29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

MAC address filtering …..…………………………………………………………………………………………………………………………….…. 68<br />

WEP key encryption …………………………………………………………………………………………………………………………………….… 69<br />

Wireless attacks ……………………………………………………………………………………………………………………………………….……. 69<br />

MAC spoofing ……………………………………………………………………………………………………………………………………….……….. 70<br />

WEP cracking ……………………………………………………………………………………………………………………………………………..….. 70<br />

Countermeasures for Wireless attacks …………………………………………………………………………………………………….….…. 71<br />

7. Mobile Hacking – SMS & Call forging…………………………………………………………………………….…………..…..…….72<br />

What Does It Involve ……………………………………………………………………………………………………………………………..…..….. 72<br />

Call Spoofing / Forging ……………………………………………………………………………………………………………………….……..…… 74<br />

SMS Forging …………………………………………………………………………………………………………………………………………………… 75<br />

Bluesnarfing ………………………………………………………………………………………………………………………………………………..... 76<br />

8. Information gathering and Scanning ……………………………………………………………………………….………………….78<br />

Why Information gathering? ………………………………………………………………………………………………………………………….. 78<br />

Reverse IP mapping ………………………………………………………………………………………………………………………………….……. 78<br />

Information Gathering Using Search Engine …………………………………………………………………………………………….……. 79<br />

Detecting ‘live’ systems on target network …………………………………………………………………………………………….……… 81<br />

War diallers ……………………………………………………………………………………………………………………………………………….….… 81<br />

9. Sniffers ……………………………………………….………………………………………………………………………….….………..….… 82<br />

What are Sniffers ? ………………………………………………………………………………………………………………….………………….…. 82<br />

Defeating Sniffers………………………………………………………………………………………………………………….……………………..…. 83<br />

Ant Sniff ……………………………………………………………………………………………………………………………….……………………..…. 83<br />

10. Linux Hacking..…………………………………….…………………………………………………………….………….………….…...… 85<br />

Why Linux?..............…………………………………………………………………………………………………………………………………...….. 85<br />

Scanning Networks …………………………………………………………………………………………………………………………………..……. 86<br />

Hacking tool Nmap ……………………………………………………………………………………………………………………………………..…. 87<br />

Password cracking in Linux ………………………………………………………………………………………………………………………..….. 87<br />

SARA (Security Auditor’s Research Assistant) ……………………………………………………………………………………………..…. 88<br />

Linux Root kits …………………………………………………………………………………………………………………………………………..…… 88<br />

Linux Tools: Security Testing tools …………………………………………………………………………………..………………………….…. 90<br />

Linux Security Countermeasures ……………………………………………………………………..………………………………………..…... 90<br />

w w w . h a c k i n g t e c h . c o . t v Page 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!