Ethical Hacking
A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking
Copyright 2020 - All rights reserved.
The contents of this book may not be reproduced, duplicated or transmitted without direct written permission from the author.
Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly.
Legal Notice:
This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part or the content within this book without the consent of the author.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment purposes only. Every attempt has been made to provide accurate, up to date and reliable complete information. No warranties of any kind are expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. The content of this book has been derived from various sources. Please consult a licensed professional before attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances is the author responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, errors, omissions, or inaccuracies.
Table of Contents
Introduction
Did you hear what happened when some users entered the HBO database and obtained the latest Game of Thrones episodes? Do you know what they did when they obtained these episodes? They threatened HBO that they would release the episodes before the due date unless HBO coughed up some money. This is terrible situation for them to have been in. Had HBO hired the right professionals to check the system, they could have prevented this type of hack. There are many other hacks that were performed that allowed a hacker to obtain some sensitive information about the organization or target system. These professionals are ethical hackers, and it is important for organizations to hire these professionals to ensure the security of any network or server.
If you want to be a master in Ethical Hacking and you dont have any prior knowledge of penetration testing and hacking the book Ethical Hacking: A Comprehensive Beginners Guide to Learn about the Effective Strategies of Ethical Hacking is for you to learn hacking strategies from scratch.
This book is divided into three phases which include preparation, penetration testing, and the protection of your system. In the first phase you will learn what hacking is and the basics of ethical hacking and hacking terminologies, tools that are used in ethical hacking, skills used in ethical hacking and hacking process.
In the second phase, you will learn different hacking terminologies such as Reconnaissance, Footprinting, Fingerprinting, Sniffing, and Exploitation. This phase will also include hacking practices that are legal and safe such as network security tests, how to crack Wi-Fi network passwords using WEP, WPA, and WPA2. We will look at different scripts you can run to perform these hacks.
In the last phase, you will learn about Kali Linux which is essential to learn to become a successful Ethical Hacker. Installation of Kali, Network Penetration Testing, Pre-connection Attacks, Network Penetration Testing Gaining Access, Post Connection Attack, Client & Server-side Attacks, SQL Injections, and much more. You will learn more about the different tools and techniques you can use to obtain information about the target system. Remember that you should use these techniques when you have gathered all the necessary information. You must ensure that you protect your system before you run these attacks. The information in this book will shed some light on the different types of hacks that you can perform. If you are an ethical hacker, you can perform these hacks to test the security of the organization. You will also learn more about DNS Spoofing, ARP Spoofing and other types of hacks.
Moreover, you will learn about the detection, prevention, and the security of network systems. By the end of learning and practicing the complete book, you will be a professional Ethical Hacker.
Book Timeline
Part One: Introduction to Hacking and Types of Hackers, Some famous Hackers, Concept of Ethical Hacking, its types, Advantages, and Disadvantages of ethical hacking, and Different Hacking Terminologies.
Part Two: Hacking tools, skills and Hacking Process - which describes the steps and processes that are performed by an ethical hacker.
Part Three: Setup up the virtual system and installation of the tools and software that is used to perform hacking and penetration testing operations. You will also learn about the different phases in Ethical Hacking, and the tools used to perform those phases.
Part Four: Network Penetration Testing - this chapter will include the basics of a network system and its types.
Part Five: Pre-Connection Attacks - in this chapter you will learn about wireless cards. We take a look at using Port Scanning, Fingerprinting, Enumeration and Exploitation to obtain information about the target systems.
Part Six: Network Penetration Testing Gaining Access, describes how to crack the password and get access to the victims system by using the information we gathered.
Part Seven: Man-in-the-Middle Attacks - this chapter describes how to launch different man-in-the-middle attacks, those attacks are ARP spoofing, DNS spoofing, and session hijacking. Moreover, it also includes how to use the Wireshark tool to gather packet transfer information of the particular network.
Part Eight: Gaining Access to Computer Devices - in this chapter you will learn how to gain full access to any computer system in the network. This chapter will cover the first approach, which is server-side attacks. Moreover, you will learn how to get authorization to the target computer system without user mediation including full specifications the operating system, installed devices, and open ports. This method is used to check the weaknesses and vulnerabilities of the system.
Part Nine: Basics of Linux Operating System - you will learn about Kali Linux so you can better understand the environment and can use it effectively. You will also learn basic Linux commands used in the installation and updating of the system.
Part One: Introduction to Hacking & Types of Hackers
Chapter One: An Introduction to Hacking
For the past five decades, hacking has become a part of the computing and information technology world. It is a vast field of computing that comprises of numerous topics. The first hacking attack that was recorded took place in 1960 at MIT and that was the time when the term Hacker was discovered.
Hackers are considered as the more intelligent from general IT specialists because exploiting a private computer and network system is more difficult than developing it. The term Hacking refers to gaining access to a users system or network without any permission. Hackers also know the working, development, architecture designs of the systems that help them to break system security easily to get the required information. Hacking also refers to the performance of fraudulent acts like privacy invasion, stealing company data, doing online scams and frauds, etc.
Types of Hacking
We can divide hacking into different types which are explained below:
Website Hacking
Next page