Hacking For Beginners – Manthan Desai
2010
MAC address filtering …..…………………………………………………… ……………………………………………………………………….…. 6 8
WEP key encryption …………………………………………………………………………………………………………………………………….… 69
Wireless attacks ……………………………………………………………………………………………………………………………………….……. 69
MAC spoofing ……………………………………………………………………………………………………………………………………… . ……….. 70
WEP cracking ……………………………………………………………………………………………………………………………………………. . ….. 70
Countermeasures for Wireless attacks …………………………………………………………………………………………………….… . …. 71
7 . Mobile Hacking – SMS & Call forging …………………………………………………………………………….…………..… .. …….72
What Does It Involve ……………………………………………………………………………………………………………………………..…. . ….. 72
Call Spoofing / Forging ……………………………………………………………………………………………………………………….……. . …… 7 4
SMS Forging …………………………………………………………………………………………………………………………………………………… 7 5
Bluesnarfing ………………………………………………………………………………… ……………………………………………………………..... 7 6
8. Information gathering and Scanning ……………………………………………………………………………… . ………………… .78
Why Information gathering? ………………………………………………………………………………………………………………………… .. 78
Reverse IP mapping ……………………………………………………………………………………………………………… ………………….……. 7 8
Information Gathering Using Search Engine …………………………………………………………………………………………….……. 79
Detecting ‘live’ systems on target network …………………………………………………………………………………………….……… 81
War diallers ……………………………………………………………………………………………………………………………………………….….… 81
9. Sniffers ……………………………………………….………………………………………………………………………… . … . ……… .. ….… 82
What are Sniffers ? ………………………………………………………………………………………………………………… . ………………….…. 82
Defeating Sniffers………………………………………………………………………………………………………………… . ……………………..…. 8 3
Ant Sniff ……………………………………………………………………………………………………………………………… . ……………………..…. 8 3
10. Linux Hacking..…………………………………….…………………………………………………………….………… . ………….… ... … 85
Why Linux?..............………………………………………………………………………………………………………………………………… .. .… .. 85
Scanning Networks ……………………………………………………………………………………………………… …………………………..……. 8 6
Hacking tool Nmap …………………………………………………………… ………………………………………………………………………..…. 8 7
Password cracking in Linux ………………………………………………………………………………………………………………………..….. 8 7
SARA (Security Auditor’s Research Assistant) ……………………………………………………………………………………………..…. 8 8
Linux Root kits …………………………………………………………………………………………………………………………………………..…… 8 8
Linux Tools: Security Testing tools ………………………………………………………………………………… .. ………………………….…. 90
Linux Security Count ermeasures …………………………………………………………………… .. ………………………………………. . …... 90
www.hackingtech.co.tv
Page 8