ABSTRACT

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

chapter Chapter 1|45 pages

Hacking Windows OS

Size: 6.61 MB

chapter Chapter 2|41 pages

Obtaining Windows Passwords

Size: 7.41 MB

chapter Chapter 3|29 pages

Imaging and Extraction

Size: 3.59 MB

chapter Chapter 4|13 pages

Bypassing Web Filters

Size: 2.07 MB

chapter Chapter 5|18 pages

Manipulating the Web

Size: 3.10 MB

chapter Chapter 6|27 pages

Finding It All on the Net

Size: 5.12 MB

chapter Chapter 7|26 pages

Research Time

Size: 6.07 MB

chapter Chapter 8|17 pages

Capturing Network Traffic

Size: 1.14 MB

chapter Chapter 9|29 pages

Research Time: Finding the Vulnerabilities

Size: 4.69 MB

chapter Chapter 10|36 pages

Metasploit

Size: 5.72 MB

chapter Chapter 11|20 pages

Other Attack Tools

Size: 2.78 MB

chapter Chapter 12|20 pages

Social Engineering with Web 2.0

Size: 2.84 MB

chapter Chapter 13|29 pages

Hack the Macs

Size: 4.96 MB

chapter Chapter 14|31 pages

Wireless Hacking

Size: 5.22 MB