Books Hackers
A Hacker In A Hacking World
A Hacker In A Hacking World
#Hakers
#Hacking
#DeepWeb
#DarkWeb
Books From Dark Web
- Book name : A Hacker In A Hacking World
- Category : Books Hackers
- Number of pages : 179
- Type of book : PDF & EPUB
- The size : PDF- - > 4.74M | EPUB - - > 5.3M
- Download format : RAR
- Unzip password : DarkNetBooks
- About the book :
- You will learn the following things :
- Chapter 1:
* Remote Access – Using
Metaploit and planting backdoors.
* What is remote hacking?.
* What is remote hacking?.
* Gain full control on
computer using Cobalt Strike Using Backtrack/Kali to gain full access to
Machinne.
* Using Backtrack/Kali to
Activate VNC on Victim Machine .
- Conclusion Chapter 2: -
- Conclusion Chapter 2: -
* Website Penetration - Finding
vulnerability and hack it.
* Retrieve Website Database
with Sequel Injection First we have to understand how SQL injection works Going
on the mission for retrieving database from a vulnerable site.
* Cross Site Scripting Non
persistent.
* The persistent XSS to
extract cookie session from users.
* Or even administrators
Social Engeniring Facebook with the phishing Techinique What is phishing 1.
* Creating Phishing.php file
Some useful Chrome Extension.
- Conclusion Chapter 3: -
- Conclusion Chapter 3: -
* Denial of Service-Flooding
Things.
* What is Denial of Service
(Flooding)?.
* DDos Using notepad and
command prompt.
* Peforming DdoS using LOIC DdoS a IPV6 router using Kali.
- Conclusion
Chapter 4:
* Wireless Cracking-finding
WPA/WPA2 authentication Cracking Wi-fi password using Reaver Hack Wireless
password using Cain & Abel By-passing the mac address filter within a
wireless-router Even though we know the password we used, is right, this type
of network won’t allow us to connect (Because currently our mac address is not
registered).
* It will be like an endless
loop without authentication.
- Conclusion
Chapter 5:
* Android Weaponize the
Android and Infiltrate the Android Weaponizing ur Android Turn your Android
device into a pentesting tool Catching Wifi password in the Android Device.
* Using Metasploit to hack in
the Android Root Folder.
- Conclusion
Chapter 6:
* Lan Attack- Compromising
networks Using nmap to hack machines in the network.
* Raspberry Pi in the office.
- Conclusion
Chapter 7:
* Staying Anonymous: Using
the right VPN's Using Cyberhost to disappear for good Using the tor browser
Using ZenMate Setting the VPN for Kali to say cloaked Conclusion Shodan the
evil engine What exactly is shodan? Hacking an IP Camera using Shodan.
* Conclusion Build malicious
applications with python. Create Your own keylogger to monitor Victim Typings
Building a Portscanner Building a zip Password cracker in Python Take screen
shot Ready made Virus with C++ C++ Environmental Setup Creating ur first C++
Application Basic understanding of C++ code.
* Declaring Variables in C++
Changing and Comparing Variables If Statement Syntax Loops C++ virus to render
pc unbootable C++ virus crazy mouse and beeping. C++ block all
input .
DarkNetBooks
إرسال تعليق
0 تعليقات