hacking: guide to basic security, penetration testing and...

211

Upload: others

Post on 28-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 2: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Hacking:

GuideToBasic

Page 3: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Security,PenetrationTestingAndEverythingElseHacking

Page 4: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 5: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

TableofContents

Page 6: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Introduction

Chapter1:Hacking-AnOverview

Page 7: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter2:PenetrationTesting

Chapter3:Basic

Page 8: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

SecurityGuidelines

Chapter4:SecurityGuidelinesForOfficesandOrganizations

Page 9: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter5:FewGeneralTipsOfComputerSafety

Page 10: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Introduction

Page 11: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 12: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Intelligence agencies andsecurity services of manynations consider hacking oftheir computer systems and

Page 13: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

networks as the biggestnational threat. What wasonceconsideredasaharmlessprank played by computernerdshasnowevolvedintoacrime on par with any otherin terms of its repercussions.It isviewedatwith thesameseverityasterrorismbymanycountries and is condemnedby the world governments atlarge.

Page 14: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

In simple terms hacking isnothing but breaking intosomeone else's computer orsystem by circumventing thesafety measures and stealingthe information containedwithin, or worse, sabotagingtheentiresystem.

Page 15: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The roots of hacking can betracedback to the1960'sand70's when the "Yippies"movement was at its peak.Yippies were the membersand followers of YouthInternational Party, whichwasnothingbut aproductofthe anti-war movements ofthat time. The group was

Page 16: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

comprised mainly of youthsandwascounter-culturalatitsvery basic level. Theyengaged in carrying outelaborate street pranks andtaught its member thetechnique of tappingtelephonelines.

Page 17: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Thisgraduallydevelopedintowhat is now called hacking,except that the phone linesand pliers were replaced bystate of the art mega coreprocessorsandmultifunctionplasmascreens.

But over time, the goofy

Page 18: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

nature of the whole activityhastakenabackseatandthemore evil face hasmaterialized, hugely due tothe fact that, what was oncestarted by peace lovingactiviststopullpranksontheauthorities, is now beingincreasingly used by terroristorganizations for a multitudeof reasons such as spreadingtheir propaganda, obtainingfunding, gatheringintelligence about troop

Page 19: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

movements, to evenlaunchingmissiles.

In this eBook we shall lookinto various aspects ofhackingandprovideyouwithdetailed instructions forprotecting your homecomputer or laptop of office

Page 20: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

systems from this vilemenace of the World WideWeb.IwanttothankyoufordownloadingthiseBookandIhope you find the contentsuseful and easy to put intopractice.

Page 21: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 22: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter1:Hacking-AnOverview

Page 23: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 24: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

In this chapter we will giveyouageneralideaaboutwhathacking really is and thenmove on to look into the

Page 25: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

classification of differentkindsofhackers.

In its most elemental form,hackingcanbedefinedastheprocess of ascertaining andthesubsequentexploitationofthe various shortfalls andweaknesses in a computer

Page 26: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

system or a network of suchcomputer systems. Thisexploitation may take theform of accessing andstealing of information,altering the configuration,changing the structuralpicture of the computersystemandsoon.

Page 27: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The whole spectrum ofhackingisnotsomethingthatis found only in thedeveloped countries. In fact,withthekindofadvancementthathasbeenwitnessedinthefield of informationtechnology during the lasttwo decades, it should notcomeasasurprise thatmanyof the most tenaciouscommunities of hackers are

Page 28: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

based in the developingcountriesofSouthandSouth-EastAsia.

There is so much of smokescreen and ambiguity in theworld of hackers that it isextremelydifficulttopinpointa particular activity as

Page 29: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

hacking or not. Thisambiguityissomuchthatthevery term“hacker” issubjectto a lot of controversies. Insome contexts, the term isused to refer to any personwho has a command overcomputer systems andnetworks. Inothercontexts itisusedtorefertoacomputersecurityspecialistwhostrivestofindandplugtheloopholesin the system. They aresometimes called crackers.

Page 30: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Butmoreontheclassificationofhackersshallbedealtwithin detail in the later part ofthischapter.

Aplethoraofreasonsmaybebehind hacking. Some do itwith the very predictablereason of making money.

Page 31: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

They may steal and retrieveinformation from a computersystem, or plant incorrectinformation in return formonetary gains. Some othersdoitsimplyforthechallengeof the whole activity. Therush of doing something thatis prohibited, accessing whatis forbidden. And yet othersare computer worldequivalents of socialmiscreantswhomayaccessanetwork or system and

Page 32: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

scramble,therebyrenderingitutterlyuselessfortheusersofsuchnetwork.

Therearepeoplewhohackasystem as a sign of protestagainst the authority. Insteadof being vocal against thepolicies which they consider

Page 33: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

unreasonable, they burrowinto the technologicalnetwork systems employedby the authority and wreakhavoc.

Page 34: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Classification –Variouskinds

Based on their modusoperandi and the intention

Page 35: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

behind their actions, hackerscan be classified into thefollowingtypes;

Whitehathackers

Page 36: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Thetermwhitehatisusedtorefer to someone who hacksinto a computer system ornetwork for intentions thatare not malafide. They maydoasapartofaseriesoftestsperformed to check theefficacy of their securitysystems or as a part ofresearch and developmentthat is carried out by

Page 37: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

companies that manufacturecomputersecuritysoftware.

Also known as ethicalhackers, they carry outvulnerabilityassessmentsandpenetration tests (which shallbe explained in detail insubsequentchapters).

Page 38: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Blackhathackers

A black hat hacker, as thename suggests is the polar

Page 39: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

oppositeofawhitehathackerin terms of both intention aswell as methodology. Theyviolate a network formalafide intentions formonetaryandpersonalgains.They are the illegalcommunities who fit thecommonly perceivedstereotype of computercriminals.

Page 40: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

They gain access into asystem and steal or destroytheinformationormodifythesame. They may tweak theprograminsuchawaythatitis rendered useless for theintended users. When theynotice a weak spot orvulnerableareainthesystem,they take control of the

Page 41: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

systembywayof suchweakspot. They keep theproprietors, authorities andthegeneralpublicintheblindregarding such vulnerability.They do not make anyattempts to fix the lacunaeunless their reign faces athreatfromathirdparty.

Page 42: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Greyhathackers

A grey hat hacker has acuriousmixofbothblackhatandwhite hat characteristics.He trawls the internet andsniffs out network faults and

Page 43: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

hacks into the system. Hedoes so with the soleintention of demonstrating tothesystemadministratorsthattheir network has a defect interms of security. Oncehacked into the system, theymay offer to diagnose andrectify the defect for asuitableconsideration.

Page 44: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Bluehathackers

These are freelancers whooffer their expertise for hireto computer security firms.Before a new system is

Page 45: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

introduced in themarket, theservices of blue hats arecalled for, to check thesystem for any potentialweaknesses.

Elitehackers

Page 46: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

These are the crème de lacrème of the hackingcommunity. This is amarkerof social status used todemote the most proficienthackers. They are the firstones to break into aseemingly impenetrablesystemandwriteprogramstodo so. The elite status is

Page 47: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

usuallyconferredonthembythe hacking community towhichtheybelong.

Skiddie

Page 48: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The term "skiddie" is shortfor"ScriptKiddie".Thesearethe amateur level hackerswhomanagetobreakintoandaccesssystemsbymakinguseof programswritten by otherexpert level hackers. Theyhave littleornograspon theintricacies of the programwhichtheyuse.

Page 49: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Newbie

Newbies, as the namesuggests,arehackerswhoare

Page 50: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

beginners in the world ofhacking, with no priorexperience or knowledgebehind them. They hangaround at the fringe of thecommunitywiththeobjectoflearningtheropesofthetradefromtheirpeers.

Page 51: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Hacktivism

This is another version ofhacking, in which theindividual or the communitymakes use of their skills topromulgate any religious orsocial message through thesystems they hack into.Hacktivism can broadly be

Page 52: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

classified into two kinds-Cyber terrorism andRight toinformation. Cyber terrorismrefers to activities thatinvolve breaking into asystemwiththesoleintentionofdamagingordestroying it.Such hackers sabotage theoperations of the system andrenderituseless.

Page 53: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The hackers who belong tothe "Right to information"category operate with theintention of gatheringconfidentialinformationfromprivate and public sourcesand disseminate the same onthepublicdomain.

Page 54: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Intelligenceagencies

Intelligence agencies andanti-cyber terrorismdepartments of variouscountries also engage in

Page 55: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

hackinginordertoprotectthestate interests and tosafeguard their nationalsystems against any foreignthreats.Thoughthiscannotbeconsidered as hacking in thetrue sense of the term, suchagencies engage the servicesof blue hat hackers as a sortofdefensestrategy.

Page 56: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Organizedcrime

This can be construed as akindofconglomerateofblackhat hackers working for acommon goal or under a

Page 57: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

leadership. They access thesystems of governmentauthorities and privateorganizations to aid thecriminal objectives of thegangtowhichtheybelongto.

Page 58: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter 2:PenetrationTesting

Page 59: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 60: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

When the world becameawareofthemagnitudeofthethreat posed by hacking,various security measures

Page 61: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

were invented by computerexperts and securityspecialists. One of the mostprominent among suchmeasuresistheprocesscalledpenetration testing. In thischapterweshalllookintothisconcept in detail and thevarious reasons forundertakingthistesting.

Page 62: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 63: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Whatisit?

Penetration testing is theprocess whereby a deliberateattack is mounted on acomputersystem,inwhichits

Page 64: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

weakspotsarenoted,andthedata stored in it is accessed.The intention is todemonstrate and therebyascertaintheefficiencyofthesecurity safeguards installedinthesystem.

The primary objective of

Page 65: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

penetration testing is to findout the vulnerable areas in asystem and fix them beforeany external threatcompromises them. The keyareas to be tested in anypenetration testing are thesoftware,hardware,computernetworkandtheprocess.

Page 66: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The testingcanbedonebothin an automatedway aswellas manually. The automatedmethod makes use ofsoftware and programs thatthe penetration tester hascomposed,whicharethenrunthrough the system andnetwork. However it is notpossible to find out allvulnerabilities solely throughpenetrationtesting.

Page 67: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

This is when the manualtestingcomesin.Forinstancethevulnerabilitiesinasystemdue to human errors, lack ofemployee security standards,design flaws or faultyemployee privileges can bediagnosed better by way ofmanualpenetrationtesting.

Page 68: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Besides the automated andmanual methods ofpenetration testing, there is athird variety which isbasically a combination ofboth automated and manualsystems.This formof testingis more comprehensive intermsofareaofcoverageandhenceitisusedcommonlyto

Page 69: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

identify all possibilities ofsecuritybreaches.

This is inmanywayssimilarto the concept called"business process re-engineering"and isusedasamanagement planning anddecision making tool. The

Page 70: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

processofpenetration testinginvolves execution of thefollowingsteps:-

•Identificationof thenetworkand inparticular,

Page 71: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

thesystemonwhich thetesting isto becarriedout.

•Fixing

Page 72: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

of targetsand goal.Here, acleardemarcationis madebetweenbreakinginto asystem toprove itsfaults asagainstbreaking

Page 73: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

into andretrievinginformationcontainedin thesystem.

•Gatheringinformation

Page 74: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

pertainingto thestructureof thesystem ornetwork.

•Reviewingthe

Page 75: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

informationthat hasbeencollectedandbasedon suchdata,chartingoutaplanof actionto beadopted.Multiplecoursesof

Page 76: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

actionmay beoutlinedand themostsuitableone isselected.

Page 77: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

•Implementationof themostappropriatecourse ofaction.

Thereare twobroadkindsofpenetrationtests.Itmaybein

Page 78: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

the form of a "White Box"testora "BlackBox" test. Incase of a white box test, thecompany or organizationenlists the services of anagency or individual to carryout the penetration tests, andprovides them with allinformation with respect tothe structure of the systemanditsbackground.

Page 79: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The party carrying out thetests need not do anygroundwork for collection ofinformation. On the otherhand, where the penetrationtest is of the black boxvariety, very little or inmostcases, no backgroundinformationisprovidedtotheagency except the name of

Page 80: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

theorganizationforwhichthetestisbeingdone.

Once the penetration test issuccessfully completed, thesystem administrator orowner is briefed about theweaknessesinthesystemthathascometoforeasaresultof

Page 81: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

the test. The test reportshould list out in detail theweakspotsasobservedinthetest, the severity of suchflaws,theshorttermandlongterm impact on the systemand its contents and finallythe methods to fix suchshortcomings.

Page 82: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Various strategiesemployed

Page 83: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The following are the mostcommonly adopted strategiesofpenetrationtesting:

Page 84: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Targetedtest

In this form of penetrationtesting, the procedure isperformed by theorganization's in-housesecurity department. Theymay call for the help ofexternal agencies but thedecision making and

Page 85: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

implementation powers restwith the organization itself.Oneofthemostcharacteristicfeatures of this form ofpenetration testing is thatemployeesintheorganizationare kept in the loop and areawareofthetests.

Page 86: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Externalapproach

This form of penetrationtesting is carried outexclusively on those devicesand servers of theorganization that are visibleto outsiders, for instance thee-mail servers, domain nameservers etc. The intention of

Page 87: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

performing a penetration testwith the external approach isto ascertain whether anyoutsider can attack theabovementioned devices andincaseofsuchanattack, therepercussionsofthesame.

Page 88: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Internalapproach

Thisistheexactoppositeofatest as per the externalapproach. Here the intentionis to mimic the situationwhere the system is underattack from inside bysomeone who has high levelaccess and privileges. The

Page 89: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

testcanestablishtheextentofdamagesthatcanbecausesintheeventofsuchanattack.

Blackboxtest

Page 90: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

The basic principle behind ablack box test has beenmentioned in the earlier partofthischapter.Theagencyorindividual carrying out thepenetration test is given verylittle information about theorganization or its systemsafeguards. This form oftesting is very time andresource intensive because

Page 91: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

the agency has to start fromscratch and undertake thecompleteprocessofgatheringinformation, planning andexecution.

Advanced black box

Page 92: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

test

Asisobviousfromthename,this isahigher levelofblackbox test. The majordifferentiating factor is thequantumofpeople inside theorganization who are awareof the penetration test beingcarried out. In case of a

Page 93: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

normal black box test,although only a limitedamount of information isprovided to the testingagency, almost all themanagerial level employeesof theorganizationareawareofthetestsbeingcarriedout.However in case of anadvancedblackboxtest,onlya few people in the topmanagement of the companywill be aware of the testsbeingconducted.

Page 94: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 95: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter 3: BasicSecurityGuidelines

Page 96: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 97: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Nowthatyouhavehadalookatwhatexactlyhackingis,weshall go ahead and line outsomebasicguidelinesforyou

Page 98: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

toprotectyoursystemandtheinformation contained in itfrom an external threat. Thisis compilation of the mostpracticalmethods devised bycomputer security specialiststhat you can follow to avoidyour machine from beingattacked and ravaged by theomnipresent threat ofhacking.

Page 99: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 100: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

UpdateyourOperatingSystem

Thesimpletruthisthatallthedifferentversionsofeventhe

Page 101: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

bestof theoperating systemshave succumbed to hacking.Havingsaidthat,thesimplestway to protect your systemwould be to keep updatingyour operating system on aweeklyormonthlybasisorasand when a new andimproved version comesalong.This drastically bringsdowntheriskofyoursystemplayinghosttoviruses.

Page 102: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 103: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Updateyoursoftware

Please understand that thereis a reason why softwaredevelopers bring out newerversions of their product

Page 104: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

every once in a while.Besides providing betterefficiency and convenience,they also have better in-builtsecurityfeatures.Thereforeitis highly imperative for youto make sure that yourapplications, browsers andprogramsallstayupdated.

Page 105: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Anti-Virus

The importance of havinggood and effective anti-virussoftware in your system cannever be stressed enough.

Page 106: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

This is more so when yoursystemisalwaysconnectedtothe internet. There are manyanti-virus software availablein the market with varyingdegrees of efficiency. Theymay be both free as well aspaid and we would alwaysrecommendyoutogofor thelatter. And if you think thatjust installing one in yoursystem is good enough, thenyou are mistaken. The anti-virussoftware, likeanyother

Page 107: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

software requires frequentupdatingfor itsdefinitions toremaineffective.

Page 108: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Anti-Spyware

Anti-spywaresoftwareareasimportantasanti-virusforthevery same reasons.And heretoo,youhavealotofoptions

Page 109: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

tochoosefrom.Somakesurethatyoupickonethatisratedhighenough.

Page 110: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

GoforMacintosh

Nowthisisatrickyone.Youmayhavereadit incountlesscomparisons and onnumerous blogs that

Page 111: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Macintosh operating systemsare the least secure ones outthere, especially when pittedagainst the vastly morepopular Windows operatingsystems. But here, the verypopularityofWindowsworksagainst it. Don't get it?Wellhere is the thing, Very fewhackers target Macintoshsystems because of the factthatalargemajorityofpeopledonotuseit.Takeadvantageof this and switch to

Page 112: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Macintoshoperatingsystems.And do not forget the factthat there is no operatingsystem in theworldwhich iscompletelyhack-proof.

Page 113: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Avoidshadysites

Would you walk into a darkalley on the secluded part ofthe street at night, wearingexpensive jewelry? You

Page 114: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

wouldn't. Similarly, be waryof dubious websites thatparade as reputed ones.Alsoavoid visiting porn sites,gaming websites and sitespromising free music andmovie downloads. Thesewebsites are frequentlytracked by hackers andanything you view ordownload from these sitesmay contain malware thatmayharmyourcomputerandcompromiseitssecurity.

Page 115: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 116: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Firewall

If there are more than onecomputer systems operatingunder one network, it ishighly advisable to install

Page 117: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

software that provides asecurity firewall. Otherwisemake sure that the in-builtfirewall in your Windows isactivated. This feature iscomes in all versions ofWindows starting from theXPtothelatestversion.

Page 118: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Spam

Never ever open mails thatlook suspicious. Especiallythe ones that haveattachments. All the

Page 119: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

mainstream e-mail websitesprovide a certain amount ofprotection against suchspurious mails bystraightawaymoving them tothe spam box when youreceive them. However theremaybemailsthatgetpastthefilters of your e-mail serverand that iswhenyouhave toexercise caution. Do notattempt to readsuchmailsordownloadthecontents.

Page 120: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 121: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Back-upoptions

Whether it is your homecomputer or the system atwork, always create a back-up of the data that you store

Page 122: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

in it. Youmay be having allsorts of important andconfidential information suchas financial information,personal files and workrelated documents saved inyour system. In that case,makesure thatyou transferacopy of everything into anexternal source such as astandaloneharddiskorsomeothersimilardeviceorserver.Remember single potentmalicious software may

Page 123: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

completely scramble yourdataandmakeitirretrievable.Andmerelyhavingaback-upoption is not good enough ifyoudonotutilizeit.Performaback-uptransferasoftenaspossible,at leastoncein4to5days.

Page 124: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Passwords

We have kept the mostimportant aspect to the last.The significance of having asecurepasswordcanneverbe

Page 125: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

underminedenough.Beitforyourdocuments,fore-mailoreven your secure server, agoodenoughpassword is thefirst and quite often the lastline of defense against anyexternal threats. There aresome golden rules whenpicking a password. Do notmake your bank accountnumber,telephonenumberorcar registration number asyourpassword.Similarlyitisabignowhenitcomestothe

Page 126: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

names of your familymembers.

Do not adopt any dates suchasbirthdaysandanniversariesas passwords. In short, whenit comes to adopting apassword do not takepredictable words or

Page 127: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

numerals.As far as possible,make it a combination ofjumbled alphabets andnumbersthatdonotbearanyimportance to you on apersonalorprofessionalfront.And a golden rule when itcomestopasswordsecurityisthat, never write down yourpassword anywhere, be ityour personal diary or at theback of the telephone index.Thesamegoesforsavingitinyourcellphone.

Page 128: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 129: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter 4: SecurityGuidelines ForOffices AndOrganizations

Page 130: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 131: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Thethreatofhackingisanallpervasive one and the bigscale corporations andorganizations are equally

Page 132: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

affected by it. This isespecially so in the case ofbanks and financialinstitutions where a hugequantum of personal andfinancial information of theclientele is stored. An attackon such networks can wreakhavoc of scale beyondimagination. In this chapterwe shall deal with howoffices and organizations cantake precautionary measuresto avoid such instances and

Page 133: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

neutralize an external threattotheircomputernetwork.

Page 134: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Safeguardthepointsofentry

Thefirstandforemoststepisto identify and mark out the

Page 135: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

points of entry between theinternet and organization'snetwork. This is not as easyas it sounds. There will benumerous interfaces wherethe internal network isexposed to the internet andthese need to be monitoredbecause any external attackon the network can onlyoriginate from these points.Once these entry points areidentified, steps should betaken toensure that theseare

Page 136: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

wellprotected.

Page 137: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Diagnostictests

Various diagnostic tests canbe run on the network toascertain the points ofweakness. These tests must

Page 138: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

be run keeping inconsiderationthefactthatthethreatcanemanatefrombothexternal as well as internalsources. The results of thetests will provide a clearpicture as to where theorganization is lacking interms network security. Thefaulty lines can then beaddressedbypatchingup thelacunaeorbyaddinganextralayer of security or byeliminating such faulty areas

Page 139: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

completely. The diagnostictestsshouldberunonregularintervalsbasedonthelevelofexposuretoexternalsources.

Page 140: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Firewallconfiguration

Merely having a firewallsystem installed in your

Page 141: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

network is not enough. Thefirewallshouldbeconfiguredinsuchawaythatitisawareof the nature of threat thatyour network can face. Itshould be able to let throughsuchcommunicationwhichisrelevant and conducive andblock traffic that appears tobe having malafideintentions. The configurationmust be in tandem with thesecurity requirement of thenetwork and should

Page 142: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

complementitsfunctionality.

Page 143: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Passwordpolicies

As mentioned in the earlierchapter, passwords are anintegral part of any networkof computer systems. They

Page 144: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

are one of themain areas ofhuman-machine interface. Incaseofalargecorporationororganization, where are alarge number of employees,the risks of the networkcoming under attack alsoincreasing manifold. In suchlarge scale operations, thenetwork administrator shoulddevise properly outlinedpolicies for generation,alteration and periodicalchange of passwords. The

Page 145: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

passwords shouldmandatorily consist ofalphabets, characters andnumbers.Theyshouldhaveaminimum length of seven toeight characters and shouldbeinajumbledfashion.

Strict guidelines should be

Page 146: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

introduced with respect tosharing of passwords orproviding authentication to aperson other than to whomthepasswordisissued.Inthehigher levels of theorganization, the nature ofdata accessible is of a moreconfidential variety, bothqualitatively andquantitatively. In suchsituations non-disclosureagreements may be put inplacebindingthehigherlevel

Page 147: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

managerialstaff.

Anotherkey step tobe takenis to introduce a systemwhere the passwords areautomatically changed everytwoweeksandfreshonesaregeneratedinitsplace.

Page 148: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 149: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Bio-metricscanners

It is a given fact that nomatter how many safetymeasuresyouinstallinplace,when it comes to passwords,

Page 150: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

the threats can never becompletely ruled out. Manycomputer security specialistsbelieve that the best way todeal with this situation is tominimize the use of thepasswords and in their place,establish other forms ofemployee specific securitymeasuressuchassmartcardstoaccessindividualcomputersystems and finger printscanners and retinal scannersto gain entry into server

Page 151: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

rooms, data storage roomsetc. These devices are not asprone to breaches aspasswords due to the simplefact that a second partycannotimpersonatetheactualuserandenterthesystem.

Page 152: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Anti-virusandanti-spywaresoftware

The basics of safeguardingagainst malicious virus

Page 153: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

attacks and spyware are thesame when it comes to apersonal laptop or a largenetworkofsystems.Itisonlythe scale of operations thatdiffer. In case of largeorganizations, efficient anti-virus and anti-spywaresoftwarehavingawideambitof operations must beinstalled. The software mustbe able to tackle threats of awide variety from simplereconnaissancebugstoall-out

Page 154: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

hacking codes. In addition todetection of viruses, it mustalso be capable ofquarantining infected filesand keeping them isolatedfromtheotherfiles.

Page 155: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Physicalsecurityofthepremises

When it comes to computersecurity and protection

Page 156: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

against hacking, corporationstendtoignoretheverysimplefact that unless the officepremises are properlyguarded and secured at alltimes, all the internalsoftware security measuresshallbeinvain.Ifthesystemis exposed to threats frominside due to lack of properhardware security, thenetwork can be easilybreached.

Page 157: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

There should be continuousmonitoring of people whohave access to computersanywhereintheorganization.The inflow and outflow ofpeople into the premisesshould be recorded anddocumented. Care should betaken to ensure that, visitorsshouldnotbeallowedaccess

Page 158: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

to computer systems underany circumstances. And last,it should be ensured that theoffice premises are underroundtheclocksecurity.

Page 159: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Awarenesscampaigns

All the precautions taken bythe organization and the

Page 160: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

safety measures andprocedures set in place shallnot prove to be effectiveunless the employees, rightfrom the high level ones tothelowlevelmaintenanceareaware of the gravity of thethreat posed by hacking,viruses and other maliciousactivities.Employeesfromalllevels of security clearancesmust be aware of theimportance of secured andbreachfreesystemsand their

Page 161: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

roleinensuringthesame.

Awareness campaigns anddrills must be held on aregular basis, where theemployees are trained on thebasicsecuritymeasures tobeobservedandabidedbythem.They should be acquainted

Page 162: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

with the anti-virus and anti-spywaresoftwareinstalledbythe organization. And morethaneverything,asaresultofthe campaigns, they shouldrealize that they all play animportantpartinmakingsurethat theirsystemsand in turnthe network does not comeunder the threat of beinghacked.

Page 163: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 164: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter 5: FewGeneral Tips OfComputerSafety

Page 165: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 166: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Bynowyoumustbehavingafair idea about the variousfacets of hacking and theguidelines for ensuring basic

Page 167: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

safety to your personalcomputers and also to largescale, computer networks.Given below are somegeneraltipsthatyoucankeepinmind to avoid fallingpreytothethreatofhacking.

Page 168: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢Neveropenmailsfromunknownsourcesand moreimportantly,do notever

Page 169: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

downloadtheattachmentsto yoursystem.

➢Alwaysengage insafe

Page 170: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

browsing.Avoidvisitingwebsitesthat yoususpectofhavingmalware.

Page 171: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢Wheninstallinga newprogram,makesurethat theoldprogramiscompletelyuninstalledbeforeyoubegininstalling

Page 172: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

the filespertainingto thenewone.

➢Withrespect towhateverprograms

Page 173: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

andsoftwareyou havein yoursystem,ensurethat theyareupdatedto thelatestversionpossible.

Page 174: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢ Ifyou areone ofthosework-at-homeprofessionals,do nothesitatetoenlist the

Page 175: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

servicesof aprofessionalfirm ofcomputersecurityexperts tokeepyoursystemandnetworkwellguarded.

Page 176: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢ Donot replyto chatroominvitationsandmessagesfrompeoplewhom

Page 177: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

you don'tknow orwhoseauthenticityyoususpect.

➢Alwayskeep a

Page 178: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

back upof yourfiles andinformationin aseparateexternalsourcethat iskeptsecure.

Page 179: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢Manycomputersecurityexpertsbelievethatwhilebrowsingtheinternet,itisbetter

Page 180: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

to useMozillaFirefoxbrowserthanInternetExplorer.Firefoxprovidesbetterinbuiltsecurityfeaturesthanother

Page 181: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

browsers.

➢Deactivatefeaturessuch asJava,Active Xetc inyour

Page 182: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

browser,when notinuse.

➢ Asmentionedearlier inthis book,shift to

Page 183: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

operatingsystemslikeMacintoshor Linuxif you arecomfortablewith theiroperation.Theincidenceofhackingin

Page 184: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

computersusingtheseoperatingsystemsisvery lesscomparedto thevastlymorepopularWindows.

Page 185: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

➢ Thelast andoftenoverlookedtip - turnoff yourcomputerwhen notinuse.Donot keep

Page 186: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

yourcomputerin sleepmode andleaveyourworkstationfor morethantwentyminutes.It isimpossibleto hack

Page 187: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

into asystemwhich isnotswitchedon.

Page 188: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 189: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Conclusion

Page 190: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 191: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

By now you must having agoodideaaboutwhathackingis and what will be theconsequences if your system

Page 192: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

is attacked by an external orinternal party. But fear not,simplyfollowtheinstructionsand guidelines provided inthisbookandyoucanberestassured that your system iswellprotected.

Although we have explained

Page 193: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

alltheconceptshereinaverylucid and comprehensiblefashion, putting themall intopracticemay sometimes be abit tough.Donot think twicebefore seeking help fromprofessional securityspecialists if you feel all thisisabittootechnicalforyou.

Page 194: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

And please note that theworldofcomputersisaneverchanging and advancing one.The more advanced thehackers become, the moreeffective should be yourdefensive mechanisms.Always keep your softwareandsystemupdated.

Page 195: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Thank you again fordownloadingthiseBookandIhope you enjoyed theinformationshared.

Page 196: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 197: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 198: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 199: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 200: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Free Bonus Video:TopHackerShoesUsHowItsDone

Page 201: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Here is a great video,showing how almostevery secure networkis vulnerable from atophacker.

Page 202: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Bonus Video:https://www.youtube.com/watch?v=hqKafI7Amd8

Page 203: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 205: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Design-Development-Made-Simple-ebook/dp/B00UEMM5X4/ref=sr_1_9?s=digital-text&ie=UTF8&qid=1427558209&sr=1-9&keywords=apps

Page 206: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 207: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 208: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 209: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice
Page 210: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

TableofContents

IntroductionChapter 1: Hacking - AnOverview

Chapter 2: PenetrationTesting

Chapter 3: Basic SecurityGuidelines

Chapter 4: SecurityGuidelinesForOfficesAndOrganizations

Page 211: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice

Chapter5:FewGeneralTipsOfComputerSafety

Conclusion