The Art of Hacking 2
The Art of Hacking 2
The Art of Hacking 2
2
.
ABOUT AUTHOR
Fuad tesfaye is grade 10 student and want to be best hacker
I want the world full of hacking and all country know about hacking
And I wish ethiopia will be best hackers country
3
Preface
fuad tesfaye
1. Concept of Ethical Hacking……………………………………………..…………………………….6
What Is Hacking ……………………………………………………………………………….…….….6
Types of hacker …………………………………………………………,,,…………………………….7
2. Trojans in Brief ……………………………………………………………………………………......8
Knowing the Trojan …………………………….…………………………………………………...…. 8
Different Types of Trojans …………………..………………………………………………….……….9
Components of Trojans …………………….…………………………………………………………. 11
Mode of Transmission for Trojans ……………………………,,……………………………….……….14
Detection and Removal of Trojans …………………………..……………………………………........17
Countermeasures for Trojan attack…….…………………..…………………………………….……...17
3. Wireless hacking …………………………………..……..……………………………………...…..20
Wireless Standards …….…………………………………………………..………………………..…21
Services provided by Wireless Networks ……………….……………………………………………..23
MAC address filtering …..………………………………………………………………………….…..24
WEP key encryption ……………………………………………………………………………………25
Wireless attacks ……….………………………………………………………………………….……25
MAC spoofing ………………………………………………………………………………….………26
WEP cracking ………………………………………………………………………………………..…26
Countermeasures for Wireless attacks ……………………………………………………….….…….27
4. Linux Hacking..…..…………….………….………………………………………..……….…...….85
Why Linux?............…………………………………………...….. …………………………………….85
Scanning Network……...…………...……………………..……. ……………………………………..86
Hacking tool Nmap …………………………………………..…. …………………………………....87
Password cracking in Linux..………………………………..….. ……………………………………...87
SARA (Security Auditor’s Research Assistant) .………..…. ……………………………………………88
Linux Root kits ……………………..…..…………………..…… …………………………………….88
Linux Tools: Security Testing tools …………...………….…. ………………………………………….90
Linux Security Countermeasures …………………...…..…... …………………………………………90
3. Windows Hacking and Security.……………………………….…………… 28
Security Architecture of Windows…………………………………..……….. 28
Windows user account Architecture…………………………………………….29
Cracking Windows User Account password …………………………………... 30
Windows User Account Attack ……………………………………………....… 33
Counter Measures of Windows Attack …………………………………………..33
To hide a file behind a image ……………………………………………………34
Make a private folder……………………………………………………………35
To run net user in Vista and Windows 7 …………………………………………37
Brute Force Attack ……………………………………………………………… 38
Rainbow table attack ……………………………………………………………..39
Counter Measures for Windows Attack …………………………………………40