• Complain

Abhishek Sagar - What Hacker Knows

Here you can read online Abhishek Sagar - What Hacker Knows full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Abhishek Sagar What Hacker Knows

What Hacker Knows: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "What Hacker Knows" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A Small but powerful guide, Containing some secrets of todays well knows hackers, programmers. No Big Text, Only Pure Legal Knowledge from the cyber world. It will change your perceptions about the internet and computers forever. (Videos and Support for First 100 Buyers)

Abhishek Sagar: author's other books


Who wrote What Hacker Knows? Find out the surname, the name of the author of the book and a list of all author's works by series.

What Hacker Knows — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "What Hacker Knows" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

INTRODUCTION


This book is just a starting of a full series, In which we will go through the depth of internet security and techniques used by top professionals in this field. We will explain everything as simple as we can.
Coming to this book, we have explained some beginning ideas of internet security tricks. How some very common hacks. Easy to understand.
We have included some Bonus Video tutorials with this small E-Book for our first 100 Buyers.
Thanks !

Abhishek Sagar


index

  1. Phishing How Hackers Steal your information
  2. Anonymity
  3. SQL Injection How a Hacker, Hacks a website
  4. Hex Editing Modding, Manipulations of Hexadecimal Data
  5. Key logger

PhishinG
the art of stealing

According to Wikipedia
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as trustworthy entity in an electronic communication.

So how do a hacker steal such information from you?

Okay lets get started.

First a hacker creates a fake login page, which looks like an original page and somehow, convince you to enter your usernames and passwords to it.

By sending fake offers, promises or any other eye catching things.
This can be done by the means of SMS, MMS, On Social Networking Sites.

This is how a fake E-mail Looks Like
A Hacker can send you a email with any email id We will discuss it later - photo 1

A Hacker can send you a email with any email id (We will discuss it later)

And when you click this update button above, you will be redirected to the fake Facebook page which is created to steal your information.

This page is designed in such a manner that after stealing your information you will be redirected to the original Facebook page. Smart, right

Lets see how a fake login page looks like:

Everything is normal in this image Right Now look at the rounded area - photo 2

Everything is normal in this image. Right ?

Now look at the rounded area The Address Bar Its httpsfaceebookcom an - photo 3

Now look at the rounded area The Address Bar. Its https://faceebook.com an extra e which is an ideal way of trapping users. Making a similar looking address.

This is how a basic phishing hack works. It works for all websites and even for bank accounts, when the user is not aware of this kind of hack.

So, Always look for an address bar for your safety.

Phishing is illegal, and by this method many criminal minded peoples are stealing information from common peoples who does not have a proper knowledge of cyber tricks and hacking.

ANONYMITY
Anonymity is the state when nobody knows who you are on the Internet This - photo 4

Anonymity is the state when nobody knows who you are on the Internet.

This State is used by Hackers Worldwide to perform their activities so that no one can trace them.

Internet Protocol (IP)

Internet protocol is an unique numeric identification number of every individual internet user which can be used to track your name, geographical location and your online activities.

An IP Looks like this
225.2.665.233

This is your address and to this address the data is being sent by your internet provider as data packets and this is how your internet works.

Hackers hide their identification on the internet to perform hacking activities so that no one can trace them.

How Hackers Hide their IP?

There are so many of ways to hide an IP, lets discuss about them.

VPN (Virtual Private Network)

VPN is a network that is constructed by using public wires, usually the internet.
To connect to a private network, such as a companys internal network. There are a number of systems that enables you to create networks using the internet as the medium for transporting data.

How VPN Works?

VPN Works as a medium between you and the internet the data is first received - photo 5

VPN Works as a medium between you and the internet, the data is first received by the VPN server than it will come to your computer.

Proxy Servers

A proxy or proxy servers is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy servers which then processes your request and returns what you were wanting.

This way you IP is not shown to the tracker.


TOR BROWSER (The Onion Reuter)
Tor browser is the best software for anonymous browsing till date.
Even FBI cant trace it easily. This works on layer IP basis. A circuit of different internet protocol is created (minimum 8 ) which acts as layers. (just like layers of an onion)
The data is first received by first IP than transferred to second than third and so on. Then finally you get the data on your browser. This is the first tool every hacker should have and surprisingly this is a free software. Very less people know about this browser.

sql injection
website hacking

According to Wikipedia

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

A Basic HTML Website does not contain a SQL database which is based on - photo 6

A Basic HTML Website does not contain a SQL database which is based on structured query language. So This type of hack works only for SQL based websites.
What is a Database? Why it is Important for a website.

Database is a collection of data which is called by an application when required.

For explaining this lets take help from an example.

An attendance register of a class room contains daily attendance records for each student, you can say this is a database of class attendance. Whenever there is a requirement of counting attendance of any student, the register is taken for analysis, same thing happens in a website. Whenever a new user got registered on a website, his all information kept stored in database of the website for future.

How a Hacker Hacks a Website?

Data is Stored in a Database with SQL (Structured Query Language) Even the Administration data. So if somehow hacker gained access to the database, he can get the stored administration password (Owners Password to gain access to Websites Admin panel. Where you can add contents or even completely delete the website)

But this is not Enough, Many Criminal Hackers Gain access to the database of Online Shopping Websites to get Stored Credit Cards and other Confidential information and they Make Money With it.

At first Hacker Scan the whole website for Vulnerabilities in database.

After finding a loophole, he injects malicious codes in the database.

Than Finally the database is accessed and dumped (Downloaded to his computer with all the information)

SQLI Dumper

SQLI Dumper is a secret program developed to find out weak security websites - photo 7

SQLI Dumper is a secret program developed to find out weak security websites from the internet and this program is powerful enough to dump databases quickly.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «What Hacker Knows»

Look at similar books to What Hacker Knows. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «What Hacker Knows»

Discussion, reviews of the book What Hacker Knows and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.