Computer Hacking - Joe Benton.pdf

(341 KB) Pobierz
Computer Hacking
A beginners guide to computer hacking, how to
hack, internet skills, hacking techniques, and more!
Table Of Contents
Introduction
Chapter 1 – What is Hacking?
Chapter 2 – Ethical Hacking 101
Chapter 3 – Hacking Basics
Chapter 4 – Network Hacking Basics
Chapter 5 – Hacking Your Own Windows Password
Conclusion
Introduction
I want to thank you and congratulate you for downloading the book, “Computer Hacking”.
This book contains helpful information about computer hacking, and the skills required to hack.
This book is aimed at beginners, and will take you through the basics of computer hacking. You will
learn about the different types of hacking, the primary hacking methods, and different areas of a
system that can be hacked.
This book includes great tips and techniques that will help you to begin developing your own
computer hacking skills! You will discover some basic hacks you can do right away, and be pointed
in the direction of software that will assist your hacking escapades.
However, keep in mind that hacking should be done in an ethical manner. White hat hacking is the
only hacking you should be doing, so remember to keep your morals in check as your hacking skills
improve!
Thanks again for downloading this book, I hope you enjoy it!
Chapter 1 – What is Hacking?
The term “hacker” today has garnered a negative connotation. You’ve heard about hackers breaking
into computer systems and looking at or even stealing some very sensitive and very private
information. Millions of computer users worldwide have felt the effects of hacking activity. That
includes virus attacks, spyware, and other forms of malware that slow down, break into, or even
cripple your computer system.
However, not all hackers are dubious and unscrupulous souls who have nothing better to do in life. In
fact, the term “hacker” originally had a very positive and beneficial meaning to it. Traditionally, a
hacker is someone who likes to tinker with computers and other forms of electronics. They enjoy
figuring out how current systems work and find ways to improve them.
In other words, he used to be the guy who had to figure out how to make computers faster and better.
Nowadays, a hacker is just someone who steals electronic information for their own self-interest.
Nevertheless, there are still good hackers (white hat hackers) and bad hackers (black hat hackers).
It basically takes a hacker to catch a hacker and the good news is that a lot of them are on your side of
the playing field. The premise of this book is to help you learn the basics of ethical hacking (the stuff
that white hat hackers do). But in order to know what to look out for, you will have to catch a glimpse
of what black hat hackers do.
The bottom line here is that hacking is no more than a set of computer skills that can be used for either
good or bad. How one uses those skills will clearly define whether one is a white hat or a black hat
hacker. The skills and tools are always neutral; only when they are used for malicious purposes do
they take a turn for the worse.
What are the Objectives of Ethical Hacking?
If hacking per se today is bent on stealing valuable information, ethical hacking on the other hand is
used to identify possible weak points in your computer system or network and making them secure
before the bad guys (aka the black hat hackers) use them against you. It’s the objective of white hat
hackers or ethical hackers to do security checks and keep everything secure.
That is also the reason why some professional white hat hackers are called penetration testing
specialists. One rule of thumb to help distinguish penetration testing versus malicious hacking is that
white hat hackers have the permission of the system’s owner to try and break their security.
In the process, if the penetration testing is successful, the owner of the system will end up with a more
secure computer system or network system. After all the penetration testing is completed, the ethical
hacker, the one who’s doing the legal hacking, will recommend security solutions and may even help
implement them.
It is the goal of ethical hackers to hack into a system (the one where they were permitted and hired to
hack, specifically by the system’s owner) but they should do so in a non-destructive way. This means
Zgłoś jeśli naruszono regulamin