Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness
Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness
Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness
Ebook101 pages50 minutes

Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness

Rating: 4.5 out of 5 stars

4.5/5

()

Read preview

About this ebook

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.


This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.


It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!


I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.


=========================


Contents Overview:


Introduction


Classification of Hackers


Why do they hack?


Phases of Hacking


Methods of Hacking and Preventive Actions


Digital Foot-printing


Social Engineering


Password Cracking


Passive Attacks


Keyloggers


Denial of Service (Dos Attack)


SQL Injection


XSS (Cross site Scripting)


Cross Site Request Forgery, CSRF


Spoofing


Stenography


Man In The Middle, MITM


Malwares


Bonus: Google Hacking Tools that assist Hackers


Prevention from Hackers


Laws and Liabilities in India


Case Study


Aadhaar data breach – January


Facebook data breach – March


Facebook data breach – Sep


Yahoo! Data breaches – August


LinkedIn breach – May

LanguageEnglish
PublisherKamal Nayan
Release dateOct 1, 2018
Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness

Related to Hacking into Hackers’ Head

Related ebooks

Security For You

View More

Related articles

Reviews for Hacking into Hackers’ Head

Rating: 4.666666666666667 out of 5 stars
4.5/5

3 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Hacking into Hackers’ Head - Kamal Nayan

    Hacking

    into

    Hackers’ Head

    Hack the hackers before hackers hack you

    Kamal Nayan

    Hacking into Hackers’ Head. Copyright © 2018 by Kamal Nayan.

    All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without written permission, except in the case of brief quotations embodied in critical articles or reviews. 

    First Edition

    Preface

    It's quite important to know about hacking because, under controlled circumstances and with proper authority, these skills can be used to determine system vulnerabilities, which can be further used to counter the attacks done on the system. A hacking proverb says, 'Hack the hackers, before hackers hack you'.

    What we cover here?

    In this book, we will cover some basic approach, tools and techniques used by penetration testers and hackers to discover system vulnerabilities including social engineering, spoofing, foot-printing etc. This is needed because, if we know their intention, I can't say that you can truly be safe, but yes, you can prevent yourself to a much higher extent, risk of getting hacked gets reduced. Moreover, we will see some examples of the hacking acts done during last few years, with its severity. We will also discuss the laws and liabilities that are used in India for the hackers.

    What we won’t cover?

    I have written this book for all kind of readers, whether he is technical or not. So, we won’t cover any of the method in details to hack anything. However, I’ll give basic idea that how these things are performed, and most importantly how can you prevent yourselves.

    This book is for basic awareness and safety tips for the hacking. I’ll soon come up with a new book for discussing all the methods with live demo in details.

    Bonus content

    We have added a separate chapter for most common Google dorks, commonly known as Google Hacking, using this you can search like a pro.

    This document is only for educational purpose and creating awareness. Requesting you to not to misuse, as this may lead to cybercrime, a punishable offence under law, and author is not responsible for any such mis-happenings.

    Table of Contents

    Preface

    What we cover here?

    What we won’t cover?

    Bonus content

    Introduction

    The term "Hacker"

    Classification of Hackers

    Coders, the real heroes

    Admins

    Script Kiddies, the copy paste man

    White Hat Hackers, the word Ethical suits me

    Black Hat Hackers, aka Crackers

    Grey Hat Hackers

    Hacktivists

    Why do they hack?

    Phases of Hacking

    Information Gathering

    Tools used

    Scanning

    Gaining Access

    Maintaining access

    Performing required task

    Clearing the footprints

    Methods

    Enjoying the preview?
    Page 1 of 1