Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness
By Kamal Nayan
4.5/5
()
About this ebook
According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.
It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!
I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.
=========================
Contents Overview:
Introduction
Classification of Hackers
Why do they hack?
Phases of Hacking
Methods of Hacking and Preventive Actions
Digital Foot-printing
Social Engineering
Password Cracking
Passive Attacks
Keyloggers
Denial of Service (Dos Attack)
SQL Injection
XSS (Cross site Scripting)
Cross Site Request Forgery, CSRF
Spoofing
Stenography
Man In The Middle, MITM
Malwares
Bonus: Google Hacking Tools that assist Hackers
Prevention from Hackers
Laws and Liabilities in India
Case Study
Aadhaar data breach – January
Facebook data breach – March
Facebook data breach – Sep
Yahoo! Data breaches – August
LinkedIn breach – May
Related to Hacking into Hackers’ Head
Related ebooks
How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Learn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHacking Rating: 3 out of 5 stars3/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Wifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5Hacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratings7 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Introduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Hacking the Planet, #2 Rating: 5 out of 5 stars5/5
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsComptia Network+ In 21 Days N10-006 Study Guide: Comptia 21 Day 900 Series, #3 Rating: 0 out of 5 stars0 ratings
Reviews for Hacking into Hackers’ Head
3 ratings0 reviews
Book preview
Hacking into Hackers’ Head - Kamal Nayan
Hacking
into
Hackers’ Head
Hack the hackers before hackers hack you
Kamal Nayan
Hacking into Hackers’ Head. Copyright © 2018 by Kamal Nayan.
All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without written permission, except in the case of brief quotations embodied in critical articles or reviews.
First Edition
Preface
It's quite important to know about hacking because, under controlled circumstances and with proper authority, these skills can be used to determine system vulnerabilities, which can be further used to counter the attacks done on the system. A hacking proverb says, 'Hack the hackers, before hackers hack you'.
What we cover here?
In this book, we will cover some basic approach, tools and techniques used by penetration testers and hackers to discover system vulnerabilities including social engineering, spoofing, foot-printing etc. This is needed because, if we know their intention, I can't say that you can truly be safe, but yes, you can prevent yourself to a much higher extent, risk of getting hacked gets reduced. Moreover, we will see some examples of the hacking acts done during last few years, with its severity. We will also discuss the laws and liabilities that are used in India for the hackers.
What we won’t cover?
I have written this book for all kind of readers, whether he is technical or not. So, we won’t cover any of the method in details to hack anything. However, I’ll give basic idea that how these things are performed, and most importantly how can you prevent yourselves.
This book is for basic awareness and safety tips for the hacking. I’ll soon come up with a new book for discussing all the methods with live demo in details.
Bonus content
We have added a separate chapter for most common Google dorks, commonly known as Google Hacking, using this you can search like a pro.
This document is only for educational purpose and creating awareness. Requesting you to not to misuse, as this may lead to cybercrime, a punishable offence under law, and author is not responsible for any such mis-happenings.
Table of Contents
Preface
What we cover here?
What we won’t cover?
Bonus content
Introduction
The term "Hacker"
Classification of Hackers
Coders, the real heroes
Admins
Script Kiddies, the copy paste man
White Hat Hackers, the word Ethical
suits me
Black Hat Hackers, aka Crackers
Grey Hat Hackers
Hacktivists
Why do they hack?
Phases of Hacking
Information Gathering
Tools used
Scanning
Gaining Access
Maintaining access
Performing required task
Clearing the footprints
Methods