Hacking For Beginners – Manthan Desai

2010

MAC address filtering …..…………………………………………………… ……………………………………………………………………….…. 6 8

WEP key encryption …………………………………………………………………………………………………………………………………….… 69

Wireless attacks ……………………………………………………………………………………………………………………………………….……. 69

MAC spoofing ……………………………………………………………………………………………………………………………………… . ……….. 70

WEP cracking ……………………………………………………………………………………………………………………………………………. . ….. 70

Countermeasures for Wireless attacks …………………………………………………………………………………………………….… . …. 71

7 . Mobile Hacking – SMS & Call forging …………………………………………………………………………….…………..… .. …….72

What Does It Involve ……………………………………………………………………………………………………………………………..…. . ….. 72

Call Spoofing / Forging ……………………………………………………………………………………………………………………….……. . …… 7 4

SMS Forging …………………………………………………………………………………………………………………………………………………… 7 5

Bluesnarfing ………………………………………………………………………………… ……………………………………………………………..... 7 6

8. Information gathering and Scanning ……………………………………………………………………………… . ………………… .78

Why Information gathering? ………………………………………………………………………………………………………………………… .. 78

Reverse IP mapping ……………………………………………………………………………………………………………… ………………….……. 7 8

Information Gathering Using Search Engine …………………………………………………………………………………………….……. 79

Detecting ‘live’ systems on target network …………………………………………………………………………………………….……… 81

War diallers ……………………………………………………………………………………………………………………………………………….….… 81

9. Sniffers ……………………………………………….………………………………………………………………………… . … . ……… .. ….… 82

What are Sniffers ? ………………………………………………………………………………………………………………… . ………………….…. 82

Defeating Sniffers………………………………………………………………………………………………………………… . ……………………..…. 8 3

Ant Sniff ……………………………………………………………………………………………………………………………… . ……………………..…. 8 3

10. Linux Hacking..…………………………………….…………………………………………………………….………… . ………….… ... … 85

Why Linux?..............………………………………………………………………………………………………………………………………… .. .… .. 85

Scanning Networks ……………………………………………………………………………………………………… …………………………..……. 8 6

Hacking tool Nmap …………………………………………………………… ………………………………………………………………………..…. 8 7

Password cracking in Linux ………………………………………………………………………………………………………………………..….. 8 7

SARA (Security Auditor’s Research Assistant) ……………………………………………………………………………………………..…. 8 8

Linux Root kits …………………………………………………………………………………………………………………………………………..…… 8 8

Linux Tools: Security Testing tools ………………………………………………………………………………… .. ………………………….…. 90

Linux Security Count ermeasures …………………………………………………………………… .. ………………………………………. . …... 90

www.hackingtech.co.tv

Page 8