Nội dung text A Hacker.pdf
A Hacker in A Hacking World: Penetrating any kinds of security Benjamin M. James Time Room Laugh as you go further down
©2016 Time Room. ALLRIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher
Chapter 1:Remote Access – Using Metaploit and planting backdoors. What is remote hacking? Gain full control on computer using Cobalt Strike Using Backtrack/Kali to gain full access to Machinne. Using Backtrack/Kali to Activate VNC on Victim Machine Conclusion Chapter 2: Website Penetration - Finding vulnerability and hack it. Retrieve Website Database with Sequel Injection First we have to understand how SQL injection works Going on the mission for retrieving database from a vulnerable site. Cross Site Scripting Non persistent. The persistent XSS to extract cookie session from users. Or even administrators Social Engeniring Facebook with the phishing Techinique What is phishing 1.Creating Phishing.php file: Some useful Chrome Extension Conclusion Chapter 3: Denial of Service-Flooding Things. What is Denial of Service (Flooding)? DDos Using notepad and command prompt. Peforming DdoS using LOIC DdoS a IPV6 router using Kali Conclusion Chapter 4: Wireless Cracking-finding WPA/WPA2 authentication Cracking Wi-fi password using Reaver Hack Wireless password using Cain & Abel By-passing the mac address filter within a wireless-router Even though we know the password we used, is right, this type of network won’t allow us to connect (Because currently our mac address is not registered). It will be like an endless loop without authentication.