Ethical Hacking for Beginners

Omdömen:
( 0 )
52 pages
Språk:
 English
This book will help you understand how hacking really works. It is for informational and educational purposes only and we strongly advise against misuse.
Det här är en Business-eBok
Business-prenumeration gratis de första 30 dagarna, sedan $5.99/månad
 
Få åtkomst till boken på vår läsplatta. Ingen reklam i boken.
Våra senaste eBöcker
Om författaren

Mujthaba Hasan is a SharePoint consultant and a technology enthusiast. He has worked for some of the best companies around the world like Procter and Gamble (P&G), Exceed IT Services (Microsoft partner of the year, Gulf) & Infotouch (SME 40, Dubai). He is a consultant who specializes in

This book will help you understand how hacking really works. It teaches you techniques to conduct these hacks yourself and ways in which you can safeguard from being hacked. This book is an easy read even if you are not well acquainted with computers. This book is for informational and educational purposes only. This book is against misuse of the information and we strongly suggest against it.

About the author

Mujthaba Hasan is a Digital Solutions Architect and a technology enthusiast. He currently works for an Oil & Gas company operating across 17 countries in Africa.
He has previously worked with reputable companies around the world including Procter and Gamble (P&G), Exceed IT Services (Microsoft partner of the year, Gulf) & Infotouch (SME 40, Dubai). He is a consultant who specializes in developing enterprise solutions using SharePoint.
He has worked on a variety of projects utilizing SharePoint, , PowerApps, Bots, jQuery, C#, Power BI, Azure, ASP.NET, Bootstrap, SQL Server, Web Services, Entity Framework, Angular, NodeJS, jQuery, JavaScript to name a few.
He is a Microsoft Certified Solutions Developer in SharePoint Applications and App Builder. He received his Masters in Computer Application from Sri Jayachamarajendra College of Engineering (2015), the number 1 ranked college for MCA in Mysore, India.
He received his MBA in Project Management through Sikkim Manipal University (2014). He completed his technical degrees with honorary distinction.
Mujthaba can be contacted through email at mujthabahassan@gmail.com.

  • Acknowledgement
  • Disclaimer
  • About the author
  1. Introduction
    1. What is Ethical Hacking?
    2. Types of Hackers
    3. Getting Started
    4. Why should you do penetration test?
    5. Which domains are tested on CEH?
    6. Who is this book intended for?
  2. Phases of hacking
    1. Reconnaissance
    2. Scanning
    3. Enumeration
    4. Gaining Access
    5. Maintaining Access
    6. Clearing Tracks
  3. Password Cracking
    1. Demo
    2. How to stay protected?
  4. Malware
    1. Introduction
    2. Creating a Trojan
    3. How to stay protected?
  5. Viruses & Worms
    1. What is a virus?
    2. What is a worm?
    3. What is their motive?
    4. How to spot an infection?
    5. Let’s create a virus together
    6. Staying Vigilant
  6. Denial of Service Attacks
    1. What are DOS Attacks?
    2. Simple HTTP DoS Attack
    3. How to stay protected?
  7. Sniffing
    1. Why Sniff?
    2. Types of sniffing?
    3. Why would anybody sniff?
    4. How to stay protected?
  8. Buffer Overflow
    1. What is buffer overflow?
    2. Why did the buffer overflow?
    3. How to prevent buffer overflow?
  9. Social Engineering
    1. What is Social Engineering?
    2. Exploitable Human Attributes
    3. Types of Social Engineering Attacks
    4. How to stay protected?
  10. SQL Injection
    1. What is SQL Injection?
    2. How to stay protected?
  11. Web Server
    1. How can web servers be hacked?
    2. Common Web Server Vulnerabilities
    3. How to stay protected?
  12. Web Application
    1. What is a Web Application?
    2. How are Web Applications hacked?
    3. How to stay protected?
  13. Wireless Hacking
    1. Introduction
    2. Types of Hacks
    3. Top Tools of the craft
    4. How to stay protected?
  14. Mobile Platforms
    1. Introduction
    2. Types of hacks
    3. How to stay protected?
  15. Session Hijacking
    1. What is session?
    2. What is session hijacking?
    3. How can session hijacking occur?
    4. How to stay protected?
  16. Cryptography
    1. A brief history of cryptography?
    2. A modern overview of cryptography
    3. Types of cryptography