Автор: Time Room Название: A Hacker in A Hacking World: Penetrating any kinds of security Издательство: Time Room Год: 2016 Язык: English Формат: mobi Размер: 10,4 mb Страниц: 222
Millions of people around the worlds wants to learn hacking, that's a fact. The sad part comes in when there is very few information compiled in one spot. Not to mention step by step.
This book contains everything a beginner or a professional would like to put to practice everyday. Subjects that would be broken down in step by steps are like. Finishing this book you won't stay the same, that author can promise.
Chapter 1: Remote Access – Using Metaploit and planting backdoors
What is remote hacking? Gain full control on computer using Cobalt Strike Using Backtrack/Kali to gain full access to Machinne. Using Backtrack/Kali to Activate VNC on Victim Machine Conclusion
Chapter 2: Website Penetration - Finding vulnerability and hack it
Retrieve Website Database with Sequel Injection First we have to understand how SQL injection works Going on the mission for retrieving database from a vulnerable site Cross Site Scripting Non persistent. The persistent XSS to extract cookie session from users. Or even administrators Social Engeniring Facebook with the phishing Techinique What is phishing Creating Phishing.php file: Some useful Chrome Extension Conclusion
Chapter 3: Denial of Service-Flooding Things
What is Denial of Service (Flooding)? DDos Using notepad and command prompt. Peforming DdoS using LOIC DdoS a IPV6 router using Kali Conclusion
Cracking Wi-fi password using Reaver Hack Wireless password using Cain & Abel By-passing the mac address filter within a wireless-router Even though we know the password we used, is right, this type of network won’t allow us to connect (Because currently our mac address is not registered). It will be like an endless loop without authentication. Conclusion
Chapter 5: Android Weaponize the Android and Infiltrate the Android
Weaponizing ur Android Turn your Android device into a pentesting tool Catching Wifi password in the Android Device. Using Metasploit to hack in the Android Root Folder. Conclusion
Chapter 6: Lan Attack - Compromising networks
Using nmap to hack machines in the network. Raspberry Pi in the office. Conclusion
Chapter 7. Staying Anonymous: Using the right VPN's
Using Cyberhost to disappear for good Using the tor browser Using ZenMate Setting the VPN for Kali to say cloaked Conclusion
Shodan the evil engine
What exactly is shodan? Hacking an IP Camera using Shodan. Conclusion
Build malicious applications with python.
Create Your own keylogger to monitor Victim Typings Building a Portscanner Building a zip Password cracker in Python Take screen shot
Ready made Virus with C++
C++ Environmental Setup Creating ur first C++ Application
Basic understanding of C++ code Declaring Variables in C++ Changing and Comparing Variables If Statement Syntax Loops C++ virus to render pc unbootable C++ virus crazy mouse and beeping. C++ block all inputs
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.