Hacking For Beginners – Manthan Desai

2010

Brute Force Attack ……………………………………………………………………………………………………………………………………….… 3 8

Rainbow table atta ck …………………………………………………………………………………………………………….…………………….…. 39

Counter Measures for Windows Attack ………………………………………………………………………………….………………….….. 40

4. Trojans in Brief ………………………………………………………………………………………………….………………… . ………. . … . 42

Knowing the Trojan ………………………………………………………………………………….………………………………………………...…. 42

Different Types of Trojans ……………………………………………………………………………………………………………………….…….. 4 3

Components of Trojans …………………………………………………………………………………………………………………..…………….. 4 5

Mode of Transmission for Trojans …………………………………………………………………………………………………………….…… 4 7

Detection and Removal of Trojans ………………………………………………………………………………………………………………... 4 8

Countermeasures for Trojan attacks ………………………………………………………………………………………………………….…. 4 8

5 . Attacks on web servers and Security ……….………………………………………………………………………… . ………… . … . 49

Introduction to Web Servers.. ………………………………………………………………….………………………………………………...…. 49

The Basic Process: How Web servers work …………………………………………………………………………………………….………. 49

Attacks on Web servers …………………………………………………………………………………………………………………………….…. .. 50

Web Ripping …………………………………………………………………………………………………………………………………………….….… 50

Google Hacking ………………………………………………………………… ………………………………………………………………………..…. 51

Protecting Your Files from Google ……………………………………………………………………………………………………………….... 5 3

Cross Site Scripti ng (XSS) …………………………………………………………………………………………………………………… . ……….… 5 4

Directory Traversal Attack …………………………………………………………………………………………………………….…..………..… 5 5

Database Servers ………………………………………………………………………………………………………………………………….……….. 5 7

Login Process on the websites ………………………………………………………………………………………………….……….………….. 5 8

SQL injection …………………………………………………………………………………………………………………………………………….…… 5 8

Input validation on the SQL Injection ……………………………………………………………………………….……………………….…… 59

PHP Injection: Placing PHP backdoors ……………………………… …………………………………………………………………….…….. 60

Directory Access controls …………………………………………………………………………………………………………………………… ... 62

How Attackers Hide Them While Attacking …………………………………………………………………………………………… . … . … . 62

Types of Proxy Servers …………………………………………………………………………………………… ………………………………… .. … 6 3

6. Wireless hacking …………………………………..………………………………………………………………………………..…… . … .. 65

Wireless Standards …….……………………………………………………………………………………………………………………………… . … 6 5

Services provided by Wireless Networks ……………………………………………………………………………………………………….. 6 7

www.hackingtech.co.tv

Page 7