The Art of Hacking 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

THE ART OF HACKING

“Hack It and Have It...” By Fuad Tesfaye


All the information provided in this
book is for educational purposes only.
1. “art of hacking” is just a term that represents the name of the book and is not a book that provides any
illegal information. “art of hacking” is a book related to Computer Security and not a book that promotes
hacking/cracking/software piracy.
2. This book is totally meant for providing information on "Computer Security”, "Computer
Programming” and other related topics and is no way related towards the terms "CRACKING” or
"HACKING” (Unethical)
3. The virus creation section in this book provides demonstration on coding simple viruses using high level
programming languages. These viruses are simple ones and cause no serious damage to the computer.
However we strongly insist that these information shall only be used to expand programming knowledge
and not for causing malicious attacks.
4. All the information in this book is meant for developing Hacker Defense attitude among the readers and
help preventing the hack attacks. “Hacking for Beginners” insists that this information shall not be used for
causing any kind of damage directly or indirectly. However you may try these codes on your own computer
at your own risk.
5. The word "Hack” or "Hacking” that is used in this book shall be regarded as "Ethical Hack” or "Ethical
Hacking” respectively.
6. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.

2
.
ABOUT AUTHOR
Fuad tesfaye is grade 10 student and want to be best hacker
I want the world full of hacking and all country know about hacking
And I wish ethiopia will be best hackers country

3
Preface

 Computer hacking is the practice of altering computer hardware and software to


carry out a goal outside of the creator‘s original intention. People who slot in
computer hacking actions and activities are often entitled as hackers. The majority of
people assume that hackers are computer criminals. They fall short to identify the
fact that criminals and hackers are two entirely unrelated things. Media is liable for
this. Hackers in realism are good and extremely intelligent people, who by using
their knowledge in a constructive mode help organizations, companies, government,
etc. to secure credentials and secret information on the Internet.
 This Book is written by keeping one object in mind that a beginner, who is not much
familiar regarding computer hacking, can easily, attempts these hacks and recognize
what we are trying to demonstrate. Here we have incorporated the best ethical
hacking articles in this volume, covering every characteristic linked to computer
security
 So Take care of yourself and Defend Yourself By hacking the hacker and be safe
after that. So If you know how to hack a hacker then you can know how to prevent
the hacker.
Acknowledgements

Book or volume “Art of hacking” is tremendously complex to write,


particularly without support of the Almighty GOD.. I am more than
ever thankful tor the inspiration which I got for learning hacking and
getting such great opportunity to write the book. I am also thankful to
my partner who facilitated me at various research stages of this book
and helped me to complete this book and mentioned me new
suggestion for the book To finish, I am thankful to you also as you are
reading this book. I am sure this will book make creative and
constructive role to build your life more secure and alert than ever
before Again Nothing but “Hack It and Have It...”

fuad tesfaye
1. Concept of Ethical Hacking……………………………………………..…………………………….6
What Is Hacking ……………………………………………………………………………….…….….6
Types of hacker …………………………………………………………,,,…………………………….7
2. Trojans in Brief ……………………………………………………………………………………......8
Knowing the Trojan …………………………….…………………………………………………...…. 8
Different Types of Trojans …………………..………………………………………………….……….9
Components of Trojans …………………….…………………………………………………………. 11
Mode of Transmission for Trojans ……………………………,,……………………………….……….14
Detection and Removal of Trojans …………………………..……………………………………........17
Countermeasures for Trojan attack…….…………………..…………………………………….……...17
3. Wireless hacking …………………………………..……..……………………………………...…..20
Wireless Standards …….…………………………………………………..………………………..…21
Services provided by Wireless Networks ……………….……………………………………………..23
MAC address filtering …..………………………………………………………………………….…..24
WEP key encryption ……………………………………………………………………………………25
Wireless attacks ……….………………………………………………………………………….……25
MAC spoofing ………………………………………………………………………………….………26
WEP cracking ………………………………………………………………………………………..…26
Countermeasures for Wireless attacks ……………………………………………………….….…….27
4. Linux Hacking..…..…………….………….………………………………………..……….…...….85
Why Linux?............…………………………………………...….. …………………………………….85
Scanning Network……...…………...……………………..……. ……………………………………..86
Hacking tool Nmap …………………………………………..…. …………………………………....87
Password cracking in Linux..………………………………..….. ……………………………………...87
SARA (Security Auditor’s Research Assistant) .………..…. ……………………………………………88
Linux Root kits ……………………..…..…………………..…… …………………………………….88
Linux Tools: Security Testing tools …………...………….…. ………………………………………….90
Linux Security Countermeasures …………………...…..…... …………………………………………90
3. Windows Hacking and Security.……………………………….…………… 28
Security Architecture of Windows…………………………………..……….. 28
Windows user account Architecture…………………………………………….29
Cracking Windows User Account password …………………………………... 30
Windows User Account Attack ……………………………………………....… 33
Counter Measures of Windows Attack …………………………………………..33
To hide a file behind a image ……………………………………………………34
Make a private folder……………………………………………………………35
To run net user in Vista and Windows 7 …………………………………………37
Brute Force Attack ……………………………………………………………… 38
Rainbow table attack ……………………………………………………………..39
Counter Measures for Windows Attack …………………………………………40

You might also like