Hacking For Beginners – Manthan Desai
2010
Index
SECTION 1:- The Theatrical concepts and Explanation.
1. Concept of Ethical Hacking…………………………………………… ……………………………………………………………… .. ……. 12
What Is Hacking …………………………………………………………………………….…………………………………………………………….….. 12
Types of hacker ………………………………………………………………………………………………...………………………………………… . … . 13
Why hackers hack? ……………………………………………………………………………………………………………………………………… . …. 15
Preventions from hacker ……………………………………………………………………………………………………………………..……… . .… 15
Steps Performed by hackers ………………………………………………………………………………………………………………………. . ..…. 16
Working of an Ethical hack er ………………………………………………………………………………………………………………………… . … 17
2. Email Hacking ……………………………………………………………………………………………………………………..… . … .. ……… 19
How Email Works? ……………………………………………………………………………………………………………………………………….…. 19
Email service protocols ……………………………………………………………………………………………………………………………….…... 20
Email spoofing …………………………………………………………………………………………………………………………………………….….. 21
PHP Mail sending script …………………………………………………………………………………………………………………………….…… . 22
Ema il Spamming …………………………………………………………………………………………………………………………………………... .. 23
Phishing …………………………………………………………………………………………………………………………………………………….……. 2 3
Prevention from phishing ………………………………………………………………………………………………………………………….……. 2 4
Email Tracing …………………………………………………………………………………………………………………………………………….……. 2 4
Keystroke loggers ……………………………………………………………………………………………………………………………………….….. 26
Securing Your Email account …………………………………………………………………………………………………………………………. . 27
3. Windows Hacking and Security.…...………………………………………………… …………………………………… . …………… 28
Security Architecture of Windows………………………………………………………………………………………………………………….. 28
Windows user account Architecture………………………………………………………………………………………………………………. 29
Cracking Windows User Account password ………………………………………………………………………………………………….. . 30
Windows User Account Attack …………………………………………………………………………………………………………………....… 33
Counter Measures of Windows Attack …………………………………………………………………………………………………………. . 33
To hide a file behind a image …………………………………………………………………………………………………….………………..… 3 4
M ake a private folder……………………………………………………………………………………………………………………………………. . 35
To run net user in Vista and Windows 7 …………………………………………………………………………………………………..…. .. 37
www.hackingtech.co.tv
Page 6