BY: UJJWAL SAHAY
CO-FOUNDER
[www.thebigcomputing.com]FIND OUT MORE STUFF LIKE THIS ON
TheBigComputing.com
We cover unique Ethical Hacking and Performance improvement guides, Newsand Tutorials. Our aim is to make your digital life easy, pleasant and secure. Ujjwal is a regular author and also chief security administrator at theplace, you can get solution of your queries
LEGAL DISCLAIMER
Any proceedings or activities regarding the material containedwithin this volume are exclusively your liability. The misuse andmistreat oftheinformation/tutorial in this bookcanconsequence in unlawful charges brought against the personsin question. The authors and review analyzers will not be heldresponsible in the event any unlawful charges brought againstany individuals by misusing the information in this book to break the law. This book contains material and resources thatcan be potentially destructive or dangerous. If you do not fullycomprehend something on this book, dont study this book. Please refer to thelaws and actsofyourstate/region/province/zone/territory or country before accessing, using, orin any other way utilizing these resources. These materials and resources are for educational and research purposes only. Donot attempt to violate the law with anything enclosed herewithin. If this is your intention, then leave now. Neither writerof this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility foryour proceedings, actions or trials.
ABOUT THE AUTHOR
UJJWALSAHAY isasovereignComputerSecurityConsultantandhasstate-of-the-artfamiliarity in the field ofcomputer.Also,UJJWALSAHAY is a cyber-securityexpertcertifiedbyLUCIDEUS TECH and hasdefinitiveexperienceinthe field of computers andethical hacking.
Ujjwal Sahay is the AuthorofthebookHACK-X
CRYPT (A straight forward guide towards Ethical hacking andcyber security). Also, Ujjwal Sahay is the Co-founder of thetechno-hacking website www.thebigcomputing.com , he is thechief security consultant of site.
Sahay is however, more well known for his significant work inthefieldofethicalhackingandcybersecurity.SahayiscurrentlypursuinghisstudiesincomputersciencewithspecializationincybersecurityatMITSGWALIOR.
Get In Touch With Him At
ujjwal@thebigcomputing.com
PREFACE
Computer hacking is the practice of altering computer hardware andsoftware to carry out a goal outside of the creators original intention.People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers arecomputer criminals. They fall short to identify the fact that criminalsand hackers are two entirely unrelated things. Hackers in realism aregood and extremely intelligent people, who by using their knowledge in a constructive mode help organizations, companies, government, etc.to secure credentials and secret information on the Internet. Years ago,no one had to worry about Crackers breaking into their computer and installing Trojan viruses, or using your computer to send attacks againstothers. Now that thing have changed, it's best to be aware of how to defend your computer from damaging intrusions and prevent black hathackers. So, in this Book you will uncover the finest ways to defend yourcomputer systems from the hackers This Book is written by keepingone object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognizewhat we are trying to demonstrate. After Reading this book you willcome to recognize that how Hacking is affecting our everyday routinework and can be very hazardous in many fields like bank account hacking etc. Moreover, after carrying out this volume in detail you will be capable of understanding that how a hacker hacks and how you candefend yourself from these threats.
FOR ANY QUERIES AND SUGGESTIONS FEEL FREE TO CONTACT ME: ujjwal@thebigcomputing.com
In The Loving Memory of my DAD
Your hands so warm
Your voice so clear
I still remember your laughterLike yesterday had never goneI miss your words of encouragementWords that kept me hanging onNow you are gone
The tears keep flowingOnly hoping
That one day the pain will fadeDad why did you have to go awayWe love you and miss youI know I will again see you someday
ACKNOWLEDGEMENTS
Book or volume of this temperament is tremendously complex to write, particularly without support of the Almighty GOD. I am highly thankfultoLATEDR.BAKSHI KAMESHWARSRIVASTAVA, MRS. SHASHI BALA SRIVASTAVA, Mr. BAKSHIRAJESH PRASAD SINHA AND MRS. ARADHNA SINHA to truston my capabilities, without their support and motivation itwould not be promising to write this book. I express heartfeltcredit to My Parents LATE PROF. SAMIR KUMAR SAHAY and MRS.SUMAN SAHAY without them I have no existence.I am also thanking MR. BAKSHI RAJEEV PRASAD SINHA, MRS.ANITA SINHA, MR.BAKSHISANJEEV PRASAD SINHA, MRS.PRITYSINHA, MR. RAJESHWAR PRASADand MRS. PUNAM SINHA who helped me at each and every step of mylife by their precious support.
I am more than ever thankful to my colleague Saurabh Tripathi(Creative head@THEBIG COMPUTING)for the review,analysis and suggestions for some good articles for this book and all individuals who facilitated me at various researchstages of this volume.
UJJWAL SAHAY
FOOLISH ASSUMPTIONS
I make a few assumptions about you:
Youre familiar with basic computer-, networkingrelatedconcepts and terms.
You have a basic understanding of what hackers and malicious users do.
You have access to a computer and a network on which to usethese techniques.
You have access to the Internet to obtain the various tools usedin the ethical hacking process.
You havepermission toperform thehackingtechniquesdescribed in this book.
Table of Contents
Lets start
INTRODUCTION
INTRODUCTION TO HACKERS
First of all before digging into intense hacking processes letstake a look on what hacking is, who the hackers are, what aretheir intentions, types of hackers and their communities etc.
Communities of Hackers:
HACKERS
CRACKERS
PHREAKS
SCRIPT KIDDIES
HACKERS are the
Intelligent Computer Experts. INTENSION OF HACKERS:
To gain in-depth knowledge of any computer system, what is happening at the backend of any specific program of the system behind the screen of the computer system?
Their motive is to find possible security risk and vulnerabilities in a computer system or network.
They create security awareness among the people by sharingknowledge and proper security preventions that should be taken by the user.
Types of Hackers:
White Hat Hackers White hats is the name used for security experts. While they often use the same tools and techniques as the black hats, they do so in order to foil the bad guys. That is, theyuse those tools for ethical hacking and computer forensics. Ethical hacking is the process of using security tools to test and improvesecurity (rather than to break it!). Computer forensics is the process ofcollecting evidence needed to identify and convict computer criminals.
Next page