Copyright 2019 - Kevin Clark - All rights reserved.
The contents of this book may not be reproduced, duplicated or transmitted without direct written permission from the author.
Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly.
Legal Notice:
This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part or the content within this book without the consent of the author.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment purposes only. Every attempt has been made to provide accurate, up to date and reliable complete information. No warranties of any kind are expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. The content of this book has been derived from various sources. Please consult a licensed professional before attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances is the author responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, errors, omissions, or inaccuracies.
Contents
Introduction
Hacking is a technique to gain unauthorized access to the data in a system, be it a computer, a website or a smartphone. So, it is a technique to find and exploit the vulnerabilities in the system and then try to break it through different means. It is essential that we have a basic understanding of what hacking is all about, so that it can be prevented. So, we shall see some common techniques that hackers use for getting through a website.
Different Types of Hackers
Different hackers have different motives behind hacking a system or a website. They can be classified as:
White Hat Hackers: They are employees of a company who have done certification in hacking such as the Certified Ethical Hacker certification. Their job is to find out the loopholes and vulnerabilities in the system of the company they are working for and then rectifying them, so that the system remains safe and secure from an unauthorized intrusion. All the work done by them is 100% legal in terms of hacking.
Black Hat Hacker: These hackers use their knowledge to breach the security of a system with unauthorized access. They target their victims, breaking the network systems to earn money illegally. They have good skills in hacking and cause problems to their target by stealing or even destroying their highly confidential data in their system. If they get caught, the hacking done by them is 100% illegal and they have to face the consequences of it.
Gray Hat Hacker: These hackers have the capabilities of both of the above hackers, i.e. White and Black Hat Hackers. These hackers, while surfing the internet, hack a network or a system of a company or an individual by finding out the loophole; they may then disclose what they have found, sometimes asking for money to fix it. They may also threaten to expose the vulnerability publicly.
We can perform ethical hacking on any platform such as smartphones, laptops, websites, and more. This book has been created for everyone who has a keen interest in learning to hack.
Who are the Target Victims of a Hacker?
A hacker can target anyone, from an individual having a Twitter account to a large corporation, such as Microsoft or Google. Sometimes, the hacker will hack an individual for fun but usually it is to gain their confidential data; however, hacking a system of a company is solely for the purpose of making money out of it.
What Can be Hacked by a Hacker?
Hackers can hack social media accounts of an individual, such as Twitter, Facebook and LinkedIn to name a few.
They can hack a website to gain control over its content.
They can hack a bank account to transfer money from it.
They can hack confidential data of a company.
To crash the security system of a country, i.e. for gaining access to nuclear power plants or crashing the power grid of a country.
How to Hack
There are different ways that a hacker uses to steal the information or gain unauthorized access to a network; these include:
These are some techniques used by a hacker which we will go over in detail in this book, but it is not limited to these techniques only.
This book shows all the various techniques used by the hackers for breaching the security of a system or an individual user or a companys network system.
Please note that this book is to be used only for learning purposes. You should not try these hacking techniques for hacking anyones system or personal information without getting prior consent from him/her. Doing so is a serious crime and punishable under law. So, dont try this without the appropriate permission.
Chapter One: Methods of Hacking a Website: Choosing Easy Targets
There are various ways in which hackers try to hack a website to access its content. They try to hack newly built websites first as they have less security initially.
Different methods to hack a website are:
Frame Injection
In this method, the hackers first initially craft a URL that contains the URL they wish to execute on their victim's browser; they then try to convince their victim to follow the link using different techniques like Meet new girls in the town, Won $100,000 in Lottery, etc. Their hope is that the victim will go to that particular URL and thus the code will automatically execute. This provides an attacker with two different attack vectors to be used.
First, the attacker uses this information to find the several known vulnerabilities and issues in the installed web browsers on the users computer; mainly targeting Internet Explorer and Mozilla Firefox but not targeting the browser Google Chrome because it has got high security compared to the other two browsers mentioned above. The result of this type of security attack will mainly depend on the vulnerability the attacker has tried to exploit, but it is not only limited to that.
Also the attackers send a fake web page which contains the particular exploited code and, as soon as the victim opens or views the content of the web page, which is generally made to look like a website the user knows and uses, they fall prey to the attacker easily.
The hacker can also use the fake page code to hack the users details by the technique called phishing. In this technique, the hacker will add additional HTML code along with the main web page so that the fake page looks like the original one. After that, the hacker will make the user enter his confidential details (username/password) in the fake login page; this will not take the user to that particular website server but to any other server under the control of the hacker. And this doesnt stop here. The attacker even makes the fake web page store the entered information in his controlled server and then directs the victim to the original website page showing some error at that time. They may even ask the user to successfully sign in to that website and open his home page; the victim will not know that the login was not secure and his login details have been hacked by the attacker.