Subscribe:

Ads 468x70px

Feb 10, 2012

Hacking For Beginners ( Audio Book )






Chapter 1 : Concept of Ethical Hacking

- What Is Hacking
- Types of hacker
- Why hackers hack?
- Prevention's from hacker
- Steps Performed by hackers
- Working of an Ethical hacker
 
 Chapter 2 : Email Hacking

- How Email Works?
- Email service protocols
- Email spoofing 
- PHP Mail sending script 
- Email Spamming 
- Phishing 
- Prevention from phishing
- Email Tracing
- Keystroke loggers
- Securing Your Email account 
 
Chapter 3 : Windows Hacking and Security

- Security Architecture of Windows
- Windows user account Architecture
- Cracking Windows User Account password
- Windows User Account Attack
- Counter Measures of Windows Attack 
- Brute Force Attack 
- Rainbow table attack

Chapter 4 : Trojans In Brief

- Knowing the Trojan
- Different Types of Trojans
- Components of Trojans
- Some famous Trojans
- Reverse Connection in Trojans
- Detection and Removal of Trojans
- Countermeasures for Trojan attacks 
 
Chapter 5 : Attacks on web servers and security

- Introduction to Web Servers
- The Basic Process: How Web servers work
- Attacks on Web servers
- Web Ripping
- Google Hacking
- Protecting Your Files from Google
- Cross Site scripting (XSS)
- Directory Traversal Attack
- Database Servers
- Login Process on the websites
- SQL injection
- Input validation on the SQL Injection
- PHP Injection: Placing PHP backdoors
- Directory Access controls
- How Attackers Hide Them While Attacking
- Types of Proxy Servers
 
Download :
 
MEDIAFIRE 
 


0 comments:

Post a Comment