ethical hacking book review
DESCRIPTION
Book review about Ethical Hacking and its pros & cons in Indian parameter ...TRANSCRIPT
UNOFFICIAL GUIDE UNOFFICIAL GUIDE TOTO
© Macmillan India Ltd., 2001
MACMILLAN INDIA LTD.
Published by Rajiv Beri for Macmillan India Ltd.2/10 Ansari Road, Daryaganj, New Delhi– 110002
Printed at Rajkamal Electric PressB-35/9, G.T. Karnal Road Industrial Area, Delhi– 1100033
First Published, 2001Reprinted, 2001(thrice), 2002(thrice), 2003(thrice), 2004,2005
ISBN 0333 936795
ANKITFADIA
Born –1985 (age 27–28)
Residence –India, MumbaiOccupation –
Author, computer securityconsultant, MTV host
In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post-Graduate Diploma in Cyber Security.
In addition, he started providing his own computer security courses, including the "Ankit Fadia Certified Ethical Hacker" programme in alliance with Reliance World.
Website – www.ankitfadia.in
HackingHacking
Computer hacking is when someone modifies computer hardware or software in a way that alters the
creator's original intention
Ethical HackingEthical HackingAn ethical hacker is a computer and network expert who attacks a security
system on behalf of its owners
Book Contents
Hacking Windows
BIOS setupWindows login passwordChanging windows visualsInternet Explorer usersCookiesURL address barURL history
Getting your Hands Wet: Net Tool I
IP AddressDomain Name System or DNSPortsSockets & PortsPINGTracertNetstat
Getting your Hands Wet: Net Tool II
Port 23FTP PortDifferent FTP CommandsSMTP (Port 25) and POP (Port 110)Receiving mail without an Email client POP3 (Port 110)
MailBombing
Getting Past the Password
PasswordPassword CrackingCracking the Windows Login Password
Windows Screen SaverXORBypassing the Dial Up Server Password
Default Passwords
Batch File
REM commandECHO: The Batch printing toolThe FOR loopPIPING
TCP/IP
Transport LayerTCP protocolsIP protocolsUDP scanning
A Deeper ApproachNumber SystemDecimal Number SystemBinary Number SystemHexadecimal SystemConverting into different formASCIIFirewalls
VIRUS
What is VirusFile or Program VirusPolymorphic VirusesMacro VirusHow to create new virusSimple Encryption Method
Perl
The BasicsOperatorsLoopsWhile Loop & For LoopPush & PopInput OutputDeleting Files
Other Important Topic
ProtectionC ProgrammingJava Scripts ProgramHostile AppletsThe MotiveThe AttackXOOM
Book Review & Information
Need of Ethical Hacking
To decrease cyber attacks For national security Banking account Social networking media Personal information Terrorism attacks
Drawbacks of Ethical Hacking
The ethical hacker using the knowledge they gain to do malicious hacking activities.
The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.
Allowing the company’s financial and banking details to be seen.
Career on Network Security & Career on Network Security & Ethical HackingEthical Hacking
Network Security Systems Manager
Network Security Administrator Systems/Applications Security
Executive Web Security Administrator Certifications in Network
Security
Future of Ethical Hacking
Clearing Misconception about this book
If you are planning to follow this book so that you can hack your girl-friend's account to check whether she is cheating on you then forget it.
For that you better use scripts available on the internet.
This book gives you a clear overview of what hacking is and what you can and cannot do with hacking.
Basically it will guide you how to be secure.
What Others Said About This Book
Scared of Hackers? Indian Teenager offers help.– The New York Times (Reuters)
He is a teenage prodigy all set to revolutionize the world of information technology. – The Hindu
The book throws light on unexplored horizons of the wired world. – Internet.com
Teen’s ‘Ethical Hacking’ book a hit.– ZD Net
Teenage Robin Hood of cyber jungle.– Indian Express
Sixteen and he knows it all.– The Pioneer
Indian teen writes a real web cracker.– The Asian Age
MBA, 1MBA, 1stst Sem, Sem, 2013-2015 Batch2013-2015 Batch
iLEAD, KolkataiLEAD, Kolkata
West Bengal University of West Bengal University of TechnologyTechnology