Description
About Book
In today’s time where geographical boundaries are easily covered by Internet and computers with click of a button, there are lies risks within the ecosystem. Hacking somebody’s details could lead to damages and losses. In this book, we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system. It is a humble effort to make students understand with help of Diagram and Images the procedures through which the vulnerabilities are exploited. It is written in simple and lucid language to be understood by one and all.
About Author
Be a Hacker with Ethics
Table of Content
PART-A. BASICS OF HACKING
1: Introduction to Hacking
2: Introduction to Ports & Protocols
3: Virtualization & Introduction to Kali Linux
4: Foot-printing
5: Scanning
PART-B. PERFORMING THE HACK
6: Hacking Into System
7: Trojans & Backdoors
8: Viruses & Worms
9: Sniffing, Packet Analysis & Session Hijacking
10: Social Engg.
11: Cryptography
12: Steganogrpahy
13: Vulnerability Assessment
14: Deep Web & Dark Net
PART-C. ADVANCE HACKING
15: Denial of Service
16: Web Application & Web Server Penetration Testing
17: Wireless Network Exploitations
18: Additional References
Reviews
There are no reviews yet.