Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Hacking: Guide to Computer Hacking and Penetration Testing

Posted By: AlenMiler
Hacking: Guide to Computer Hacking and Penetration Testing

Hacking: Guide to Computer Hacking and Penetration Testing: Beginner Friendly with Practical Examples so you can Hack right now! by Krishna Rungta
English | 8 Aug 2016 | ASIN: B01K35RXEC | 124 Pages | PDF | 6.52 MB

Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses.

Chapter 1: Introduction
What is hacking?
Common hacking terminologies
What is Cybercrime?
What is ethical hacking?
Chapter 2: Potential Security Threats
What is a threat?
What are Physical Threats?
What are Non-physical Threats?
Chapter 3: Hacking Tools & Skills
What is a programming language?
What languages should I learn?
What are hacking tools?
Commonly Used Hacking Tools
Chapter 4: Social Engineering
What is social engineering?
Common Social Engineering Techniques
Social Engineering Counter Measures
Chapter 5: Cryptography
What is cryptography?
What is cryptanalysis?
What is cryptology?
Encryption Algorithms
Hacking Activity: Hack Now!
Chapter 6: Cracking Password
What is password cracking?
What is password strength?
Password cracking techniques
Password Cracking Tools
Password Cracking Counter Measures
Chapter 7: Trojans, Viruses and Worms
What is a Trojan?
What is a worm?
What is a virus?
Trojans, viruses and worms counter measures
Chapter 8: Network Sniffers
What is IP and MAC Addresses
What is network sniffing?
Passive and Active Sniffing
What is ARP Poisoning?
What is a MAC Flooding?
Sniffing the network using Wireshark
Chapter 9: Hack Wireless Networks
What is a wireless network?
How to access a wireless network?
Wireless Network Authentication
How to Crack Wireless Networks
Cracking Wireless network WEP/WPA keys
Chapter 10: DoS(Denial of Service) Attacks
What is DoS Attack?
Type of DoS Attacks
How DoS attacks work
DoS attack tools
Chapter 11: Hack a Web Server
Web server vulnerabilities
Types of Web Servers
Types of Attacks against Web Servers
Web server attack tools
Chapter 12: Hack a Website
What is a web application? What are Web Threats?
How to protect your Website against hacks ?
Hacking Activity: Hack a Website !
Chapter 13: SQL Injection
What is a SQL Injection?
How SQL Injection Works
Other SQL Injection attack types
Automation Tools for SQL Injection