Page list
You Can Hack
You Can Hack
Pankaj Patidar
Author
All rights reserved. No part of this work may he reproduced, stored, adapted, or transmitted in any form or by any means, electronic, mechanical, photocopying, micro-filming recording or otherwise, or translated in any language, without the prior written permission of the copyright owner and the publisher. The book is sold subject to the condition that it shall not, hy way of trade or otherwise, be lent, resold, hired out, or otherwise circulated without the prior publishers written consent in any form of binding or cover other than that in which it is published.
The views and opinions expressed in this book are author(s) own and the facts reported by them have been verified to the extent possible, and the publishers are not in any way liable for the same.
ISBN: 978-93-8022-27-69
Published by
Gennext Publication
23, Main Ansati Road, Daryaganj,
New Delhi-110002
Phone : 23282060,23261060 Fax : (Oil) 23285914
Laser Typesetting: Lucky Graphic, Delhi
Printed at: Chowla Offset Printer, Delhi
Cataloguing in Publication DataDK
Courtesy: D.K. Agencies (P) Ltd. <>
Patidar, Pankaj, author.
You can hack / Pankaj Patidar.
pages cm
ISBN9789380222769
1. Hacking. I. Title.
DDC 005.8 23
You Can Hack is Completely dedicated to
my sister Muskan & my lovely friend Abhi .
Special Thanks
I would like to thank my friend Maddox (Gray Hat Hacker), Kartik Chelawat, Tanveer (RedhatHacker), Pawan Soni, Mr. Manish Sir And Kapil Sir For Standing Beside me throughout my career and writing this book. I Also Thank My Lovely Sister: Varsha AndAyushi for always making me smile and for understanding when i was writing this book instead of surfing internet, i hope that one day they can read this book and understand why i spent so much time in front of my computer, i would like to thank my parents and uncle for allowing me to follow my ambitions throughout my childhood.
Contents
I have received number of e-mails messages and comments from many people who wanted to start their career in hacking but they are not able to find a way that from where to start. By You Can Hack I Have tried to share my knowledge and by discussing various hacking techniques. In today world numbers of books are available on hacking topics but most of them are contain old techniques or tools. Even those books are based on theory concept but I have included something different in this book. I have explain hacks shortly by which anyone can understand what its mean and all the hacks are practically tested after that I wrote book with snapshots. I share my knowledge to you so you can explore hidden world of hacking and can be expert in hacking. This book has covered most of all the major hacks which are used in todays world by hackers. While you are performing this hacking techniques dont try to harms or damage because in India there is also a cyber laws which can push you in trouble or you have to pay fines for that. By this book you can be black hat hacker or white hat hacker no certificate you need to prove you are hacker. I have wrote this book very user friendly. There is no necessary for you to have special knowledge in computer for understanding this book. This book can be useful for students, web developers, teachers, researchers, business people, system administrator and IT professional. Now I am going to put a full stop in my preface and I hope you will enjoy You Can Hack as same as I enjoyed its while I was writing.
Pankaj Patidar
Introduction
Throughout this introduction you are able to get entire information of hacking. Now a days teenagers are having much interest in hacking. Also people started to teach hacking and there are mainly three types of hackers White hat, Gray hat and Black hat. By reading his introduction you will be able to know wide difference about ethical hacking or white hat, black hat and gray hat.
History of Hacking
In today generation security increasing day by day people are aware of it. if hacking is used in negatively then it can be more dangerous even than any harmful weapon.
In 1960, First Computer was used in some illegal ways. 1960 Massachusetts Institute got first individual using computer in different way and from that day universe gives it new name to that person as Hacker. After this slowly and gradually increases uses of computer in different manner.
In 1970 another person came in front of everyone, who invented device that hack telephonic system. By that device any one can free calls from any telephone from that day person was given name phreakers. John Draper was the first phreaker in the world. He was also identified as captain crunch. He invented device name blue boxtone generator with the help of whch free calls could be done from any place of the world. Phreaking was introduced to the masses when esquire magazine published a story called Secrets of the Little Blue Box. By this manner number of phreakers are increasing in whole world.
After 1980 phreaker started attracting towards the internet. They started to make their own bulletin board on internet. In Bulletin Board is such a website in which any internet user can share their knowledge to join bulletin board website. From that internet users increasing and these type of bulletin board user increasing.new methods and research exchanged worldwide.
In 1986 community of hacker is increasing in world and they started to work illegally like theft, credit card,website hacking and many more. Due to this reason US government makes cyber crime rules and slowly cyber crime rules were invented in other countries.
Types of Hacking
There are many types of hacking attacks like ddos, logic bomb etc. hacking does not mean only unauthorized accesss but by many hacking attack to arise problem in current system. Others hacking attacks like spoofing, link malipulation. every attack of hacking can be divided in two types
Inside attack - inside attack try to breaks such a network where he/she can at some per cent. In inside attack hacker has physically personality from the system. He/she can access any hardware of victim computer.
Outside attack - hackers try to break such a system where he/she does not exist physically such a system which is far from his/her place a network where he/she is not given permission to enter.
Types of Hacker
1. White Hat Hacker
2. Black Hat Hacker
3. Gray Hat Hacker
1. White Hat Hacker
A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cybersecurity or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world. In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls. When computers appeared, these people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone, who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person, who exploits the weaknesses of the systems of a financial institution for making some money. On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.