Learn Ethical Hacking - Satish Jha - E-Book

Learn Ethical Hacking E-Book

Satish Jha

0,0
4,57 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

About the book:


This help book contains mainly non-copyright matter which is solely and exclusively larger public interest . We acknowledge the copyright of the Original Author and are grateful for their historical contribution towards educational awareness. Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. Learn how to become an elite ethical hacker and easily hack networks, computer systems, web apps and so much ... Cybersecurity & Ethical Hacking
About the author:


This help book Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Seitenzahl: 85

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Learnethicalhacking

AHelpbookofethicalhacking

BY

SATISHJHA

ISBN

9789354389009

©

SATISH

JHA

2020

Published

in

India

2020

by

Pencil

A

brand

of

One

Point

Six

Technologies

Pvt.

Ltd.

123,

Building

J2,

Shram

Seva

Premises,

Wadala

Truck

Terminal,

Wadala

(E)

Mumbai

400037,

Maharashtra,

INDIA

E

[email protected]

W

www.thepencilapp.com

All

rights

reserved

worldwide

No

part

of

this

publication

may

be

reproduced,

stored

in

or

introduced

into

a

retrieval

system,

or

transmitted,

in

any

form,

or

by

any

means

(electronic,

mechanical,

photocopying,

recording

or

otherwise),

without

the

prior

written

permission

of

the

Publisher.

Any

person

who

commits

an

unauthorized

act

in

relation

to

this

publication

can

be

liable

to

criminal

prosecution

and

civil

claims

for

damages.

DISCLAIMER:Thisisaworkoffiction.Names,characters,places,eventsandincidentsaretheproductsoftheauthor'simagination.TheopinionsexpressedinthisbookdonotseektoreflecttheviewsofthePublisher.

Authorbiography

This

help

book

Ethical

Hacking

-

Overview

-

Hacking

has

been

a

part

of

computing

for

almost

five

decades

and

it

is

a

very

broad

discipline,

which

covers

a

wide

range

of

topics.

Contents

EthicalHacking-Home

EthicalHacking-Home

Hackinghasbeenapartofcomputingforalmostfivedecadesanditisaverybroaddiscipline,whichcoversawiderangeoftopics.Thefirstknowneventofhackinghadtakenplacein1960atMITandatthesametime,theterm"Hacker"wasoriginated.Inthistutorial,wewilltakeyouthroughthevariousconceptsofEthicalHackingandexplainhowyoucanusetheminareal-timeenvironment.

Audience

ThistutorialhasbeenpreparedforprofessionalsaspiringtolearnthebasicsofEthicalHackingandmakeacareerasanethicalhacker.

Prerequisites

Beforeproceedingwiththistutorial,youshouldhaveagoodgraspoverallthefundamentalconceptsofacomputerandhowitoperatesinanetworkedenvironment.EthicalHacking-Overview

Hackinghasbeenapartofcomputingforalmostfivedecadesanditisaverybroaddiscipline,whichcoversawiderangeoftopics.Thefirstknowneventofhackinghadtakenplacein1960atMITandatthesametime,theterm"Hacker"wasoriginated.

Hackingistheactoffindingthepossibleentrypointsthatexistinacomputersystemoracomputernetworkandfinallyenteringintothem.Hackingisusuallydonetogainunauthorizedaccesstoacomputersystemoracomputernetwork,eithertoharmthesystemsortostealsensitiveinformationavailableonthecomputer.

Hackingisusuallylegalaslongasitisbeingdonetofindweaknessesinacomputerornetworksystemfortestingpurpose.ThissortofhackingiswhatwecallEthicalHacking. A computerexpertwhodoestheactofhackingiscalleda"Hacker".Hackersarethosewhoseekknowledge,tounderstandhowsystemsoperate,howtheyaredesigned,andthenattempttoplaywiththesesystems.TypesofHacking We cansegregatehackingintodifferentcategories,basedonwhatisbeinghacked.Hereisasetofexamples−

WebsiteHacking−Hackingawebsitemeanstakingunauthorizedcontroloverawebserveranditsassociatedsoftwaresuchasdatabasesandotherinterfaces.NetworkHacking−HackinganetworkmeansgatheringinformationaboutanetworkbyusingtoolslikeTelnet,NSlookup,Ping,Tracert,Netstat,etc.withtheintenttoharmthenetworksystemandhamperitsoperation.EmailHacking−ItincludesgettingunauthorizedaccessonanEmailaccountandusingitwithouttakingtheconsentofitsowner.EthicalHacking−Ethicalhackinginvolvesfindingweaknessesinacomputerornetworksystemfortestingpurposeandfinallygettingthemfixed.PasswordHacking−Thisistheprocessofrecoveringsecretpasswordsfromdatathathasbeenstoredinortransmittedbyacomputersystem.ComputerHacking−ThisistheprocessofstealingcomputerIDandpasswordbyapplyinghackingmethodsandgettingunauthorizedaccesstoacomputersystem.

AdvantagesofHacking

Hacking isquiteusefulinthefollowingscenarios− Torecoverlostinformation,especiallyincaseyoulostyourpassword.Toperformpenetrationtestingtostrengthencomputerandnetworksecurity.Toperformpenetrationtestingtostrengthencomputerandnetworksecurity.Tohaveacomputersystemthatpreventsmalicioushackersfromgainingaccess.

DisadvantagesofHacking

Hacking isquitedangerousifitisdonewithharmfulintent.Itcancause− Massivesecuritybreach.Unauthorizedsystemaccessonprivateinformation.Privacyviolation.Hamperingsystemoperation.Denialofserviceattacks.Maliciousattackonthesystem.

PurposeofHacking

There couldbevariouspositiveandnegativeintentionsbehindperforminghackingactivities.Hereisalistofsomeprobablereasonswhypeopleindulgeinhackingactivities− JustforfunShow-offStealimportantinformationDamagingthesystemHamperingprivacyMoneyextortionSystemsecuritytesting

Tobreakpolicycompliance

EthicalHacking-HackerTypes

Hackers canbeclassifiedintodifferentcategoriessuchaswhitehat,blackhat,andgreyhat,basedontheirintentofhackingasystem.ThesedifferenttermscomefromoldSpaghettiWesterns,wherethebadguywearsablackcowboyhatandthegoodguywearsawhitehat.

WhiteHatHackers

WhiteHathackersarealsoknownasEthicalHackers.Theyneverintenttoharmasystem,rathertheytrytofindoutweaknessesinacomputeroranetworksystemasapartofpenetrationtestingandvulnerabilityassessments.

EthicalhackingisnotillegalanditisoneofthedemandingjobsavailableintheITindustry.Therearenumerouscompaniesthathireethicalhackersforpenetrationtestingandvulnerabilityassessments.

BlackHatHackers

BlackHathackers,alsoknownascrackers,arethosewhohackinordertogainunauthorizedaccesstoasystemandharmitsoperationsorstealsensitiveinformation.

BlackHathackingisalwaysillegalbecauseofitsbadintentwhichincludesstealingcorporatedata,violatingprivacy,damagingthesystem,blockingnetworkcommunication,etc.

GreyHatHackers

Greyhathackersareablendofbothblackhatandwhitehathackers.Theyactwithoutmaliciousintentbutfortheirfun,theyexploitasecurityweaknessinacomputersystemornetworkwithouttheowner’spermissionorknowledge.

Theirintentistobringtheweaknesstotheattentionoftheownersandgettingappreciationoralittlebountyfromtheowners.

MiscellaneousHackers

Apartfromtheabovewell-knownclassesofhackers,wehavethefollowingcategoriesofhackersbasedonwhattheyhackandhowtheydoit−

RedHatHackers

Redhathackersareagainablendofbothblackhatandwhitehathackers.Theyareusuallyonthelevelofhackinggovernmentagencies,top-secretinformationhubs,andgenerallyanythingthatfallsunderthecategoryofsensitiveinformation.

BlueHatHackers

Abluehathackerissomeoneoutsidecomputersecurityconsultingfirmswhoisusedtobug-testasystempriortoitslaunch.Theylookforloopholesthatcanbeexploitedandtrytoclosethesegaps.MicrosoftalsousesthetermBlueHattorepresentaseriesofsecuritybriefingevents.

EliteHackers

Thisisasocialstatusamonghackers,whichisusedtodescribethemostskilled.Newlydiscoveredexploitswillcirculateamongthesehackers.

ScriptKiddie

Ascriptkiddieisanon-expertwhobreaksintocomputersystemsbyusingpre-packagedautomatedtoolswrittenbyothers,usuallywithlittleunderstandingoftheunderlyingconcept,hencethetermKiddie.

Neophyte

Aneophyte,"n00b",or"newbie"or"GreenHatHacker"issomeonewhoisnewtohackingorphreakingandhasalmostnoknowledgeorexperienceoftheworkingsoftechnologyandhacking.

Hacktivist

Ahacktivistisahackerwhoutilizestechnologytoannounceasocial,ideological,religious,orpoliticalmessage.Ingeneral,mosthacktivisminvolveswebsitedefacementordenialof-serviceattacks.EthicalHacking-FamousHackers

Inthischapter,wewillhaveabriefsynopsisofsomeofthefamousHackersandhowtheybecamefamous.

JonathanJames

JonathanJameswasanAmericanhacker,illfamousasthefirstjuvenilesenttoprisonforcybercrimeinUnitedStates.Hecommittedsuicidein2008ofaself-inflictedgunshotwound.

In1999,attheageof16,hegainedaccesstoseveralcomputersbybreakingthepasswordofaserverthatbelongedtoNASAandstolethesourcecodeoftheInternationalSpaceStationamongothersensitiveinformation.

IanMurphy

IanMurphy,alsoknownasCaptainZap,atonepointoftimewashavinghighschoolstudentsstealcomputerequipmentforhim.Ianselfproclaimstohavebeen"thefirsthackereverconvictedofacrime".

Ian'scareerasamasterhackerwasfabricatedin1986afterheandhisunemployedwifedecidedtoformsometypeofbusiness.

HehasalonghistoryofcomputerandInternetfrauds.OneofhisfavouritegamesistoforgeEmailheadersandtosendoutthird-partythreatletters.

KevinMitnick

KevinMitnickisacomputersecurityconsultantandauthor,whoinfiltrateshisclients’companiestoexposetheirsecuritystrengths,weaknesses,andpotentialloopholes.

HeisthefirsthackertohavehisfaceimmortalizedonanFBI"MostWanted"poster.HewasformerlythemostwantedcomputercriminalinthehistoryofUnitedStates.

Fromthe1970supuntilhislastarrestin1995,heskilfullybypassedcorporatesecuritysafeguards,andfoundhiswayintosomeofthemostwell-guardedsystemssuchasSunMicrosystems,DigitalEquipmentCorporation,Motorola,Netcom,andNokia.

MarkAbene

MarkAbene,knownaroundtheworldbyhispseudonymPhiberOptik,isaninformationsecurityexpertandentrepreneur.Hewasahigh-profilehackerinthe1980sandearly1990s.Hewasoneofthefirsthackerstoopenlydebateanddefendthepositivemeritsofethicalhackingasabeneficialtooltoindustry.

Hisexpertisespreadsacrosspenetrationstudies,on-sitesecurityassessments,securecodereviews,securitypolicyreviewandgeneration,systemsandnetworkarchitecture,systemsadministrationandnetworkmanagement,amongmanyothers.HisclienteleincludesAmericanExpress,UBS,FirstUSA,Ernst&Young,KPMGandothers.

JohanHelsinguis

JohanHelsingius,betterknownasJulf,cameintothelimelightinthe1980swhenhestartedoperatingtheworld'smostpopularanonymousremailer,calledpenet.fi.

JohanwasalsoresponsibleforproductdevelopmentforthefirstPan-Europeaninternetserviceprovider,EunetInternational.

Heisatpresent,amemberoftheboardofTechnologiaIncognita,ahackerspaceassociationinAmsterdam,andsupportsthecommunicationcompaniesworldwidewithhiscyberknowledge.

LinusTorvalds

LinusTorvaldsisknownasoneof