and fix those vulnerabilities. This is done to prevent any malicious attacks against the system.
The hacking we talk about in this book is professional, above board and is a legal type of testing. It is for this reason that it is called ethical hacking. Network and computer security is a complex subject, which constantly changes. You have to stay on top of it to ensure that the information you own is secure from the crackers or criminal hackers.
Ethical hacking, also called white-hat hacking or penetration testing, is a tool that will help you ensure that the information system you use is truly secure. Over the course of this book, you will gather information on the different tools and software you can use to run an ethical hacking program. There are some programs in this book that you can use to start off the ethical hacking process.
In this book you will learn:
What exactly is Ethical Hacking
The dangers that your system can face through attacks
The Ethical Hacking Process and what it means
Understanding a hackers mindset
An introduction to Python
And much much more!
According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.
It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!
I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.
Classification of Hackers
Why do they hack?
Phases of Hacking
Methods of Hacking and Preventive Actions
Denial of Service (Dos Attack)
XSS (Cross site Scripting)
Cross Site Request Forgery, CSRF
Man In The Middle, MITM
Bonus: Google Hacking Tools that assist Hackers
Prevention from Hackers
Laws and Liabilities in India
Aadhaar data breach – January
Facebook data breach – March
Facebook data breach – Sep
Yahoo! Data breaches – August
LinkedIn breach – May
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.