ethical hacking book review

23
UNOFFICIAL GUIDE UNOFFICIAL GUIDE TO TO

Upload: tirtha-mal

Post on 30-Oct-2014

78 views

Category:

Engineering


3 download

DESCRIPTION

Book review about Ethical Hacking and its pros & cons in Indian parameter ...

TRANSCRIPT

Page 1: Ethical hacking Book Review

UNOFFICIAL GUIDE UNOFFICIAL GUIDE TOTO

Page 2: Ethical hacking Book Review

© Macmillan India Ltd., 2001

MACMILLAN INDIA LTD.

Published by Rajiv Beri for Macmillan India Ltd.2/10 Ansari Road, Daryaganj, New Delhi– 110002

Printed at Rajkamal Electric PressB-35/9, G.T. Karnal Road Industrial Area, Delhi– 1100033

First Published, 2001Reprinted, 2001(thrice), 2002(thrice), 2003(thrice), 2004,2005

ISBN 0333 936795

ANKITFADIA

Born –1985 (age 27–28)

Residence –India, MumbaiOccupation –

Author, computer securityconsultant, MTV host

In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post-Graduate Diploma in Cyber Security.

 In addition, he started providing his own computer security courses, including the "Ankit Fadia Certified Ethical Hacker" programme in alliance with Reliance World.

Website – www.ankitfadia.in

Page 3: Ethical hacking Book Review

HackingHacking

Computer hacking is when someone modifies computer hardware or software in a way that alters the

creator's original intention

Page 4: Ethical hacking Book Review

Ethical HackingEthical HackingAn ethical hacker is a computer and network expert who attacks a security

system on behalf of its owners

Page 5: Ethical hacking Book Review

Book Contents

Page 6: Ethical hacking Book Review

Hacking Windows

BIOS setupWindows login passwordChanging windows visualsInternet Explorer usersCookiesURL address barURL history

Page 7: Ethical hacking Book Review

Getting your Hands Wet: Net Tool I

IP AddressDomain Name System or DNSPortsSockets & PortsPINGTracertNetstat

Page 8: Ethical hacking Book Review

Getting your Hands Wet: Net Tool II

Port 23FTP PortDifferent FTP CommandsSMTP (Port 25) and POP (Port 110)Receiving mail without an Email client POP3 (Port 110)

MailBombing

Page 9: Ethical hacking Book Review

Getting Past the Password

PasswordPassword CrackingCracking the Windows Login Password

Windows Screen SaverXORBypassing the Dial Up Server Password

Default Passwords

Page 10: Ethical hacking Book Review

Batch File

REM commandECHO: The Batch printing toolThe FOR loopPIPING

Page 11: Ethical hacking Book Review

TCP/IP

Transport LayerTCP protocolsIP protocolsUDP scanning

Page 12: Ethical hacking Book Review

A Deeper ApproachNumber SystemDecimal Number SystemBinary Number SystemHexadecimal SystemConverting into different formASCIIFirewalls

Page 13: Ethical hacking Book Review

VIRUS

What is VirusFile or Program VirusPolymorphic VirusesMacro VirusHow to create new virusSimple Encryption Method

Page 14: Ethical hacking Book Review

Perl

The BasicsOperatorsLoopsWhile Loop & For LoopPush & PopInput OutputDeleting Files

Page 15: Ethical hacking Book Review

Other Important Topic

ProtectionC ProgrammingJava Scripts ProgramHostile AppletsThe MotiveThe AttackXOOM

Page 16: Ethical hacking Book Review

Book Review & Information

Page 17: Ethical hacking Book Review

Need of Ethical Hacking

To decrease cyber attacks For national security Banking account Social networking media Personal information Terrorism attacks

Page 18: Ethical hacking Book Review

Drawbacks of Ethical Hacking

The ethical hacker using the knowledge they gain to do malicious hacking activities.

The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.

Allowing the company’s financial and banking details to be seen.

Page 19: Ethical hacking Book Review

Career on Network Security & Career on Network Security & Ethical HackingEthical Hacking

Network Security Systems Manager

Network Security Administrator Systems/Applications Security

Executive Web Security Administrator Certifications in Network

Security

Page 20: Ethical hacking Book Review

Future of Ethical Hacking

Page 21: Ethical hacking Book Review

Clearing Misconception about this book

If you are planning to follow this book so that you can hack your girl-friend's account to check whether she is cheating on you then forget it.

For that you better use scripts available on the internet.

This book gives you a clear overview of what hacking is and what you can and cannot do with hacking.

Basically it will guide you how to be secure.

Page 22: Ethical hacking Book Review

What Others Said About This Book

Scared of Hackers? Indian Teenager offers help.– The New York Times (Reuters)

He is a teenage prodigy all set to revolutionize the world of information technology. – The Hindu

The book throws light on unexplored horizons of the wired world. – Internet.com

Teen’s ‘Ethical Hacking’ book a hit.– ZD Net

Teenage Robin Hood of cyber jungle.– Indian Express

Sixteen and he knows it all.– The Pioneer

Indian teen writes a real web cracker.– The Asian Age

Page 23: Ethical hacking Book Review

MBA, 1MBA, 1stst Sem, Sem, 2013-2015 Batch2013-2015 Batch

iLEAD, KolkataiLEAD, Kolkata

West Bengal University of West Bengal University of TechnologyTechnology