The Hacker’s Underground Handbook
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 2.51 MiB (2632508 Bytes)
- Texted language(s):
- English
- Tag(s):
- hacking
- Uploaded:
- 2012-11-17 18:53 GMT
- By:
- wearehidden
- Seeders:
- 2
- Leechers:
- 5
- Info Hash: CA22E6007039744CE87AE236EC45FCA490C2B9FA
Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I start? 3. Best way to learn C. Linux.......................................................................................................12 1. What is it? 2. Choosing a distribution 3. Running Linux 4. Learning Linux D. Passwords...............................................................................................33 1. Password Cracking 2. Phishing 3. Countermeasures 4. More Programs E. Network Hacking.....................................................................................48 1. Foot printing 2. Port Scanning 3. Banner Grabbing 4. Searching for Vulnerabilities 5. Penetrating 6. Countermeasures F. Wireless Hacking.....................................................................................70 1. Scanning for Wireless Networks 2. Cracking WEP 3. Packet Sniffing 4 4. Countermeasures G. Windows Hacking...................................................................................79 1. NetBIOS 2. Cracking Windows Passwords 3. Countermeasures H. Malware.................................................................................................93 1. Definitions 2. ProRat 3. Countermeasures I. Web Hacking.........................................................................................104 1. Cross Site Scripting 2. Remote File Inclusion 3. Local File Inclusion J. Conclusion............................................................................................114