Ethical hacking Book Review

Preview:

DESCRIPTION

Book review about Ethical Hacking and its pros & cons in Indian parameter ...

Citation preview

UNOFFICIAL GUIDE UNOFFICIAL GUIDE TOTO

© Macmillan India Ltd., 2001

MACMILLAN INDIA LTD.

Published by Rajiv Beri for Macmillan India Ltd.2/10 Ansari Road, Daryaganj, New Delhi– 110002

Printed at Rajkamal Electric PressB-35/9, G.T. Karnal Road Industrial Area, Delhi– 1100033

First Published, 2001Reprinted, 2001(thrice), 2002(thrice), 2003(thrice), 2004,2005

ISBN 0333 936795

ANKITFADIA

Born –1985 (age 27–28)

Residence –India, MumbaiOccupation –

Author, computer securityconsultant, MTV host

In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post-Graduate Diploma in Cyber Security.

 In addition, he started providing his own computer security courses, including the "Ankit Fadia Certified Ethical Hacker" programme in alliance with Reliance World.

Website – www.ankitfadia.in

HackingHacking

Computer hacking is when someone modifies computer hardware or software in a way that alters the

creator's original intention

Ethical HackingEthical HackingAn ethical hacker is a computer and network expert who attacks a security

system on behalf of its owners

Book Contents

Hacking Windows

BIOS setupWindows login passwordChanging windows visualsInternet Explorer usersCookiesURL address barURL history

Getting your Hands Wet: Net Tool I

IP AddressDomain Name System or DNSPortsSockets & PortsPINGTracertNetstat

Getting your Hands Wet: Net Tool II

Port 23FTP PortDifferent FTP CommandsSMTP (Port 25) and POP (Port 110)Receiving mail without an Email client POP3 (Port 110)

MailBombing

Getting Past the Password

PasswordPassword CrackingCracking the Windows Login Password

Windows Screen SaverXORBypassing the Dial Up Server Password

Default Passwords

Batch File

REM commandECHO: The Batch printing toolThe FOR loopPIPING

TCP/IP

Transport LayerTCP protocolsIP protocolsUDP scanning

A Deeper ApproachNumber SystemDecimal Number SystemBinary Number SystemHexadecimal SystemConverting into different formASCIIFirewalls

VIRUS

What is VirusFile or Program VirusPolymorphic VirusesMacro VirusHow to create new virusSimple Encryption Method

Perl

The BasicsOperatorsLoopsWhile Loop & For LoopPush & PopInput OutputDeleting Files

Other Important Topic

ProtectionC ProgrammingJava Scripts ProgramHostile AppletsThe MotiveThe AttackXOOM

Book Review & Information

Need of Ethical Hacking

To decrease cyber attacks For national security Banking account Social networking media Personal information Terrorism attacks

Drawbacks of Ethical Hacking

The ethical hacker using the knowledge they gain to do malicious hacking activities.

The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.

Allowing the company’s financial and banking details to be seen.

Career on Network Security & Career on Network Security & Ethical HackingEthical Hacking

Network Security Systems Manager

Network Security Administrator Systems/Applications Security

Executive Web Security Administrator Certifications in Network

Security

Future of Ethical Hacking

Clearing Misconception about this book

If you are planning to follow this book so that you can hack your girl-friend's account to check whether she is cheating on you then forget it.

For that you better use scripts available on the internet.

This book gives you a clear overview of what hacking is and what you can and cannot do with hacking.

Basically it will guide you how to be secure.

What Others Said About This Book

Scared of Hackers? Indian Teenager offers help.– The New York Times (Reuters)

He is a teenage prodigy all set to revolutionize the world of information technology. – The Hindu

The book throws light on unexplored horizons of the wired world. – Internet.com

Teen’s ‘Ethical Hacking’ book a hit.– ZD Net

Teenage Robin Hood of cyber jungle.– Indian Express

Sixteen and he knows it all.– The Pioneer

Indian teen writes a real web cracker.– The Asian Age

MBA, 1MBA, 1stst Sem, Sem, 2013-2015 Batch2013-2015 Batch

iLEAD, KolkataiLEAD, Kolkata

West Bengal University of West Bengal University of TechnologyTechnology

Recommended