Zero to Hacking: Zero Series, #1
By Veda Kakollu
()
About this ebook
Cyber-criminals are waging war in the digital realm by exploiting whatever little vulnerabilities they can discover. They use numerous attack techniques and pair them up with advanced tools to destroy critical digital systems and information. It is up to security professionals to help the victims of this ongoing warfare in securing their IT infrastructure and protect it from adversaries.
The book begins with the explanation of basic terminologies related to hacking. It provides information on the categorisation of hackers, cybercrime, etc. This book also helps readers gather knowledge about various hacking techniques such as Google Dorking, which is one of the techniques that can be used to perform reconnaissance of a target.
As the readers read on they will learn how to use different tools and techniques to hack into target networks and systems. The book lays out the fundamentals of ethical hacking and the different phases involved in the process of completely compromising a target system. Whether it be scanning for vulnerabilities in targets or gaining access to it, this book has it all.
Overall, the book delivers foundational knowledge that can be utilised by security enthusiasts to try their hands at hacking and testing security controls out.
Cyber-criminals are waging war in the digital realm by exploiting whatever little vulnerabilities they can discover. They use numerous attack techniques and pair them up with advanced tools to destroy critical digital systems and information. It is up to security professionals to help the victims of this ongoing warfare in securing their IT infrastructure and protect it from adversaries.
The book begins with the explanation of basic terminologies related to hacking. It provides information on the categorisation of hackers, cybercrime, etc. This book also helps readers gather knowledge about various hacking techniques such as Google Dorking, which is one of the techniques that can be used to perform reconnaissance of a target.
As the readers read on they will learn how to use different tools and techniques to hack into target networks and systems. The book lays out the fundamentals of ethical hacking and the different phases involved in the process of completely compromising a target system. Whether it be scanning for vulnerabilities in targets or gaining access to it, this book has it all.
Overall, the book delivers foundational knowledge that can be utilised by security enthusiasts to try their hands at hacking and testing security controls out.
Related to Zero to Hacking
Related ebooks
Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Hacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Hacking Rating: 3 out of 5 stars3/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Wifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 4 out of 5 stars4/5Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5Learn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Hacking Web Apps: Detecting and Preventing Web Application Security Problems Rating: 0 out of 5 stars0 ratingsTargeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5
Networking For You
Networking All-in-One For Dummies Rating: 5 out of 5 stars5/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsThe Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam Rating: 0 out of 5 stars0 ratingsUnlock Any Roku Device: Watch Shows, TV, & Download Apps Rating: 0 out of 5 stars0 ratingsCisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Networking For Dummies Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsNetworking Fundamentals: Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking Android Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5SharePoint For Dummies Rating: 0 out of 5 stars0 ratingsTCP/IP Clearly Explained Rating: 4 out of 5 stars4/5Raspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5Architecture of Network Systems Rating: 5 out of 5 stars5/5Quantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5MCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104 Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsCisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners: Computer Networking, #3 Rating: 0 out of 5 stars0 ratingsWindows Command Line Administration Instant Reference Rating: 0 out of 5 stars0 ratingsMicrosoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsEmergency Preparedness and Off-Grid Communication Rating: 0 out of 5 stars0 ratingsComputer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5
Reviews for Zero to Hacking
0 ratings0 reviews
Book preview
Zero to Hacking - Veda Kakollu
TYPES OF HACKERS
Hackers are talented people who have a deep knowledge of security concepts. They are categorised by the way they work. Below are the types of hackers as indicated by their intention:
Black hat hackers: these hackers hack into networks and systems to execute malicious activities with the purpose of stealing intellectual property, corporate information, money, etc.
White hat hackers: they hack into systems to help a company improve its security outlook. These hackers test the security of a company’s IT infrastructure through legal methods.
Grey hat hackers: they are in the middle of black and white hat hackers, and they break into networks and systems without the owner knowing about it, but their intention is to warn the owners of the flaws present in their digital assets.
Phreaker: they leverage flaws in phones and not in computers.
Script Kiddies: they make use of already created tools to hack networks. They do not possess their own computer skills. Script kiddies do not know anything about why a specific tool is being used or what the result of using that tool would be.
Hacktivist: those who usually have a personal or political reason for hacking. These hackers try to convey a religious, social, or political message by hacking target systems.
Corporate-Sponsored: they are conscripted for breaking into a rival competitor’s network and performing corporate espionage. Money is given to them for doing these activities by the conscripting company or a mediator between the company and the hacker.
State-Sponsored: they are appointed by governments and perform hacking on the orders of their government. Many nations have numerous hacker groups who perform different cyber-attacks on different targets.
Cyber Terrorists: they create fear among people by hacking into networks of different institutions. These hackers are usually religiously driven to hack their targets.
Ethical hacking entails finding weaknesses in networks and the systems attached to it by performing the same activities as cyber-criminals perform. Since hacking can involve numerous disadvantages, all these aspects should be given lawful protection. To understand the importance of cyber laws there is a need to know what cybercrime is and the types of cybercrime