Hacking Into ThinkingMachine
System is LIVE.....and it's LISTENING.....
Yash Sawarkar
www.rdhc.com [Learners, Innovators, Researchers]
Hacking Into Thinking Machine- Yash Sawarkar2015
Credits
Author
yash sawarkar
Cover work
kunal kawale
[kunalkk36@gmail.com]
Disclaimer
The contents and information provided with this book is to be used for educational purpose only. All of the information provided in this book is meant to help the reader to develop a defence attitude in order to prevent the attack. The author of the book takes no responsibility for action resulting from the inappropriate usage of learning material content with this book.
About the Author
Yash sawarkar is 21 old an international recognized ethical hacker, author, engineer, researcher and founder at RDHC. He has unique experience in the field of cyber security & electronic he is still continued to be instrumenterm detecting cyber vulnerabilities. He provides precise consultation to various originations and to the general public in the field of research and internet security. Presently he is pursuing Master of Science in modern telecommunication from European continent.
I would like to thank my mom, dad, sister and friends for encouraging and believing in me as well as thank to my special someone for motivating and always supportive to me.
-Yash Sawarkar
Table of Contents
Chapter 1: Introduction to System HackingWhat is system hacking
Biggest system hacks
Vulnerability in system
How system hacking is performed
Chapter 2: Tricks on System HackingHow to view system reboot date and timeView USB history in windows systemHow to view public and private live camera using GoogleHow to make undeletable and unreadable foldersHow to get software serial key number using GoogleSee password behind stars in any websiteHow to hack password stored in your system
Chapter 3: Password Cracking & AttacksPassword guessing attackMan-in the-middle attack to sniff passwords and dataHow to hack facebook, Gmail, yahoo, bank accounts, and passwords using social engineeringDefault passwords attackCracking windows login passwordBypass windows login passwordCreating rainbow tables using winrtgen to crack passwordHow to crack zip passwordsHow to crack Gmail passwordsHow to defend against password crackings and attacks
Chapter 4: SteganographyWhat is steganography?How to hide data behind imagesHow to hide data behind images using toolsHow to detect steganography in image fileHow to send secret message in emailsHow to hide a documentHow to hide a folder in windowsHow to convert images into ASCII codes
Chapter 5: Advance System HackingHow to hack windows xp total access to systemHow to hack windows 7 total access to systemHow to hack website using sqlmap
Chapter 6: SpywareWhat is spyware?Email spywareUSB spywareDesktop spywareHow to defend against spyware
What this book covers
Chapter 1, introduction to system hacking, introduce readers thefundamental concept involved in system hacking it covers the utility where readers can find helpful to know basic concept behind system hacking.
Chapter 2, tricks on system hacking this chapter focuses on the tricks and tips on system that will show you kinds of functions that how system has small loop holes and security flaws that we can bypass them and perform small system hacks this chapter will clear the system hacking fundamentaland how it will performed.
Chapter 3, password cracking and attacks, focuses on passwords cracking tricks. The reader can perform on live machine where reader can get real time experience to exploit the vulnerability of system this chapter introduce numerous tools on password cracking.
Chapter 4, stegnography, focuses on demonstrating and discussing the fundamental of stegnography this chapter introduce you with several tools on stegnography and how it is performed.
Chapter 5, advance system hacking, this chapter focuses on the exploitation of windows xp, 7 system in this chapter the readers will introduced with several different tools and operating system named as kali linux which is used by penetration tester to test the system loop holes and how to test the loop holes of the system you will get to know in this chapter.
Chapter 6, in this chapter the reader will get to know the basics of spyware that how they affect the system and spoil the system as well as how to defend against them.
What you need for this book
You will need several tools for password cracking, steagnography and kali linux operating system the link of required resources and tools will be provided on every required phases or where it is necessary.
Who the book is for
System hacking is a book for beginners or for anyone how is interested in learning and perform penetration test on the system also this book is for advance penetration tester.
Conventions
Italic
URLs, email address, files extension. Times New Roman, bold
Commands Calibri
Normal text story writtenQuestions
You can contact us at
yash.sawarkar@gmail.com if having a problem with any aspect of book, and we will do our best to address it.
2015
1
Introduction to System Hacking
What is System Hacking
System hacking is the gaining of access to the computers and viewing or creating data. It basically refers to breaking into computers system.
The first part of a system hacking consists of shutting down transportation, street signals, aircraft, highways, trains.
1. First part of the attack is to throw the public into chaos, making roadsinaccessible, possibly for preventing emergency services to assist.
2. The second part of the attack would consist of shutting down the financial system of a country, such as the stock market, government agencies, and local law enforcement.
3. The last part of a system hacking involves the termination of all utilities and telecommunications in the whole country including phones, sat-comps, electricity, water, nuclear, solar, and anything else that requires a power source (except batteries, as it would be difficult if not impossible to shut down all batteries). The final result of all three steps completed would leave the country or community in total chaos, making it extremelyvulnerable.
System hacking is introduced in 1870s by some teenagers in early 1960s the lab was established by MIT known as artificial intelligent lab also called as zero ground. Later on in 1970s the hacker name john draper was very famous for making a long distance call for free by blowing a tone into a telephone that time john draper find on loop hole in the system and exploit.
In late 1980s several different hacking frauds and scams where seen at that time computer emergency response team is formed by US defence agencies. Its mission is to investigate the growing volume of attacks on computer network.
Late 1990s hackers break into and deface federal website including the US department of justice, US air force, NASA. As per the report around 250,000 attacks by hacker up till 1995 where reported popular internet search engine yahoo also hilted by hackers by using logic bomb virus. There is also group called L0pht, in testimony before congress, warns it could shut down nationwide accessto the internet in less than 30 minutes
Next page