eden_guide_to_hacking
eden_guide_to_hacking copied to clipboard
its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker
read as eBook @ abhishekkr.github.io/eden_guide_to_hacking
.oPYo. 8 .oPYo. o 8 ooooo
8. 8 8 8 8 8
`boo .oPYo8 .oPYo. odYo. 8 o o o8 .oPYo8 .oPYo. 8 .oPYo.
.P 8 8 8oooo8 8' `8 8 oo 8 8 8 8 8 8oooo8 8 8 8
8 8 8 8. 8 8 8 8 8 8 8 8 8 8. 8 8 8
`YooP' `YooP' `Yooo' 8 8 `YooP8 `YooP' 8 `YooP' `Yooo' 8 `YooP'
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::
o o 8 o [[ Eden Guide To Hacking ]]
8 8 8
o8oooo8 .oPYo. .oPYo. 8 .o o8 odYo. .oPYo. a Bootstrap Guide to Hacking
8 8 .oooo8 8 ' 8oP' 8 8' `8 8 8 Practices in a major & short
8 8 8 8 8 . 8 `b. 8 8 8 8 8 to read style...
8 8 `YooP8 `YooP' 8 `o. 8 8 8 `YooP8 the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8 instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'. and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
~=ABK=~ (AbhishekKr) aBionic
http://www.twitter.com/aBionic
Eden Guide to Hacking
part.0* Fundamentals
chapter.0* Defining
- article.0* Hacking, Hacker and Security
- article.1* Hacking and Hacker's Class
- article.2* Hacking and Ethical Hacking
- article.3* Hacking, Crime and Law
- article.4* Hacking and Hacker's Aim
chapter.1* Skills Required
- article.0* Computer Skills
- article.1* Social Skill
- article.2* Mental Skills
chapter.2* Hacking Philosophy
- article.0* Circle of Hacking
- article.1* Art of Hacking
part.1* Hacking Cycle
chapter.3* Acquire Target
- article.0* Pre-Contract
- article.1* Post-Contract
chapter.4* Reconnaissance
section.0* Passive-Recon
- article.0* Open Intelligence Gathering
- article.1* Meta Information Filtering
section.1* Active-Recon
- article.2* Social Engineering
- article.3* Eavesdropping
- article.4* Shoulder Surfing
- article.5* Dumpster Diving
section.2* Information
- article.6* Network-Level
- article.7* Application-Level
- article.8* User-Level
- article.9* Required To Be Social
chapter.5* Scanning
section.0* Network Scanners
- article.0* General
- article.1* Service-Specific
section.1* Application Scanners
- article.2* Web Scanners
- article.3* Database Scanners
chapter.6* Vulnerabilities Profiling
- article.0* Vulnerable Devices
- article.1* User References
- article.2* Processing Vulnerability Profile
chapter.7* Exploitation
- article.0* Own it like a Romeo
- article.1* The Sherlock Holmes Way
- article.2* Psychiatric Analysis
- article.3* Trap to Trip
- article.4* Bot-Blood-Bath
chapter.8* System Puppet-izing
- article.0* Tame The Rate
- article.1* Erase Finger-prints
- article.2* Suicide Bomber
- article.3* Moody Mobster
chapter.9* Reporting
- article.0* WTTW ~ Whom To Tell What
- article.1* How To Tell
- article.2* Make Sure of it.
part.2* Hacking Toolset
chapter.10* Software Armour
- article.0* O.S. Distros
- article.1* Recon-tools
- article.2* Scanners
- article.3* Attack Tools
- article.4* Forensic Tools
- article.5* More on it
chapter.11* Software Target
- article.0* Network Emulations
- article.1* Weak Web Application
- article.2* Test Anything
part.3* Attack Case Studies
chapter.12* SSL Defeating Attacks
chapter.13* WiFi Attack
chapter.14* VoIP Attack
chapter.15* Web Javascript-Based Attack
chapter.16* Web SQL-Injection Attack
chapter.17* SMB Attack
chapter.18* Phishing Attack
part.4* Being A Hacker
chapter.19* How to Remain A Hacker?
- article.0* Being Aware
- article.0* Being Curious
- article.0* Being Secured
- article.0* Being Contributor
- article.0* Being Human