This book is a hands on introduction to the art of hacking, written with the intent of educating computer users to some common weaknesses in computer systems with the hope that this will help them prepare for and defend against such attacks. Topics are designed to coincide with the topics covered in the Certified Ethical Hacker (CEH) certification and include;
•Setting up your systems
•Legality and Ethics
•Foot Printing
•Scanning
•Enumerating
•System Hacking Techniques
•Trojans and Backdoors
•Denial of Service Attacks
•Session Hijacking
•Server Hacking
•SQL Ingestion
•Wireless Hacking
Please do not use this book as a guide to hack other systems. In all cases make sure you are aware of the legal and ethical issues associated with these exercise and use them to benefit and not harm the fabric of society.
•Setting up your systems
•Legality and Ethics
•Foot Printing
•Scanning
•Enumerating
•System Hacking Techniques
•Trojans and Backdoors
•Denial of Service Attacks
•Session Hijacking
•Server Hacking
•SQL Ingestion
•Wireless Hacking
Please do not use this book as a guide to hack other systems. In all cases make sure you are aware of the legal and ethical issues associated with these exercise and use them to benefit and not harm the fabric of society.