Hacking For Beginners – Manthan Desai

2010

Index

SECTION 1:- The Theatrical concepts and Explanation.

1. Concept of Ethical Hacking…………………………………………… ……………………………………………………………… .. ……. 12

What Is Hacking …………………………………………………………………………….…………………………………………………………….….. 12

Types of hacker ………………………………………………………………………………………………...………………………………………… . … . 13

Why hackers hack? ……………………………………………………………………………………………………………………………………… . …. 15

Preventions from hacker ……………………………………………………………………………………………………………………..……… . .… 15

Steps Performed by hackers ………………………………………………………………………………………………………………………. . ..…. 16

Working of an Ethical hack er ………………………………………………………………………………………………………………………… . … 17

2. Email Hacking ……………………………………………………………………………………………………………………..… . … .. ……… 19

How Email Works? ……………………………………………………………………………………………………………………………………….…. 19

Email service protocols ……………………………………………………………………………………………………………………………….…... 20

Email spoofing …………………………………………………………………………………………………………………………………………….….. 21

PHP Mail sending script …………………………………………………………………………………………………………………………….…… . 22

Ema il Spamming …………………………………………………………………………………………………………………………………………... .. 23

Phishing …………………………………………………………………………………………………………………………………………………….……. 2 3

Prevention from phishing ………………………………………………………………………………………………………………………….……. 2 4

Email Tracing …………………………………………………………………………………………………………………………………………….……. 2 4

Keystroke loggers ……………………………………………………………………………………………………………………………………….….. 26

Securing Your Email account …………………………………………………………………………………………………………………………. . 27

3. Windows Hacking and Security.…...………………………………………………… …………………………………… . …………… 28

Security Architecture of Windows………………………………………………………………………………………………………………….. 28

Windows user account Architecture………………………………………………………………………………………………………………. 29

Cracking Windows User Account password ………………………………………………………………………………………………….. . 30

Windows User Account Attack …………………………………………………………………………………………………………………....… 33

Counter Measures of Windows Attack …………………………………………………………………………………………………………. . 33

To hide a file behind a image …………………………………………………………………………………………………….………………..… 3 4

M ake a private folder……………………………………………………………………………………………………………………………………. . 35

To run net user in Vista and Windows 7 …………………………………………………………………………………………………..…. .. 37

www.hackingtech.co.tv

Page 6