Hacking: Guide to Basic Security, Penetration Testing and...

211

Transcript of Hacking: Guide to Basic Security, Penetration Testing and...

Page 1: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 2: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Hacking:

GuideToBasic

Page 3: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Security,PenetrationTestingAndEverythingElseHacking

Page 4: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 5: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

TableofContents

Page 6: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Introduction

Chapter1:Hacking-AnOverview

Page 7: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter2:PenetrationTesting

Chapter3:Basic

Page 8: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

SecurityGuidelines

Chapter4:SecurityGuidelinesForOfficesandOrganizations

Page 9: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter5:FewGeneralTipsOfComputerSafety

Page 10: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Introduction

Page 11: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 12: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Intelligence agencies andsecurity services of manynations consider hacking oftheir computer systems and

Page 13: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

networks as the biggestnational threat. What wasonceconsideredasaharmlessprank played by computernerdshasnowevolvedintoacrime on par with any otherin terms of its repercussions.It isviewedatwith thesameseverityasterrorismbymanycountries and is condemnedby the world governments atlarge.

Page 14: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

In simple terms hacking isnothing but breaking intosomeone else's computer orsystem by circumventing thesafety measures and stealingthe information containedwithin, or worse, sabotagingtheentiresystem.

Page 15: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The roots of hacking can betracedback to the1960'sand70's when the "Yippies"movement was at its peak.Yippies were the membersand followers of YouthInternational Party, whichwasnothingbut aproductofthe anti-war movements ofthat time. The group was

Page 16: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

comprised mainly of youthsandwascounter-culturalatitsvery basic level. Theyengaged in carrying outelaborate street pranks andtaught its member thetechnique of tappingtelephonelines.

Page 17: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Thisgraduallydevelopedintowhat is now called hacking,except that the phone linesand pliers were replaced bystate of the art mega coreprocessorsandmultifunctionplasmascreens.

But over time, the goofy

Page 18: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

nature of the whole activityhastakenabackseatandthemore evil face hasmaterialized, hugely due tothe fact that, what was oncestarted by peace lovingactiviststopullpranksontheauthorities, is now beingincreasingly used by terroristorganizations for a multitudeof reasons such as spreadingtheir propaganda, obtainingfunding, gatheringintelligence about troop

Page 19: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

movements, to evenlaunchingmissiles.

In this eBook we shall lookinto various aspects ofhackingandprovideyouwithdetailed instructions forprotecting your homecomputer or laptop of office

Page 20: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

systems from this vilemenace of the World WideWeb.IwanttothankyoufordownloadingthiseBookandIhope you find the contentsuseful and easy to put intopractice.

Page 21: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 22: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter1:Hacking-AnOverview

Page 23: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 24: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

In this chapter we will giveyouageneralideaaboutwhathacking really is and thenmove on to look into the

Page 25: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

classification of differentkindsofhackers.

In its most elemental form,hackingcanbedefinedastheprocess of ascertaining andthesubsequentexploitationofthe various shortfalls andweaknesses in a computer

Page 26: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

system or a network of suchcomputer systems. Thisexploitation may take theform of accessing andstealing of information,altering the configuration,changing the structuralpicture of the computersystemandsoon.

Page 27: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The whole spectrum ofhackingisnotsomethingthatis found only in thedeveloped countries. In fact,withthekindofadvancementthathasbeenwitnessedinthefield of informationtechnology during the lasttwo decades, it should notcomeasasurprise thatmanyof the most tenaciouscommunities of hackers are

Page 28: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

based in the developingcountriesofSouthandSouth-EastAsia.

There is so much of smokescreen and ambiguity in theworld of hackers that it isextremelydifficulttopinpointa particular activity as

Page 29: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

hacking or not. Thisambiguityissomuchthatthevery term“hacker” issubjectto a lot of controversies. Insome contexts, the term isused to refer to any personwho has a command overcomputer systems andnetworks. Inothercontexts itisusedtorefertoacomputersecurityspecialistwhostrivestofindandplugtheloopholesin the system. They aresometimes called crackers.

Page 30: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Butmoreontheclassificationofhackersshallbedealtwithin detail in the later part ofthischapter.

Aplethoraofreasonsmaybebehind hacking. Some do itwith the very predictablereason of making money.

Page 31: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

They may steal and retrieveinformation from a computersystem, or plant incorrectinformation in return formonetary gains. Some othersdoitsimplyforthechallengeof the whole activity. Therush of doing something thatis prohibited, accessing whatis forbidden. And yet othersare computer worldequivalents of socialmiscreantswhomayaccessanetwork or system and

Page 32: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

scramble,therebyrenderingitutterlyuselessfortheusersofsuchnetwork.

Therearepeoplewhohackasystem as a sign of protestagainst the authority. Insteadof being vocal against thepolicies which they consider

Page 33: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

unreasonable, they burrowinto the technologicalnetwork systems employedby the authority and wreakhavoc.

Page 34: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Classification –Variouskinds

Based on their modusoperandi and the intention

Page 35: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

behind their actions, hackerscan be classified into thefollowingtypes;

Whitehathackers

Page 36: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Thetermwhitehatisusedtorefer to someone who hacksinto a computer system ornetwork for intentions thatare not malafide. They maydoasapartofaseriesoftestsperformed to check theefficacy of their securitysystems or as a part ofresearch and developmentthat is carried out by

Page 37: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

companies that manufacturecomputersecuritysoftware.

Also known as ethicalhackers, they carry outvulnerabilityassessmentsandpenetration tests (which shallbe explained in detail insubsequentchapters).

Page 38: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Blackhathackers

A black hat hacker, as thename suggests is the polar

Page 39: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

oppositeofawhitehathackerin terms of both intention aswell as methodology. Theyviolate a network formalafide intentions formonetaryandpersonalgains.They are the illegalcommunities who fit thecommonly perceivedstereotype of computercriminals.

Page 40: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

They gain access into asystem and steal or destroytheinformationormodifythesame. They may tweak theprograminsuchawaythatitis rendered useless for theintended users. When theynotice a weak spot orvulnerableareainthesystem,they take control of the

Page 41: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

systembywayof suchweakspot. They keep theproprietors, authorities andthegeneralpublicintheblindregarding such vulnerability.They do not make anyattempts to fix the lacunaeunless their reign faces athreatfromathirdparty.

Page 42: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Greyhathackers

A grey hat hacker has acuriousmixofbothblackhatandwhite hat characteristics.He trawls the internet andsniffs out network faults and

Page 43: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

hacks into the system. Hedoes so with the soleintention of demonstrating tothesystemadministratorsthattheir network has a defect interms of security. Oncehacked into the system, theymay offer to diagnose andrectify the defect for asuitableconsideration.

Page 44: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Bluehathackers

These are freelancers whooffer their expertise for hireto computer security firms.Before a new system is

Page 45: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

introduced in themarket, theservices of blue hats arecalled for, to check thesystem for any potentialweaknesses.

Elitehackers

Page 46: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

These are the crème de lacrème of the hackingcommunity. This is amarkerof social status used todemote the most proficienthackers. They are the firstones to break into aseemingly impenetrablesystemandwriteprogramstodo so. The elite status is

Page 47: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

usuallyconferredonthembythe hacking community towhichtheybelong.

Skiddie

Page 48: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The term "skiddie" is shortfor"ScriptKiddie".Thesearethe amateur level hackerswhomanagetobreakintoandaccesssystemsbymakinguseof programswritten by otherexpert level hackers. Theyhave littleornograspon theintricacies of the programwhichtheyuse.

Page 49: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Newbie

Newbies, as the namesuggests,arehackerswhoare

Page 50: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

beginners in the world ofhacking, with no priorexperience or knowledgebehind them. They hangaround at the fringe of thecommunitywiththeobjectoflearningtheropesofthetradefromtheirpeers.

Page 51: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Hacktivism

This is another version ofhacking, in which theindividual or the communitymakes use of their skills topromulgate any religious orsocial message through thesystems they hack into.Hacktivism can broadly be

Page 52: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

classified into two kinds-Cyber terrorism andRight toinformation. Cyber terrorismrefers to activities thatinvolve breaking into asystemwiththesoleintentionofdamagingordestroying it.Such hackers sabotage theoperations of the system andrenderituseless.

Page 53: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The hackers who belong tothe "Right to information"category operate with theintention of gatheringconfidentialinformationfromprivate and public sourcesand disseminate the same onthepublicdomain.

Page 54: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Intelligenceagencies

Intelligence agencies andanti-cyber terrorismdepartments of variouscountries also engage in

Page 55: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

hackinginordertoprotectthestate interests and tosafeguard their nationalsystems against any foreignthreats.Thoughthiscannotbeconsidered as hacking in thetrue sense of the term, suchagencies engage the servicesof blue hat hackers as a sortofdefensestrategy.

Page 56: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Organizedcrime

This can be construed as akindofconglomerateofblackhat hackers working for acommon goal or under a

Page 57: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

leadership. They access thesystems of governmentauthorities and privateorganizations to aid thecriminal objectives of thegangtowhichtheybelongto.

Page 58: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter 2:PenetrationTesting

Page 59: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 60: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

When the world becameawareofthemagnitudeofthethreat posed by hacking,various security measures

Page 61: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

were invented by computerexperts and securityspecialists. One of the mostprominent among suchmeasuresistheprocesscalledpenetration testing. In thischapterweshalllookintothisconcept in detail and thevarious reasons forundertakingthistesting.

Page 62: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 63: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Whatisit?

Penetration testing is theprocess whereby a deliberateattack is mounted on acomputersystem,inwhichits

Page 64: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

weakspotsarenoted,andthedata stored in it is accessed.The intention is todemonstrate and therebyascertaintheefficiencyofthesecurity safeguards installedinthesystem.

The primary objective of

Page 65: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

penetration testing is to findout the vulnerable areas in asystem and fix them beforeany external threatcompromises them. The keyareas to be tested in anypenetration testing are thesoftware,hardware,computernetworkandtheprocess.

Page 66: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The testingcanbedonebothin an automatedway aswellas manually. The automatedmethod makes use ofsoftware and programs thatthe penetration tester hascomposed,whicharethenrunthrough the system andnetwork. However it is notpossible to find out allvulnerabilities solely throughpenetrationtesting.

Page 67: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

This is when the manualtestingcomesin.Forinstancethevulnerabilitiesinasystemdue to human errors, lack ofemployee security standards,design flaws or faultyemployee privileges can bediagnosed better by way ofmanualpenetrationtesting.

Page 68: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Besides the automated andmanual methods ofpenetration testing, there is athird variety which isbasically a combination ofboth automated and manualsystems.This formof testingis more comprehensive intermsofareaofcoverageandhenceitisusedcommonlyto

Page 69: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

identify all possibilities ofsecuritybreaches.

This is inmanywayssimilarto the concept called"business process re-engineering"and isusedasamanagement planning anddecision making tool. The

Page 70: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

processofpenetration testinginvolves execution of thefollowingsteps:-

•Identificationof thenetworkand inparticular,

Page 71: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

thesystemonwhich thetesting isto becarriedout.

•Fixing

Page 72: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

of targetsand goal.Here, acleardemarcationis madebetweenbreakinginto asystem toprove itsfaults asagainstbreaking

Page 73: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

into andretrievinginformationcontainedin thesystem.

•Gatheringinformation

Page 74: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

pertainingto thestructureof thesystem ornetwork.

•Reviewingthe

Page 75: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

informationthat hasbeencollectedandbasedon suchdata,chartingoutaplanof actionto beadopted.Multiplecoursesof

Page 76: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

actionmay beoutlinedand themostsuitableone isselected.

Page 77: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

•Implementationof themostappropriatecourse ofaction.

Thereare twobroadkindsofpenetrationtests.Itmaybein

Page 78: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

the form of a "White Box"testora "BlackBox" test. Incase of a white box test, thecompany or organizationenlists the services of anagency or individual to carryout the penetration tests, andprovides them with allinformation with respect tothe structure of the systemanditsbackground.

Page 79: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The party carrying out thetests need not do anygroundwork for collection ofinformation. On the otherhand, where the penetrationtest is of the black boxvariety, very little or inmostcases, no backgroundinformationisprovidedtotheagency except the name of

Page 80: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

theorganizationforwhichthetestisbeingdone.

Once the penetration test issuccessfully completed, thesystem administrator orowner is briefed about theweaknessesinthesystemthathascometoforeasaresultof

Page 81: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

the test. The test reportshould list out in detail theweakspotsasobservedinthetest, the severity of suchflaws,theshorttermandlongterm impact on the systemand its contents and finallythe methods to fix suchshortcomings.

Page 82: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Various strategiesemployed

Page 83: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The following are the mostcommonly adopted strategiesofpenetrationtesting:

Page 84: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Targetedtest

In this form of penetrationtesting, the procedure isperformed by theorganization's in-housesecurity department. Theymay call for the help ofexternal agencies but thedecision making and

Page 85: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

implementation powers restwith the organization itself.Oneofthemostcharacteristicfeatures of this form ofpenetration testing is thatemployeesintheorganizationare kept in the loop and areawareofthetests.

Page 86: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Externalapproach

This form of penetrationtesting is carried outexclusively on those devicesand servers of theorganization that are visibleto outsiders, for instance thee-mail servers, domain nameservers etc. The intention of

Page 87: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

performing a penetration testwith the external approach isto ascertain whether anyoutsider can attack theabovementioned devices andincaseofsuchanattack, therepercussionsofthesame.

Page 88: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Internalapproach

Thisistheexactoppositeofatest as per the externalapproach. Here the intentionis to mimic the situationwhere the system is underattack from inside bysomeone who has high levelaccess and privileges. The

Page 89: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

testcanestablishtheextentofdamagesthatcanbecausesintheeventofsuchanattack.

Blackboxtest

Page 90: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

The basic principle behind ablack box test has beenmentioned in the earlier partofthischapter.Theagencyorindividual carrying out thepenetration test is given verylittle information about theorganization or its systemsafeguards. This form oftesting is very time andresource intensive because

Page 91: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

the agency has to start fromscratch and undertake thecompleteprocessofgatheringinformation, planning andexecution.

Advanced black box

Page 92: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

test

Asisobviousfromthename,this isahigher levelofblackbox test. The majordifferentiating factor is thequantumofpeople inside theorganization who are awareof the penetration test beingcarried out. In case of a

Page 93: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

normal black box test,although only a limitedamount of information isprovided to the testingagency, almost all themanagerial level employeesof theorganizationareawareofthetestsbeingcarriedout.However in case of anadvancedblackboxtest,onlya few people in the topmanagement of the companywill be aware of the testsbeingconducted.

Page 94: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 95: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter 3: BasicSecurityGuidelines

Page 96: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 97: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Nowthatyouhavehadalookatwhatexactlyhackingis,weshall go ahead and line outsomebasicguidelinesforyou

Page 98: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

toprotectyoursystemandtheinformation contained in itfrom an external threat. Thisis compilation of the mostpracticalmethods devised bycomputer security specialiststhat you can follow to avoidyour machine from beingattacked and ravaged by theomnipresent threat ofhacking.

Page 99: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 100: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

UpdateyourOperatingSystem

Thesimpletruthisthatallthedifferentversionsofeventhe

Page 101: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

bestof theoperating systemshave succumbed to hacking.Havingsaidthat,thesimplestway to protect your systemwould be to keep updatingyour operating system on aweeklyormonthlybasisorasand when a new andimproved version comesalong.This drastically bringsdowntheriskofyoursystemplayinghosttoviruses.

Page 102: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 103: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Updateyoursoftware

Please understand that thereis a reason why softwaredevelopers bring out newerversions of their product

Page 104: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

every once in a while.Besides providing betterefficiency and convenience,they also have better in-builtsecurityfeatures.Thereforeitis highly imperative for youto make sure that yourapplications, browsers andprogramsallstayupdated.

Page 105: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Anti-Virus

The importance of havinggood and effective anti-virussoftware in your system cannever be stressed enough.

Page 106: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

This is more so when yoursystemisalwaysconnectedtothe internet. There are manyanti-virus software availablein the market with varyingdegrees of efficiency. Theymay be both free as well aspaid and we would alwaysrecommendyoutogofor thelatter. And if you think thatjust installing one in yoursystem is good enough, thenyou are mistaken. The anti-virussoftware, likeanyother

Page 107: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

software requires frequentupdatingfor itsdefinitions toremaineffective.

Page 108: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Anti-Spyware

Anti-spywaresoftwareareasimportantasanti-virusforthevery same reasons.And heretoo,youhavealotofoptions

Page 109: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

tochoosefrom.Somakesurethatyoupickonethatisratedhighenough.

Page 110: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

GoforMacintosh

Nowthisisatrickyone.Youmayhavereadit incountlesscomparisons and onnumerous blogs that

Page 111: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Macintosh operating systemsare the least secure ones outthere, especially when pittedagainst the vastly morepopular Windows operatingsystems. But here, the verypopularityofWindowsworksagainst it. Don't get it?Wellhere is the thing, Very fewhackers target Macintoshsystems because of the factthatalargemajorityofpeopledonotuseit.Takeadvantageof this and switch to

Page 112: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Macintoshoperatingsystems.And do not forget the factthat there is no operatingsystem in theworldwhich iscompletelyhack-proof.

Page 113: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Avoidshadysites

Would you walk into a darkalley on the secluded part ofthe street at night, wearingexpensive jewelry? You

Page 114: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

wouldn't. Similarly, be waryof dubious websites thatparade as reputed ones.Alsoavoid visiting porn sites,gaming websites and sitespromising free music andmovie downloads. Thesewebsites are frequentlytracked by hackers andanything you view ordownload from these sitesmay contain malware thatmayharmyourcomputerandcompromiseitssecurity.

Page 115: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 116: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Firewall

If there are more than onecomputer systems operatingunder one network, it ishighly advisable to install

Page 117: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

software that provides asecurity firewall. Otherwisemake sure that the in-builtfirewall in your Windows isactivated. This feature iscomes in all versions ofWindows starting from theXPtothelatestversion.

Page 118: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Spam

Never ever open mails thatlook suspicious. Especiallythe ones that haveattachments. All the

Page 119: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

mainstream e-mail websitesprovide a certain amount ofprotection against suchspurious mails bystraightawaymoving them tothe spam box when youreceive them. However theremaybemailsthatgetpastthefilters of your e-mail serverand that iswhenyouhave toexercise caution. Do notattempt to readsuchmailsordownloadthecontents.

Page 120: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 121: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Back-upoptions

Whether it is your homecomputer or the system atwork, always create a back-up of the data that you store

Page 122: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

in it. Youmay be having allsorts of important andconfidential information suchas financial information,personal files and workrelated documents saved inyour system. In that case,makesure thatyou transferacopy of everything into anexternal source such as astandaloneharddiskorsomeothersimilardeviceorserver.Remember single potentmalicious software may

Page 123: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

completely scramble yourdataandmakeitirretrievable.Andmerelyhavingaback-upoption is not good enough ifyoudonotutilizeit.Performaback-uptransferasoftenaspossible,at leastoncein4to5days.

Page 124: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Passwords

We have kept the mostimportant aspect to the last.The significance of having asecurepasswordcanneverbe

Page 125: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

underminedenough.Beitforyourdocuments,fore-mailoreven your secure server, agoodenoughpassword is thefirst and quite often the lastline of defense against anyexternal threats. There aresome golden rules whenpicking a password. Do notmake your bank accountnumber,telephonenumberorcar registration number asyourpassword.Similarlyitisabignowhenitcomestothe

Page 126: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

names of your familymembers.

Do not adopt any dates suchasbirthdaysandanniversariesas passwords. In short, whenit comes to adopting apassword do not takepredictable words or

Page 127: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

numerals.As far as possible,make it a combination ofjumbled alphabets andnumbersthatdonotbearanyimportance to you on apersonalorprofessionalfront.And a golden rule when itcomestopasswordsecurityisthat, never write down yourpassword anywhere, be ityour personal diary or at theback of the telephone index.Thesamegoesforsavingitinyourcellphone.

Page 128: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 129: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter 4: SecurityGuidelines ForOffices AndOrganizations

Page 130: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 131: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Thethreatofhackingisanallpervasive one and the bigscale corporations andorganizations are equally

Page 132: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

affected by it. This isespecially so in the case ofbanks and financialinstitutions where a hugequantum of personal andfinancial information of theclientele is stored. An attackon such networks can wreakhavoc of scale beyondimagination. In this chapterwe shall deal with howoffices and organizations cantake precautionary measuresto avoid such instances and

Page 133: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

neutralize an external threattotheircomputernetwork.

Page 134: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Safeguardthepointsofentry

Thefirstandforemoststepisto identify and mark out the

Page 135: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

points of entry between theinternet and organization'snetwork. This is not as easyas it sounds. There will benumerous interfaces wherethe internal network isexposed to the internet andthese need to be monitoredbecause any external attackon the network can onlyoriginate from these points.Once these entry points areidentified, steps should betaken toensure that theseare

Page 136: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

wellprotected.

Page 137: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Diagnostictests

Various diagnostic tests canbe run on the network toascertain the points ofweakness. These tests must

Page 138: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

be run keeping inconsiderationthefactthatthethreatcanemanatefrombothexternal as well as internalsources. The results of thetests will provide a clearpicture as to where theorganization is lacking interms network security. Thefaulty lines can then beaddressedbypatchingup thelacunaeorbyaddinganextralayer of security or byeliminating such faulty areas

Page 139: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

completely. The diagnostictestsshouldberunonregularintervalsbasedonthelevelofexposuretoexternalsources.

Page 140: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Firewallconfiguration

Merely having a firewallsystem installed in your

Page 141: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

network is not enough. Thefirewallshouldbeconfiguredinsuchawaythatitisawareof the nature of threat thatyour network can face. Itshould be able to let throughsuchcommunicationwhichisrelevant and conducive andblock traffic that appears tobe having malafideintentions. The configurationmust be in tandem with thesecurity requirement of thenetwork and should

Page 142: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

complementitsfunctionality.

Page 143: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Passwordpolicies

As mentioned in the earlierchapter, passwords are anintegral part of any networkof computer systems. They

Page 144: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

are one of themain areas ofhuman-machine interface. Incaseofalargecorporationororganization, where are alarge number of employees,the risks of the networkcoming under attack alsoincreasing manifold. In suchlarge scale operations, thenetwork administrator shoulddevise properly outlinedpolicies for generation,alteration and periodicalchange of passwords. The

Page 145: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

passwords shouldmandatorily consist ofalphabets, characters andnumbers.Theyshouldhaveaminimum length of seven toeight characters and shouldbeinajumbledfashion.

Strict guidelines should be

Page 146: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

introduced with respect tosharing of passwords orproviding authentication to aperson other than to whomthepasswordisissued.Inthehigher levels of theorganization, the nature ofdata accessible is of a moreconfidential variety, bothqualitatively andquantitatively. In suchsituations non-disclosureagreements may be put inplacebindingthehigherlevel

Page 147: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

managerialstaff.

Anotherkey step tobe takenis to introduce a systemwhere the passwords areautomatically changed everytwoweeksandfreshonesaregeneratedinitsplace.

Page 148: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 149: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Bio-metricscanners

It is a given fact that nomatter how many safetymeasuresyouinstallinplace,when it comes to passwords,

Page 150: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

the threats can never becompletely ruled out. Manycomputer security specialistsbelieve that the best way todeal with this situation is tominimize the use of thepasswords and in their place,establish other forms ofemployee specific securitymeasuressuchassmartcardstoaccessindividualcomputersystems and finger printscanners and retinal scannersto gain entry into server

Page 151: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

rooms, data storage roomsetc. These devices are not asprone to breaches aspasswords due to the simplefact that a second partycannotimpersonatetheactualuserandenterthesystem.

Page 152: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Anti-virusandanti-spywaresoftware

The basics of safeguardingagainst malicious virus

Page 153: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

attacks and spyware are thesame when it comes to apersonal laptop or a largenetworkofsystems.Itisonlythe scale of operations thatdiffer. In case of largeorganizations, efficient anti-virus and anti-spywaresoftwarehavingawideambitof operations must beinstalled. The software mustbe able to tackle threats of awide variety from simplereconnaissancebugstoall-out

Page 154: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

hacking codes. In addition todetection of viruses, it mustalso be capable ofquarantining infected filesand keeping them isolatedfromtheotherfiles.

Page 155: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Physicalsecurityofthepremises

When it comes to computersecurity and protection

Page 156: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

against hacking, corporationstendtoignoretheverysimplefact that unless the officepremises are properlyguarded and secured at alltimes, all the internalsoftware security measuresshallbeinvain.Ifthesystemis exposed to threats frominside due to lack of properhardware security, thenetwork can be easilybreached.

Page 157: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

There should be continuousmonitoring of people whohave access to computersanywhereintheorganization.The inflow and outflow ofpeople into the premisesshould be recorded anddocumented. Care should betaken to ensure that, visitorsshouldnotbeallowedaccess

Page 158: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

to computer systems underany circumstances. And last,it should be ensured that theoffice premises are underroundtheclocksecurity.

Page 159: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Awarenesscampaigns

All the precautions taken bythe organization and the

Page 160: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

safety measures andprocedures set in place shallnot prove to be effectiveunless the employees, rightfrom the high level ones tothelowlevelmaintenanceareaware of the gravity of thethreat posed by hacking,viruses and other maliciousactivities.Employeesfromalllevels of security clearancesmust be aware of theimportance of secured andbreachfreesystemsand their

Page 161: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

roleinensuringthesame.

Awareness campaigns anddrills must be held on aregular basis, where theemployees are trained on thebasicsecuritymeasures tobeobservedandabidedbythem.They should be acquainted

Page 162: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

with the anti-virus and anti-spywaresoftwareinstalledbythe organization. And morethaneverything,asaresultofthe campaigns, they shouldrealize that they all play animportantpartinmakingsurethat theirsystemsand in turnthe network does not comeunder the threat of beinghacked.

Page 163: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 164: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter 5: FewGeneral Tips OfComputerSafety

Page 165: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 166: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Bynowyoumustbehavingafair idea about the variousfacets of hacking and theguidelines for ensuring basic

Page 167: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

safety to your personalcomputers and also to largescale, computer networks.Given below are somegeneraltipsthatyoucankeepinmind to avoid fallingpreytothethreatofhacking.

Page 168: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢Neveropenmailsfromunknownsourcesand moreimportantly,do notever

Page 169: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

downloadtheattachmentsto yoursystem.

➢Alwaysengage insafe

Page 170: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

browsing.Avoidvisitingwebsitesthat yoususpectofhavingmalware.

Page 171: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢Wheninstallinga newprogram,makesurethat theoldprogramiscompletelyuninstalledbeforeyoubegininstalling

Page 172: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

the filespertainingto thenewone.

➢Withrespect towhateverprograms

Page 173: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

andsoftwareyou havein yoursystem,ensurethat theyareupdatedto thelatestversionpossible.

Page 174: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢ Ifyou areone ofthosework-at-homeprofessionals,do nothesitatetoenlist the

Page 175: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

servicesof aprofessionalfirm ofcomputersecurityexperts tokeepyoursystemandnetworkwellguarded.

Page 176: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢ Donot replyto chatroominvitationsandmessagesfrompeoplewhom

Page 177: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

you don'tknow orwhoseauthenticityyoususpect.

➢Alwayskeep a

Page 178: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

back upof yourfiles andinformationin aseparateexternalsourcethat iskeptsecure.

Page 179: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢Manycomputersecurityexpertsbelievethatwhilebrowsingtheinternet,itisbetter

Page 180: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

to useMozillaFirefoxbrowserthanInternetExplorer.Firefoxprovidesbetterinbuiltsecurityfeaturesthanother

Page 181: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

browsers.

➢Deactivatefeaturessuch asJava,Active Xetc inyour

Page 182: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

browser,when notinuse.

➢ Asmentionedearlier inthis book,shift to

Page 183: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

operatingsystemslikeMacintoshor Linuxif you arecomfortablewith theiroperation.Theincidenceofhackingin

Page 184: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

computersusingtheseoperatingsystemsisvery lesscomparedto thevastlymorepopularWindows.

Page 185: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

➢ Thelast andoftenoverlookedtip - turnoff yourcomputerwhen notinuse.Donot keep

Page 186: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

yourcomputerin sleepmode andleaveyourworkstationfor morethantwentyminutes.It isimpossibleto hack

Page 187: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

into asystemwhich isnotswitchedon.

Page 188: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 189: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Conclusion

Page 190: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 191: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

By now you must having agoodideaaboutwhathackingis and what will be theconsequences if your system

Page 192: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

is attacked by an external orinternal party. But fear not,simplyfollowtheinstructionsand guidelines provided inthisbookandyoucanberestassured that your system iswellprotected.

Although we have explained

Page 193: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

alltheconceptshereinaverylucid and comprehensiblefashion, putting themall intopracticemay sometimes be abit tough.Donot think twicebefore seeking help fromprofessional securityspecialists if you feel all thisisabittootechnicalforyou.

Page 194: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

And please note that theworldofcomputersisaneverchanging and advancing one.The more advanced thehackers become, the moreeffective should be yourdefensive mechanisms.Always keep your softwareandsystemupdated.

Page 195: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Thank you again fordownloadingthiseBookandIhope you enjoyed theinformationshared.

Page 196: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 197: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 198: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 199: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 200: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Free Bonus Video:TopHackerShoesUsHowItsDone

Page 201: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Here is a great video,showing how almostevery secure networkis vulnerable from atophacker.

Page 202: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Bonus Video:https://www.youtube.com/watch?v=hqKafI7Amd8

Page 203: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 205: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Design-Development-Made-Simple-ebook/dp/B00UEMM5X4/ref=sr_1_9?s=digital-text&ie=UTF8&qid=1427558209&sr=1-9&keywords=apps

Page 206: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 207: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 208: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 209: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.
Page 210: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

TableofContents

IntroductionChapter 1: Hacking - AnOverview

Chapter 2: PenetrationTesting

Chapter 3: Basic SecurityGuidelines

Chapter 4: SecurityGuidelinesForOfficesAndOrganizations

Page 211: Hacking: Guide to Basic Security, Penetration Testing and ...1.droppdf.com/files/I2fGR/hacking-guide-to-basic... · Web. I want to thank you for downloading this eBook and I ... practice.

Chapter5:FewGeneralTipsOfComputerSafety

Conclusion