29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

Brute Force Attack ……………………………………………………………………………………………………………………………………….… 38<br />

Rainbow table attack …………………………………………………………………………………………………………….…………………….…. 39<br />

Counter Measures for Windows Attack ………………………………………………………………………………….………………….….. 40<br />

4. Trojans in Brief ………………………………………………………………………………………………….………………….………..…. 42<br />

Knowing the Trojan ………………………………………………………………………………….………………………………………………...…. 42<br />

Different Types of Trojans ……………………………………………………………………………………………………………………….…….. 43<br />

Components of Trojans …………………………………………………………………………………………………………………..…………….. 45<br />

Mode of Transmission for Trojans …………………………………………………………………………………………………………….…… 47<br />

Detection and Removal of Trojans ………………………………………………………………………………………………………………... 48<br />

Countermeasures for Trojan attacks ………………………………………………………………………………………………………….…. 48<br />

5. Attacks on web servers and Security ……….………………………………………………………………………….………….…. 49<br />

Introduction to Web Servers..………………………………………………………………….………………………………………………...…. 49<br />

The Basic Process: How Web servers work …………………………………………………………………………………………….………. 49<br />

Attacks on Web servers …………………………………………………………………………………………………………………………….…... 50<br />

Web Ripping …………………………………………………………………………………………………………………………………………….….… 50<br />

Google Hacking …………………………………………………………………………………………………………………………………………..…. 51<br />

Protecting Your Files from Google ……………………………………………………………………………………………………………….... 53<br />

Cross Site Scripting (XSS) …………………………………………………………………………………………………………………….……….… 54<br />

Directory Traversal Attack …………………………………………………………………………………………………………….…..………..… 55<br />

Database Servers ………………………………………………………………………………………………………………………………….……….. 57<br />

Login Process on the websites ………………………………………………………………………………………………….……….………….. 58<br />

SQL injection …………………………………………………………………………………………………………………………………………….…… 58<br />

Input validation on the SQL Injection ……………………………………………………………………………….……………………….…… 59<br />

PHP Injection: Placing PHP backdoors …………………………………………………………………………………………………….…….. 60<br />

Directory Access controls ……………………………………………………………………………………………………………………………... 62<br />

How Attackers Hide Them While Attacking …………………………………………………………………………………………….….…. 62<br />

Types of Proxy Servers ………………………………………………………………………………………………………………………………..… 63<br />

6. Wireless hacking …………………………………..………………………………………………………………………………..…….….. 65<br />

Wireless Standards …….……………………………………………………………………………………………………………………………….… 65<br />

Services provided by Wireless Networks ……………………………………………………………………………………………………….. 67<br />

w w w . h a c k i n g t e c h . c o . t v Page 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!