Learn Ethical Hacking: A Help Book of Ethical Hacking
By Satish Jha
()
About this ebook
About the book:
This help book contains mainly non-copyright matter which is solely and exclusively larger public interest . We acknowledge the copyright of the Original Author and are grateful for their historical contribution towards educational awareness. Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. Learn how to become an elite ethical hacker and easily hack networks, computer systems, web apps and so much ... Cybersecurity & Ethical Hacking
About the author:
This help book Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics.
Related to Learn Ethical Hacking
Related ebooks
Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Hacking Rating: 3 out of 5 stars3/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Hacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Online Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5Introduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Ethical Hacking Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Wifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5The Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5
Science Fiction For You
The Alchemist: A Graphic Novel Rating: 4 out of 5 stars4/5Wool: Book One of the Silo Series Rating: 4 out of 5 stars4/5Rendezvous with Rama Rating: 4 out of 5 stars4/5The Silo Series Collection: Wool, Shift, Dust, and Silo Stories Rating: 4 out of 5 stars4/5Kindred: A Graphic Novel Adaptation Rating: 4 out of 5 stars4/5Sarah J. Maas: Series Reading Order - with Summaries & Checklist Rating: 4 out of 5 stars4/5This Is How You Lose the Time War Rating: 4 out of 5 stars4/5Annihilation: A Novel Rating: 4 out of 5 stars4/5The Institute: A Novel Rating: 4 out of 5 stars4/5Shift: Book Two of the Silo Series Rating: 4 out of 5 stars4/5A Psalm for the Wild-Built Rating: 5 out of 5 stars5/5I Who Have Never Known Men Rating: 4 out of 5 stars4/5Dust: Book Three of the Silo Series Rating: 4 out of 5 stars4/5Warrior of the Light: A Manual Rating: 4 out of 5 stars4/5Flowers for Algernon Rating: 4 out of 5 stars4/5Bradbury Stories: 100 of His Most Celebrated Tales Rating: 4 out of 5 stars4/5Brandon Sanderson: Best Reading Order - with Summaries & Checklist Rating: 4 out of 5 stars4/5How High We Go in the Dark: A Novel Rating: 4 out of 5 stars4/5The Paper Menagerie and Other Stories Rating: 4 out of 5 stars4/5The Ocean at the End of the Lane: A Novel Rating: 4 out of 5 stars4/5The Ones Who Walk Away from Omelas: A Story Rating: 4 out of 5 stars4/5Perelandra: (Space Trilogy, Book Two) Rating: 4 out of 5 stars4/5Philip K. Dick's Electric Dreams Rating: 4 out of 5 stars4/5The Troop Rating: 4 out of 5 stars4/5The Frugal Wizard’s Handbook for Surviving Medieval England: Secret Projects, #2 Rating: 4 out of 5 stars4/5Roadside Picnic Rating: 4 out of 5 stars4/5The Stories of Ray Bradbury Rating: 4 out of 5 stars4/5The Deep Rating: 4 out of 5 stars4/5Frankenstein: Original 1818 Uncensored Version Rating: 4 out of 5 stars4/5Cryptonomicon Rating: 4 out of 5 stars4/5
Reviews for Learn Ethical Hacking
0 ratings0 reviews
Book preview
Learn Ethical Hacking - Satish Jha
Learn ethical hacking
A Help book of ethical hacking
BY
SATISH JHA
pencil-logo
ISBN 9789354389009
© SATISH JHA 2020
Published in India 2020 by Pencil
A brand of
One Point Six Technologies Pvt. Ltd.
123, Building J2, Shram Seva Premises,
Wadala Truck Terminal, Wadala (E)
Mumbai 400037, Maharashtra, INDIA
E connect@thepencilapp.com
W www.thepencilapp.com
All rights reserved worldwide
No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of the Publisher. Any person who commits an unauthorized act in relation to this publication can be liable to criminal prosecution and civil claims for damages.
DISCLAIMER: This is a work of fiction. Names, characters, places, events and incidents are the products of the author's imagination. The opinions expressed in this book do not seek to reflect the views of the Publisher.
Author biography
This help book Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics.
Contents
Ethical Hacking-Home
Ethical Hacking-Home
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term Hacker
was originated. In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment.
Audience
This tutorial has been prepared for professionals aspiring to learn the basics of Ethical Hacking and make a career as an ethical hacker.
Prerequisites
Before proceeding with this tutorial, you should have a good grasp over all the fundamental concepts of a computer and how it operates in a networked environment.
Ethical Hacking - Overview
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term Hacker
was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking .
A computer expert who does the act of hacking is called a Hacker
. Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
Types of Hacking
We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples −
WebsiteHacking−Hackingawebsitemeanstakingunauthorizedcontroloverawebserveranditsassociatedsoftwaresuchasdatabasesandotherinterfaces.
NetworkHacking−HackinganetworkmeansgatheringinformationaboutanetworkbyusingtoolslikeTelnet,NSlookup,Ping,Tracert,Netstat,etc.withtheintenttoharmthenetworksystemandhamperitsoperation.
EmailHacking−ItincludesgettingunauthorizedaccessonanEmailaccountandusingitwithouttakingtheconsentofitsowner.
EthicalHacking−Ethicalhackinginvolvesfindingweaknessesinacomputerornetworksystemfortestingpurposeandfinallygettingthemfixed.
PasswordHacking−Thisistheprocessofrecoveringsecretpasswordsfromdatathathasbeenstoredinortransmittedbyacomputersystem.
ComputerHacking−ThisistheprocessofstealingcomputerIDandpasswordbyapplyinghackingmethodsandgettingunauthorizedaccesstoacomputersystem.
Advantages of Hacking
Hacking is quite useful in the following scenarios−
Torecoverlostinformation,especiallyincaseyoulostyourpassword.
Toperformpenetrationtestingtostrengthencomputerandnetworksecurity.
Toperformpenetrationtestingtostrengthencomputerandnetworksecurity.
Tohaveacomputersystemthatpreventsmalicioushackersfromgainingaccess.
Disadvantages of Hacking
Hacking is quite dangerous if it is done with harmful intent. It can cause−
Massivesecuritybreach.
Unauthorizedsystemaccessonprivateinformation.
Privacyviolation.
Hamperingsystemoperation.
Denialofserviceattacks.
Maliciousattackonthesystem.
Purpose of Hacking
There could be various positive and negative intentions behind performing hacking activities. Here is a list of some probable reasons why people indulge in hacking activities−
Justforfun
Show-off
Stealimportantinformation
Damagingthesystem
Hamperingprivacy
Moneyextortion
Systemsecuritytesting
Tobreakpolicycompliance
Ethical Hacking - Hacker Types
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears