Hacking For Beginners – Manthan Desai
2010
Brute Force Attack ……………………………………………………………………………………………………………………………………….… 3 8
Rainbow table atta ck …………………………………………………………………………………………………………….…………………….…. 39
Counter Measures for Windows Attack ………………………………………………………………………………….………………….….. 40
4. Trojans in Brief ………………………………………………………………………………………………….………………… . ………. . … . 42
Knowing the Trojan ………………………………………………………………………………….………………………………………………...…. 42
Different Types of Trojans ……………………………………………………………………………………………………………………….…….. 4 3
Components of Trojans …………………………………………………………………………………………………………………..…………….. 4 5
Mode of Transmission for Trojans …………………………………………………………………………………………………………….…… 4 7
Detection and Removal of Trojans ………………………………………………………………………………………………………………... 4 8
Countermeasures for Trojan attacks ………………………………………………………………………………………………………….…. 4 8
5 . Attacks on web servers and Security ……….………………………………………………………………………… . ………… . … . 49
Introduction to Web Servers.. ………………………………………………………………….………………………………………………...…. 49
The Basic Process: How Web servers work …………………………………………………………………………………………….………. 49
Attacks on Web servers …………………………………………………………………………………………………………………………….…. .. 50
Web Ripping …………………………………………………………………………………………………………………………………………….….… 50
Google Hacking ………………………………………………………………… ………………………………………………………………………..…. 51
Protecting Your Files from Google ……………………………………………………………………………………………………………….... 5 3
Cross Site Scripti ng (XSS) …………………………………………………………………………………………………………………… . ……….… 5 4
Directory Traversal Attack …………………………………………………………………………………………………………….…..………..… 5 5
Database Servers ………………………………………………………………………………………………………………………………….……….. 5 7
Login Process on the websites ………………………………………………………………………………………………….……….………….. 5 8
SQL injection …………………………………………………………………………………………………………………………………………….…… 5 8
Input validation on the SQL Injection ……………………………………………………………………………….……………………….…… 59
PHP Injection: Placing PHP backdoors ……………………………… …………………………………………………………………….…….. 60
Directory Access controls …………………………………………………………………………………………………………………………… ... 62
How Attackers Hide Them While Attacking …………………………………………………………………………………………… . … . … . 62
Types of Proxy Servers …………………………………………………………………………………………… ………………………………… .. … 6 3
6. Wireless hacking …………………………………..………………………………………………………………………………..…… . … .. 65
Wireless Standards …….……………………………………………………………………………………………………………………………… . … 6 5
Services provided by Wireless Networks ……………………………………………………………………………………………………….. 6 7
www.hackingtech.co.tv
Page 7