Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Zero to Hacking: Zero Series, #1
Zero to Hacking: Zero Series, #1
Zero to Hacking: Zero Series, #1
Ebook52 pages17 minutes

Zero to Hacking: Zero Series, #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Cyber-criminals are waging war in the digital realm by exploiting whatever little vulnerabilities they can discover. They use numerous attack techniques and pair them up with advanced tools to destroy critical digital systems and information. It is up to security professionals to help the victims of this ongoing warfare in securing their IT infrastructure and protect it from adversaries.

The book begins with the explanation of basic terminologies related to hacking. It provides information on the categorisation of hackers, cybercrime, etc. This book also helps readers gather knowledge about various hacking techniques such as Google Dorking, which is one of the techniques that can be used to perform reconnaissance of a target.

As the readers read on they will learn how to use different tools and techniques to hack into target networks and systems. The book lays out the fundamentals of ethical hacking and the different phases involved in the process of completely compromising a target system. Whether it be scanning for vulnerabilities in targets or gaining access to it, this book has it all.

Overall, the book delivers foundational knowledge that can be utilised by security enthusiasts to try their hands at hacking and testing security controls out.

Cyber-criminals are waging war in the digital realm by exploiting whatever little vulnerabilities they can discover. They use numerous attack techniques and pair them up with advanced tools to destroy critical digital systems and information. It is up to security professionals to help the victims of this ongoing warfare in securing their IT infrastructure and protect it from adversaries.

The book begins with the explanation of basic terminologies related to hacking. It provides information on the categorisation of hackers, cybercrime, etc. This book also helps readers gather knowledge about various hacking techniques such as Google Dorking, which is one of the techniques that can be used to perform reconnaissance of a target.

As the readers read on they will learn how to use different tools and techniques to hack into target networks and systems. The book lays out the fundamentals of ethical hacking and the different phases involved in the process of completely compromising a target system. Whether it be scanning for vulnerabilities in targets or gaining access to it, this book has it all.

Overall, the book delivers foundational knowledge that can be utilised by security enthusiasts to try their hands at hacking and testing security controls out.

LanguageEnglish
PublisherV.V.R.K
Release dateSep 23, 2019
ISBN9781393694045
Zero to Hacking: Zero Series, #1

Related to Zero to Hacking

Titles in the series (1)

View More

Related ebooks

Networking For You

View More

Related articles

Reviews for Zero to Hacking

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Zero to Hacking - Veda Kakollu

    TYPES OF HACKERS

    Hackers are talented people who have a deep knowledge of security concepts. They are categorised by the way they work. Below are the types of hackers as indicated by their intention:

    Black hat hackers: these hackers hack into networks and systems to execute malicious activities with the purpose of stealing intellectual property, corporate information, money, etc.

    White hat hackers: they hack into systems to help a company improve its security outlook. These hackers test the security of a company’s IT infrastructure through legal methods.

    Grey hat hackers: they are in the middle of black and white hat hackers, and they break into networks and systems without the owner knowing about it, but their intention is to warn the owners of the flaws present in their digital assets.

    Phreaker: they leverage flaws in phones and not in computers.

    Script Kiddies: they make use of already created tools to hack networks. They do not possess their own computer skills. Script kiddies do not know anything about why a specific tool is being used or what the result of using that tool would be.

    Hacktivist: those who usually have a personal or political reason for hacking. These hackers try to convey a religious, social, or political message by hacking target systems.

    Corporate-Sponsored: they are conscripted for breaking into a rival competitor’s network and performing corporate espionage. Money is given to them for doing these activities by the conscripting company or a mediator between the company and the hacker.

    State-Sponsored: they are appointed by governments and perform hacking on the orders of their government. Many nations have numerous hacker groups who perform different cyber-attacks on different targets.

    Cyber Terrorists: they create fear among people by hacking into networks of different institutions. These hackers are usually religiously driven to hack their targets.

    Ethical hacking entails finding weaknesses in networks and the systems attached to it by performing the same activities as cyber-criminals perform. Since hacking can involve numerous disadvantages, all these aspects should be given lawful protection. To understand the importance of cyber laws there is a need to know what cybercrime is and the types of cybercrime

    Enjoying the preview?
    Page 1 of 1