HACKING
17 Most Dangerous
Hacking Attacks
Volume 4
by
ALEX WAGNER
Copyright
All rights reserved. No part of this book may be reproduced in any form or by any electronic, print or mechanical means, including information storage and retrieval systems, without permission in writing from the publisher.
Copyright 2017 Alex Wagner
Disclaimer
This Book is produced with the goal of providing information that is as accurate and reliable as possible. Regardless, purchasing this Book can be seen as consent to the fact that both the publisher and the author of this book are in no way experts on the topics discussed within and that any recommendations or suggestions that are made herein are for entertainment purposes only.
Professionals should be consulted as needed before undertaking any of the action endorsed herein.
Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly.
This declaration is deemed fair and valid by both the American Bar Association and the Committee of Publishers Association and is legally binding throughout the United States.
The information in the following pages is broadly considered to be a truthful and accurate account of facts and as such any inattention, use or misuse of the information in question by the reader will render any resulting actions solely under their purview. There are no scenarios in which the publisher or the original author of this work can be in any fashion deemed liable for any hardship or damages that may befall the reader or anyone else after undertaking information described herein.
Additionally, the information in the following pages is intended only for informational purposes and should thus be thought of as universal. As befitting its nature, it is presented without assurance regarding its prolonged validity or interim quality. Trademarks that are mentioned are done without written consent and can in no way be considered an endorsement from the trademark holder.
Table of Contents
Introduction
Chapter 1 Adware / Spyware / Malware
Chapter 2 Man in the Middle
Chapter 3 ARP Poisoning
Chapter 4 Wireless attacks
Chapter 5 Phishing, Vishing, Whaling
Chapter 6 Password Cracking
Chapter 7 Spoofing
Chapter 8 - Spamming
Chapter 9 Xmas Tree Attack
Chapter 10 Botnet
Chapter 11 SQL Injection
Chapter 12 - Distributed Denial of Service
Chapter 13 Worms &Virus types
Chapter 14 Logic Bombs
Chapter 15 Backdoors & Trojans
Chapter 16 Ransomware
Chapter 17 WannaCry
Introduction
Congratulations on purchasing this book and thank you for doing so.
This book is designed to focus on the most common hacking methods exist today. You will be exposed to how the most dangerous attacks are implemented using multiple methods.
If you are thinking of becoming an Ethical Hacker, also known as Penetration tester, the concepts explained in this book will provide an excellent learning opportunity that you can use in real life. The contents in this book are explained in everyday English to help you grasp these concepts faster. All through this book is designed to explain the techniques, Volume 2, and Volume 3 is focusing more on step by step implementation process. I have demonstrated 90% of hacking techniques in Volume 2 and Volume 3 step by step, using multiple operating systems and several software for the purpose of helping you learn how to implement certain commands in order to successfully gain power over any network.
If you are only interested in knowing how hacking works and how it is carried out, this book will be beneficial to you. For those who are only seeking to understand the theory behind hacking attacks, this book will also help you. In order to become an Ethical Hacker, you must understand first the why hackers and cybercriminals are operating in such large scale.
It is vital to understand how certain hacking methods are done in order to avoid become a victim yourself. This book will help you get ready against hackers and the most dangerous hacking attacks exist in our current world.
There are plenty of books on this subject in the market, thanks again for choosing this one! Every effort was made to ensure the book is riddled with as much useful information as possible. Please enjoy!
Chapter 1 Adware / Spyware / Malware
Malware
First I will begin to tell you that most probably you will find Malware on Windows operating systems because most operating systems out there in a production environment are indeed some Windows based operating systems. When you think a hacker point of view, there is no sense to create malware for operating systems that only take 30% of the worlds operating systems. Instead, the ones that are most common should be infected.
There are many different types of Malware out there, so I will begin to explain some of them, however first let me list the most common types for your reference.
Adware
Worms
Viruses
Spyware
Trojan Horse
Botnet
Rootkit
Backdoor
Logic bomb
As you see there are so many different types of Malware that are often difficult to identify what type of Malware you might get infected.
The reality is that some of the Malware might be working together and then it would be even harder to remove them from your computer.
An example would be that you get infected with a Trojan Horse. However, while you would get busy to remove it, in the meanwhile, there would be an additional Backdoor that would get installed on another machine automatically.
What happens in such situation is that you might believe that you have removed every malicious software from your PC, however in the meanwhile, another software would install itself that would re-infect your PC once again. Sometimes they might be working together, and once you would delete a certain malicious file, it would trigger another file to re-infect your PC.
You could potentially get infected by simply browsing the web, and clicking on something that shouldnt, these might be an advert of some sort, but it can also come from a genuine website. Another form might be that you have received an e-mail and sometimes by opening the email without even clicking on anything can cause an installation of malware. Some of the e-mails would ask you to follow individual links to provide your opinion on a certain product or website, these all can trigger a malware that is very malicious.
From personal experience, I had once a malware that was an Adware, and pretty much any website I have opened, I kept on getting pop advertisements. Anytime I have deleted all the software that wasnt from a genuine source, I have realized that after a while they all re-appeared with the same date of installation, even I didnt even touch my computer.
Malware exists for the purpose of financial gain, and some of the types are written for the only purpose of stealing credit card details, usernames, and Passwords.
Advertising windows can also make money for hackers in the way of being an affiliate for a particular product, and they would get a percentage of you, or anyone would buy those simply from does who would use those links that are kept on popping up on your screen.
Some of these advertising pop-ups might be visible already on your screen even right after you would open a web browser, and that would be an adamant indication that you have some malware on your computer.
Malware would use many methods. However the most common are to look for known vulnerabilities of an older version of operating system or the previous version of the application.
Next page