Hacking_for_Beginners_-_Craig_Benson.pdf

(318 KB) Pobierz
Hacking for Beginners
The Ultimate Guide for Computer Hacking
Introduction
I want to thank you and congratulate you for downloading the book, “Computer Hacking for Beginners”.
This book contains proven steps and strategies on how to master the basics of computer hacking.
This eBook will explain what hackers do. It will teach you the tricks, skills, and techniques that
experienced hackers use. Aside from discussing core ideas and principles, this material will describe high-
level topics such as malware infection and computer programming.
After reading this book, you will know how to:
Identify the different types of hackers
Identify the different kinds of malicious programs
Compile, decompile, and corrupt codes
Attack buffer overflows
Use the Metasploit framework
Install virtual machines on your computer
Find the vulnerabilities of your targets
And many more!
If you are looking for a comprehensive guide about hacking, this is the book for you. Its pages are full
of up-to-date and detailed information regarding the art/science of hacking. Read it now to start your
hacking journey.
Thanks again for downloading this book, I hope you enjoy it!
Table of Contents
Introduction
Chapter 1: What You Need to Know About Hacking
The Basics
Malicious Programs
Penetration Testing
Programming Skills
Setting up a Laboratory
Chapter 2: The Metasploit Framework
Metasploit - The Basics
How to Launch Exploits Using Metasploit
How to Execute Client-Side Attacks Using Metasploit
Chapter 3: Programming for Hackers
What is the “C” Language?
The Language Constructs of C
The “Hello World!” Program
How to Compile a C Program
Chapter 4: Stacks, Buffers and Overflows
The Basics of Stack Operations
Buffer Overflow
Chapter 5: How to Work with Shellcodes
User-Level Shellcodes
Basic Shellcodes
Bind Shellcodes
Reverse Shellcodes
Find Socket Codes
Command Execution Shellcodes
How to Encode a Shellcode
How to Disassemble a Shellcode
Shellcode Corruption
Kernel-Level Shellcodes
Chapter 6: Reverse Engineering for Hackers
The Things to Consider
Analyzing the Source Code
Analyzing Binary Files
Chapter 7: Client-Side Vulnerabilities
The Importance of Client-Side Vulnerabilities
The Most Popular Client-Side Vulnerabilities
Chapter 8: Honeynets and Malware Infections
The Honeynet Technology
Malware Encryption
How Malicious Programs Hide
Persistence
Obfuscation and De-Obfuscation
Conclusion
Copyright 2016 by Craig Benson - All rights reserved.
This document is geared towards providing exact and reliable information in regards to the topic and
issue covered. The publication is sold with the idea that the publisher is not required to render accounting,
officially permitted, or otherwise, qualified services. If advice is necessary, legal or professional, a
practiced individual in the profession should be ordered.
- From a Declaration of Principles which was accepted and approved equally by a Committee of the
American Bar Association and a Committee of Publishers and Associations.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic
means or in printed format. Recording of this publication is strictly prohibited and any storage of this
document is not allowed unless with written permission from the publisher. All rights reserved.
The information provided herein is stated to be truthful and consistent, in that any liability, in terms of
inattention or otherwise, by any usage or abuse of any policies, processes, or directions contained within
is the solitary and utter responsibility of the recipient reader. Under no circumstances will any legal
responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to
the information herein, either directly or indirectly.
Respective authors own all copyrights not held by the publisher.
The information herein is offered for informational purposes solely, and is universal as so. The
presentation of the information is without contract or any type of guarantee assurance.
The trademarks that are used are without any consent, and the publication of the trademark is without
permission or backing by the trademark owner. All trademarks and brands within this book are for
clarifying purposes only and are the owned by the owners themselves, not affiliated with this document.
Zgłoś jeśli naruszono regulamin