Common Windows, Linux and Web Server Systems Hacking Techniques
()
About this ebook
Dr. Hidaia Mahmood Alassouli
I am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from Gaza Strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http://www.anticorruption.000space.comI am an Author publishing books on kdp.amazon.comand many other book stores such as Google, Apple.com, writinglife.kobo.com, Lulu.com, feiyr.com, blurb.com, bookrix.com, barnesandnoble.com, notionpress.com, ingramspark.com and others . My personal website: http://www.hidaia-alassouli.000space.comMy Amazon Author Central: https://www.amazon.com/-/e/B07BH5HS7LEmail: hidaia_alassouli@hotmail.com
Read more from Dr. Hidaia Mahmood Alassouli
Simulation of Some Power Electronics Case Studies in Matlab Simpowersystem Blockset Rating: 2 out of 5 stars2/5Electric Power Transmission: Lecture Notes of Electric Power Transmission Course Rating: 5 out of 5 stars5/5Generation of Electrical Power Rating: 5 out of 5 stars5/5Introduction to Power System Protection Rating: 5 out of 5 stars5/5Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services Rating: 0 out of 5 stars0 ratingsReactive Power Compensation Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsDistribution of Electrical Power: Lecture Notes of Distribution of Electrical Power Course Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsControl of DC Motor Using Different Control Strategies Rating: 0 out of 5 stars0 ratingsEvaluation of Some Virtual Phone Numbers Services Rating: 0 out of 5 stars0 ratingsSignal, Audio and Image Processing Rating: 0 out of 5 stars0 ratingsMethods for Increasing the Quality and Reliability of Power System Using FACTS Devices Rating: 0 out of 5 stars0 ratingsFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsMonitoring of Power System Quality Rating: 0 out of 5 stars0 ratingsMethods to Increase the Internal Storage Space of Android Devices Rating: 0 out of 5 stars0 ratingsEvaluation of Some Online Payment Providers Services: Best Online Banks and Visa/Master Cards Issuers Rating: 0 out of 5 stars0 ratingsCreation and Deployment of Smart Contracts on Ethereum Blockchain Rating: 0 out of 5 stars0 ratingsCreating EPUB E-books Using EPUB Editors and Converters Rating: 0 out of 5 stars0 ratingsCreation of Postfix Mail Server Based on Virtual Users and Domains Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsOverview of Some Voice Over IP Calls and SMS Verifications Services Providers Rating: 0 out of 5 stars0 ratingsEarning Money: through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Rating: 0 out of 5 stars0 ratings
Related to Common Windows, Linux and Web Server Systems Hacking Techniques
Related ebooks
Online Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsPenetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsIntroduction to Web Hacking: Cross-site Scripting Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Overview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsHow to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker (CEH) Rating: 0 out of 5 stars0 ratingsAutomated Security Analysis of Android and iOS Applications with Mobile Security Framework Rating: 1 out of 5 stars1/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Hacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Web Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsHack Computer System For Noobee Rating: 1 out of 5 stars1/5Practical Malware Prevention Rating: 0 out of 5 stars0 ratingsHiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsSecurity and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsSet Up Your Own IPsec VPN, OpenVPN and WireGuard Server: Build Your Own VPN Rating: 5 out of 5 stars5/5Ultimate Hacking Challenge: Hacking the Planet, #3 Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Understanding Network Hacks: Attack and Defense with Python Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratings
System Administration For You
ConfigMgr - An Administrator's Guide to Deploying Applications using PowerShell Rating: 5 out of 5 stars5/5Linux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Learn Cisco Network Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsMastering Microsoft Endpoint Manager Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Improve your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsLearn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux Commands By Example Rating: 5 out of 5 stars5/5Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Mastering Bash Rating: 5 out of 5 stars5/5Operating Systems DeMYSTiFieD Rating: 0 out of 5 stars0 ratingsSummary of Lights Out: by Ted Koppel | Includes Analysis Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Learn SQL Server Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsPowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5
Reviews for Common Windows, Linux and Web Server Systems Hacking Techniques
0 ratings0 reviews
Book preview
Common Windows, Linux and Web Server Systems Hacking Techniques - Dr. Hidaia Mahmood Alassouli
1. Introduction
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be infected
with a computer virus. Computer viruses generally require a host program.
System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.
Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.
This report covers the common techniques and tools used for System, Windows, Linux and Web Server Hacking. The report contains from the following sections:
Part A: Setup Lab:
Part B: Trojens and Backdoors and Viruses
Part C: System Hacking
Part D: Hacking Web Servers
Part E: Windows and Linux Hacking
You can download all hacking tools and materials from the following websites
http://www.haxf4rall.com/2016/02/13/ceh-v9-pdf-certified-ethical-hacker-v9-courseeducatonal-materials-tools/
www.mediafire.com%2Ffolder%2Fad5szsted5end%2FEduors_Professional_Ethical_Hacker&h=gAQGad5Hf
2. Part A: Setup Lab
a) Setup lab
From the virtualization technology with software VMware or virtual box we can do more than one virtual machines, one linux and other windows 2007 or windows Xp
Download vmware and install it
Create folder edurs-vm in non-windows partition. Create a folder for each operating system
Install any windows operating system.
Download backtrack
To install backtrack on usb, download unebootin. We need also to use the tool to support booting from flash memory in vmware.
Download and install kali linux
Download and install metasploit.
Metasploit is big project that contains a lot of modules or programs. These modules or programs can utilize the holes in windows machines or linux machines operating systems. For any hole that occur in the operating systems, we can develop the program that can utilize this hole. We can work on it through command line or graphical interface. The programs that use graphical interface are armitage and Koblet Strike . In linux we can update the metasploite using command msfupdate.
2. Part B: Trojens and Backdoors and Viruses
a) Backdoors
The backdoor is the backdoor that through it we can make access on the machine and we can make bypass to