How To Become A Hacker
The hacker attack and defense drills
Haibo Wu
The first chapter
Social engineering (SocialEngineering), a through to the victims of psychological weakness, instinct, curiosity, trust, greed psychological traps such as means of hazards, such as cheating, damage in its own interests, in recent years has become a rapidly rising trend and even abuse. In fact, social engineering is not equal to the general fraudulent means, especially complex social engineering, even if they think the most vigilant careful person, as may be damage the interests of good social engineering means. A lot of social engineering attacks are very complicated, including the comprehensive plan, and the integrated use of the considerable skill. But can also be found that some skilled social engineering attacks often can only use simple way to achieve his purpose, ask directly to obtain the required information is often effective.
Social engineering technology will maximize the hacking, not only can use the weakness of the invasion, also can pass for invasion of human weaknesses, when these two technologies integrate security system will be impossible to exist, skilled social engineering division can eventually defeated at almost all of the safety line.
About the book
Book with pictures, captions, mark, rich graphic means such as the guide line, along with simple language,
This book content
Book in simple language, not only introduces the general method and steps of computer hackers, and the use of tools, and protection from hacker attack method is described in detail, can make the reader in understanding the basic knowledge and understanding of network security premise, easily and quickly grasp the basic knowledge, tools and repair skills, from black to meet in invasion of the ulterior motives can no longer all bewildered.
About concrete contents are as follows: a comprehensive understanding of social engineering, omnipotent information search, scanning tools applied in actual combat, hacker invasion of commonly used tools, commercial espionage common tactic, interpretations of the hacker's attack, interprets the phishing attacks, cross-site attack technology, warren mining user privacy, true and false, not prevent cheating attacks, a variety of detection technology, defense technology security threat, etc., makes the readers to hackers representative technology such as social engineering attack and protection have a comprehensive understanding.
In addition, the book social engineering attacks from hackers and protection application, this paper gives a relatively independent content from the Angle of readers on how to build a practical hackers social engineering attack and prevention system is a basic concept and idea, and can provide readers with several typical industry safety protection system construction plan, for your reference.
This book features
Book case driven and task advanced as distinct characteristics, in the book, can see a vivid case scenario. Through individual practice task, readers can easily master all kinds of knowledge, promote quickly in imperceptible in actual combat skills.
Low efficient mode: completely overcome the offensive and defensive operations of learning disabilities.
Reasonable low content: introduction to select the reader the most pressing need to master the knowledge, form a practical, full and complete knowledge system;
Low extrapolate: beginners learning habits in mechanical memory, something by interpretation of a knowledge, let the reader understand and grasp thoroughly thinking of similar occasions.
This book will show readers the little-known social engineering attack inside, distinguished, explaining the specific implementation of social engineering attack and comprehensive details, let the reader know clearly that they attack tactics, case can be provided the recognition of the threat posed by image and provide a complete solution, can make the readers from the information, and make the enterprise know how through training and related protection to prevent social engineering attacks.
Suitable for the crowd
This book will revolve around personal and corporate information threat to complete department, including information tracking, privacy, mining, commercial espionage, phishing attacks, psychological attack, such as the investigation against the forefront of information security, aimed at helping people and the government, the commercial organizations to realize the threat of social engineering attacks, in order to make people and organizations important secrets from being stolen or is in danger of invasion.
The book as a quick manual for the network lover, suitable for readers to learn how to use as follows:
Low at the beginning of the computer, intermediate users;
Low computer enthusiasts, increase;
Low need network protection of personnel in all walks of life;
Low network management;
Low key institutions related to students.
The author:
Needing those who remind everybody is, according to the relevant state laws and regulations, any use of hacking attacks on the behavior of others belong to illegal behavior, hope readers after reading this book, it is best not to use this book introduces the hacking attacks on others, otherwise the consequence is proud, remember remember!
Content abstract
Book 1 to reappear the whole process of the hacker social engineering attack and defense drills, the contents include: a comprehensive understanding of social engineering, omnipotent information search, scanning tools of actual combat, hacker invasion of commonly used tools, commercial espionage common tactic, interpretations of the hacker's attack, interprets the phishing attacks, cross-site attack technology, warren mining user privacy, true not prevent cheating attacks, a variety of detection technology, defense technology security threats such as application technique, and through the integrated application of some cases, explained the hackers to readers with a variety of anti hacking tools of the application of comprehensive technology.
Book content rich comprehensive, simple, for the vast number of network lover, also can be used as a quick handbook, can also be applied to network security professionals and managers.
The first chapter what is social engineering
Social engineering is a kind of attack, the attacker to use of the interactive relationships of attack: usually the attacker if there is no way to invasion by physical way to directly obtain the required information, will be by email or phone to defraud of the required information, using the data for the host permission in order to achieve its purpose.
1.1.1 overview of social engineering attacks
Of deception to cheat in real society are a diverse group, with the progress of network and communication technology, its deception figure also appeared unceasingly, is available. For example, some people for trying to get mobile winning prizes in text messages, bonuses and cheated, some people believe liar call from loved ones had a car accident, sudden illness in hospital after been defraud and etc. These deception in real society, once being attacked by hackers extension application to network system, will become a social engineering attack.
Social engineering is the recent hacker community popular way of an intrusion. Social engineering attack main unconventional means to get the server permissions or site permissions, such as the administrator of all kinds of information collection, like into which sites such as the administrator, administrators like to use what password, on the site of the administrator into web trojans, crack administrator database from site regularly to achieve the administrator password.
Next page