NETWORKING HACKING Complete guide tools for computer wireless network technology, connections and communications system.… (Karnel Erickson) (Z-Library)

Author: Karnel Erickson

科学

The book will teach you the basics of a computer network, countermeasures that you can use to prevent a social engineering and physical attack and how to assess the physical vulnerabilities within your organization. By reading it, you will learn of all the possible dangers that your network is facing. First of all, how hackers get the administrator passwords and the different tools they use to crack them. Some of these tools, accompanied by a manual, will be in this context. There’s a reason why security experts always try to come up with different ways to secure their network. It’s because the hackers will always look into different techniques to hack it. The goal is to take the appropriate measures so you can easily secure the network for any malicious users

📄 File Format: PDF
💾 File Size: 11.7 MB
20
Views
0
Downloads
0.00
Total Donations

📄 Text Preview (First 20 pages)

ℹ️

Registered users can read the full content for free

Register as a Gaohf Library member to read the complete e-book online for free and enjoy a better reading experience.

📄 Page 1
(This page has no text content)
📄 Page 2
(This page has no text content)
📄 Page 3
(This page has no text content)
📄 Page 4
Networking Hacking Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware. Karnel Erickson
📄 Page 5
© Copyright 2019  – All rights reserved. The following e-book is reproduced below with the goal of providing information that is as accurate and reliable as possible. Regardless, purchasing this e-book can be seen as consent to the fact that both the publisher and the author of this book are in no way experts on the topics discussed within and that any recommendations or suggestions that are made herein are for entertainment purposes only. Professionals should be consulted as needed prior to undertaking any of the actions endorsed herein. This declaration is deemed fair and valid by both the American Bar Association and the Committee of Publishers Association and is legally binding throughout the United States. Furthermore, the transmission, duplication, or reproduction of any of the following work including specific information will be considered an illegal act irrespective of whether it is done electronically or in print. This extends to creating a secondary or tertiary copy of the work or a recorded copy and is only allowed with express written consent from the publisher. All additional rights reserved. The information in the following pages is broadly considered to be a truthful and accurate account of facts and as such any inattention, use, or misuse of the information in question by the reader will render any resulting actions solely under their purview. There are no scenarios in which the publisher or the original author of this work can be in any fashion deemed liable for any hardship or damages that may befall them after undertaking information described herein. Additionally, the information in the following pages is intended only for informational purposes and should thus be thought of as universal. As befitting its nature, it is presented without assurance regarding its prolonged validity or interim quality. Trademarks that are mentioned are done without written consent and can in no way be considered an endorsement from the trademark holder.
📄 Page 6
Table of Contents INTRODUCTION CHAPTER 1: THE BASICS OF A COMPUTER NETWORK ABOUT THE ORIGIN OF HACKING COMMON NETWORK HACKING TECHNIQUES HACKING SKILLS THE BASICS OF NETWORKING THE COMPONENTS OF A NETWORK ABOUT WIRELESS NETWORKS A Wireless Local Area Network (WLAN) The Components of a Wireless Network The Configurations of a Wireless Network The Benefits of Wireless Configurations ABOUT CISCO CHAPTER 2: INTRODUCTION INTO HACKING DIFFERENT TERMINOLOGIES USED IN HACKING: THE MINDSET OF A HACKER WHAT MOTIVATES HACKERS PLANNING AND PERFORMING AN ATTACK ABOUT THE DARK WEB AND HOW TO ACCESS IT USING THE TOR BROWSER The Main Reason Why the Dark Web Is Hidden How Do You Access the Dark Web Sites? About the Dark Web Search Engine The Security Guide for Accessing the Dark Web MANAGING ANONYMITY CHAPTER 3: COMING UP WITH A HACKING PLAN ESTABLISHING YOUR GOALS HOW TO DETERMINE THE SPECIFIC SYSTEM TO HACK ATTACK TREE ANALYSIS FORMULATING TESTING STANDARDS Timing Specific Tests Blind Versus Knowledge Assessments Location HOW TO REACT TO THE VULNERABILITIES PRESENT IN THE NETWORK SILLY ASSUMPTIONS SELECTING TOOLS TO CARRY OUT SECURITY ASSESSMENT CHAPTER 4: HACKING METHODOLOGIES SETTING THE STAGE FOR THE TESTING SEEING WHAT OTHER PEOPLE SEE GATHERING PUBLIC INFORMATION ASSESSING VULNERABILITIES
📄 Page 7
PENETRATING THE SYSTEM CHAPTER 5: SOCIAL ENGINEERING ABOUT SOCIAL ENGINEERING REASONS WHY EXTERNAL ATTACKERS USE SOCIAL ENGINEERING UNDERSTANDING THE CONSEQUENCES OF SOCIAL ENGINEERING CARRYING OUT SOCIAL ENGINEERING ATTACKS PHISHING FOR INFORMATION USING THE INTERNET DUMPSTER DIVING PHONE SYSTEMS BUILDING TRUST EXPLOITING A RELATIONSHIP DECEIT USING WORDS AND ACTIONS DECEIT USING TECHNOLOGY HOW TO COUNTER SOCIAL ENGINEERING ATTACKS CHAPTER 6: PHYSICAL SECURITY PHYSICAL VULNERABILITIES BUILDING INFRASTRUCTURE UTILITIES OFFICE LAYOUT AND USAGE NETWORK COMPONENTS AND COMPUTERS CHAPTER 7: PASSWORDS PASSWORD VULNERABILITIES ORGANIZATIONAL PASSWORD VULNERABILITIES TECHNICAL PASSWORD VULNERABILITIES CRACKING PASSWORDS Social Engineering Shoulder Surfing Inference Weak Authentication High-Tech Password Cracking HACKING WPA2 WI-FI The Old Techniques Used to Crack the WPA2 Passwords New Methods Used to Hack the WPA2 Wi-Fi USING HCXTOOLS AND HASHCAT What Do You Need? THE PMKID HASHCAT ATTACKS ENSURE THE WI-FI ATTACKS ARE EASIER PASSWORD-CRACKING TOOLS Cain & Abel Brutus RainbowCrack Wfuzz John the Ripper THC HYDRA
📄 Page 8
MEDUSA OPHCRACK L0PHTCRACK CONCLUSION
📄 Page 9
Introduction Congratulations on downloading a copy of the Networking Hacking . I am delighted that you have chosen to learn about network hacking using our handbook. In this handbook, the main focus will be on network hacking. You will get to learn more about different hacking techniques that you can use to access a certain network. A discussion will also ensue about how to find some of the security vulnerabilities as well as how to fix some of the present weaknesses on the network. There are two types of hackers: white- hat hackers and black-hat hackers. White-hat hackers engage in ethical hacking. The main focus of this context will be on ethical hacking.  Computer and network security are a subject that is quite complex. You should always stay a step ahead to make sure that your network has not been accessed by external attackers illegally. Some of the tools and techniques that can be used to ensure that your network is safe will also be outlined in this context. The best way to make sure that your network is safe is to understand the mindset of an external attacker.  You can use the knowledge that you have acquired to safeguard your network. Ethical hacking in this context will also focus more on some of the penetration techniques that can be used by a white-hat hacker or a security expert. We will also focus more on vulnerability testing. Some of these tests help you to identify some of the security flaws present in the network. Some of these loopholes can also be sealed to make sure that an external attacker will not access the network and access different types of information that they can use for their gain. At times, you are required not to be very strict on the budget but to look at the impact it will do in your life.
📄 Page 10
Chapter 1: The Basics of a Computer Network Network hacking is termed as the technical effort to always manipulate the behavior of a specific network connection. The people responsible for network hacking are known as hackers. Hacking is termed as constructive and technical work that is not entirely based on the basics of computer systems. Hackers are normally associated with the use of malicious programs that are used to attack different networks over the Internet. About the Origin of Hacking The term hacking originated from some engineers who were present at M.I.T. during the 1950s and 1960s. The hackers would even hack the mainframe computers. Other people also went ahead to engage in the act of hacking outside M.I.T. Later, the Internet and computer networking gained some form of popularity and the number of people engaging in hacking activities increased drastically. Most of the people who engage in hacking began taking part in such activities at a young age. Common Network Hacking Techniques When carrying out network hacking, people make use of scripts and different network software. The network software is specially-designed, and they are used to manipulate different forms of data that are passing through a specific network. The hackers can obtain some bits of information that allow them to learn more about how the specific system operates. Numerous scripts have also been posted in the Internet, and they can be accessed by anyone. The people who look for the pre-packaged scripts are entry-level hackers. Most of the advanced hackers make an effort to study each of these scripts and they can also modify them as they wish. There are many skilled hackers and they have been hired by commercial firms so that they may protect some of the software within the company so that they cannot be accessed by unauthorized individuals. Besides hacking, there are other penetration techniques and they include the creation of DoS (denial of service) attacks and worms. Different measures are put in place so that a computer and network cannot be affected by phishing, malware, and Trojans. Most companies hire hackers since they
📄 Page 11
possess more knowledge about hacking and they can deploy the necessary counterattacks. Hacking Skills To become a professional hacker, you should possess certain personality traits as well as technical skills as follows: You must be able to work with numbers. Hacking involves perusing through large amounts of code, data, and various computer algorithms. You must possess logical reasoning and memory recall since you must assemble small details and facts as a hacker while planning an attack based on logic. You must be patient. The hacking process is quite complex and you may spend a lot of time trying to come up with an executable plan. The main reason why networking guidelines are important is that: Students can learn more about the advantages of networking. It assists students to utilize the knowledge they possess about networking. It ensures that students can easily plan for their next stage when it comes to network development. It provides a standard networking ‘model’ as well as some of the best practices that assist students when carrying out network planning.   The Basics of Networking A computer network is made up of a collection of computers and other gadgets that have been connected, and they also communicate with each other. The figure below showcases the example of a network and is made up of a local area network that connects the computers to the Internet and various servers.
📄 Page 12
There are two types of networks and they are as follows; 1. Peer-To-Peer Networks: They are normally implemented in areas where there are less than 10 computers, and strict security measures should not be necessarily applied. Each of the computers has the same status and they easily communicate with each other. It is also possible to share different files including spreadsheets and word processing documents can be shared across the entire network. Also, each of the computers on the network shares the same devices which include scanners and printers. 2. Client/Server Networks: They are well suited for larger networks. There is a central computer that acts as a ‘server’. It stores all the applications and files being shared on the entire network. The server possesses more capabilities as compared to a normal computer. It can control the network access of the computers that are connected to the network. The normal computers are normally used by the teachers and students in a school whereas the network administrator has access to the entire server. The Components of a Network A network is made up of the following components:
📄 Page 13
At least two computers. Cables that are used to connect the computers to each other. Each computer will have a network interface device. A ‘Switch’ which is used to switch the data from one point to another. A network operating system software. Structured Cabling: The most popular cabling techniques include the thin coax and the twisted-pair. Hubs and Switches: These are devices used to connect a computer to a network. The hub usually directs information around the network and it also facilitates communication between all the connected devices. The switch is classified as a ‘smart hub’. The switches and hubs connect all the devices. When using switches, you can ensure that you have gotten a “dedicated bandwidth” while also operating at full speed. The hub usually shares the bandwidth across different connections and the activities from one PC can lower the Internet connection on the hub. About Wireless Networks The term ‘wireless network’ normally refers to many computers that are communicating with each other using a standard network protocol and no cabling present. The computers can also use wireless radio signals while sending information from one network to another. A Wireless Local Area Network (WLAN) The network is made up of two primary components and they include a wireless card and an access point. It is possible to transmit information between two computers as long as they are close to each other. Advantages of a Wireless Local Area Network: It is easy to add workstations. It is possible to ensure that the areas where cabling is not possible can access the network.
📄 Page 14
The installation process is fast and also easy. No cabling through the ceilings and walls is required. The network can also be accessed from anywhere as long as a person is within the access point. It comes in handy especially when ensuring that portable networks have access to the network. It is cheaper to install. It possesses long term cost benefits. Disadvantages of a Wireless Local Area Network: The data transfer rate is always slower depending on the number of computers that have been connected to the network. Standards change regularly and the wireless cards may also need to be replaced after some time. Lowering wireless bandwidths will lower the effectiveness of the network. The security of the network cannot be guaranteed and some configuration must be carried out. Devices can only operate within a limited distance from a certain access point. A wired local area network also provides a backbone to the wireless local area network. In a static environment, it is harder to achieve the long-term cost benefits. The Components of a Wireless Network There are numerous components used to configure a wireless local area network. Some of these components are also used when configuring a wired LAN. In both the wireless LAN and wired LAN, network adapter cards are used. The wireless LAN PC card normally contains a built-in antenna. It is then used to connect the computer to a surrounding wireless network. There is a slot where it should be inserted in the computer. It is also possible to connect a desktop computer to a wireless network. In a wireless network,
📄 Page 15
there is the ‘access point’ and it has a similar function to the hub that is present in the wired networks. It normally receives and broadcasts a signal through an adapter card. The major difference between wireless and wired networks is that in a wireless network, the computers are connected using cables. As for the wireless network, there are no cables needed to formulate a connection between different computers. The network is made up of two primary components and they include a wireless card and an access point. It is possible to transmit information between two computers as long as they are close to each other. The Configurations of a Wireless Network A wireless network can be configured using a local area network or a peer- to-peer arrangement.  Peer-to-peer configuration is termed as the most basic wireless network configuration. It normally relies on the use of wireless network adapters that are installed within the computers and they can easily communicate with each other. For the computers to connect, they should be within then transmitting range. If there are many computers connected, they should be close to each other. As for this type of network configuration, there is no network administration overhead. The configuration is mostly suitable for small installations . The Benefits of Wireless Configurations In a wired local area network, people take more time carrying out the cabling. As for the wireless configuration, it possesses the following benefits: 1. The amount of work required to install the wireless local area network is minimal. 2. The wireless network can also be accessed in areas where it would be difficult to carry out wiring. The network downtime is
📄 Page 16
also minimized. 3. When there is a wireless network, it is possible to stay connected to the network all the time regardless of the location of the equipment. 4. The wireless network operates over in a spherical manner. 5. It is possible to share documents over a wireless network. Additional Advantages of a Wireless Network: 1. Speed: The network is quite convenient when it comes to sharing different files over the network. When a network is not available, documents can only be transferred from one point to another using flash disks and other physical mediums. When using physical mediums to transfer documents, the process is quite time consuming. 2. Cost: There are numerous software programs and they are cost- effective. 3. Centralized Software Management: When installing a network, it is possible to install the software on the file server and it can be used by all the computers that are connected in the network, meaning that the wireless network helps to save on time. 4. Resource Sharing: It is possible to share resources on a network whereby numerous computers are connected. 5. Flexible Access: People can access different files on any computer that has been connected to the specific network. 6. Security: The files and programs on the network can be safeguarded using the “copy inhibit” feature. Passwords can also be used to safeguard different documents. The main challenges encountered when installing a network include: 1. Costs: Although a wireless network is supposed to be cost- effective; however, the initial investment is costly since you will also have to hire a technician. 2. Administrative time is required: A network should be maintained properly. A network administrator should be hired to handle such issues.
📄 Page 17
3. File server may fail: A file server is quite susceptible in different ways. When the file server fails, the whole network cannot operate. Different files and programs may be lost in the process. About CISCO CISCO is a company that offers networking for the Internet. The company has been operational since 1984. The network was also established by two scientists who were studying at Stanford University. The networking solutions offered by CISCO are being utilized by different service providers as well as numerous small and medium enterprises. The networking solutions offered by the company normally connect computing devices, people, and computer networks. People can now connect with others while also sharing different pieces of information. A large percent of Internet traffic has also been traveling across the CISCO systems. The company has also been using the Internet to run its own business online from managing inventories to product orders. When using the Internet, CISCO can also keep track of the travel and staff expenses. When exploring different possibilities that can be beneficial to your business, you should opt for the CISCO systems since the company has a better understanding of how you can get your business online. By taking advantage of the experience and knowledge that CISCO possesses, you can enhance the progressive growth of your business.
📄 Page 18
Chapter 2: Introduction Into Hacking There are different types of hacking techniques and hacker categories. In this book, the main focus will be on ethical hacking. We will also look into network hacking to be precise. Some of the methods used to test the computers and their network for any security issues will also be discussed. All these vulnerabilities are going to be outlined since hackers use some of these loopholes to gain access to a network. As for ethical hacking, it mainly involves utilizing some of the professionally proven security techniques that are used to ensure that a network is secure. The tests are carried out by IT professionals and they perform such duties after receiving authorization from the owner of the network system. Different Terminologies Used in Hacking: Hackers: These are people who try to compromise sensitive information that they have also obtained illegally. Some of the hackers usually target the systems that they deem well-protected since they want to elevate their status within their circles. Malicious Internal Users: They are also referred to as internal attackers. They normally try to compromise sensitive information since they can easily access it within the organization. Ethical Hackers: They are the good guys. They can hack into a system and ensure that they have notified the user about the present vulnerabilities. The owner of the network can then take the necessary measures to ensure that the computer systems and sensitive information cannot be accessed by malicious individuals. The term hacker can be defined in two ways. Traditionally, this term showcases that such individuals like to tamper with different electronic and software systems, and they also like to look into how a computer operates. At the moment, a hacker is a person who breaks into a system maliciously for their gain; these individuals usually gain access to critical forms of information and they use it to take advantage of other people. Types of Hackers
📄 Page 19
1. Black-Hat Hackers: The hackers who usually harbor ulterior motives. 2. White-Hat Hackers: They are the good guys and they usually carry out ethical hacking.  The Mindset of a Hacker You need to assess how secure your system is so that you may get a better picture of what you are up against. Most of the vendors who deal with security products always offer advisory services on how people should protect their networks and computer systems from malicious users who may exist both internally and externally. The best way to understand how to protect your system is by looking into the mindset of a hacker. Some of the challenges that people face as a result of hackers will also be outlined in this context. It is also good to look into what motivates a hacker. Many hackers have been saying that the public normally fails to understand them, and there is some truth in that statement. It is easy to judge but quite hard to understand reality. The main issue is that most of the stereotypes surrounding hackers have been formed as a result of people being misinformed about reality. Hackers are also classified in different ways depending on their abilities as well as what motivates them to engage in such acts. Some hackers are very skilled, and they are always in the pursuit of knowledge. At the end of the day, it is evident that each hacker is after their gain. It is also good to note that there are both negative and positive aspects when it comes to hacking. Throughout history, hackers have always been on the pursuit of different forms of knowledge. They also enjoy the thrill of each challenge that comes their way. Some of the people who aspire to be hackers have limited skills, though. On the other hand, hackers have also proven to be innovative and they like the adventure. They always look for new ways that they can use to exploit different networks and computer systems. They always look into some of the areas that people overlook. In some instances, they also ask themselves some questions revolving around what would happen if they carried out certain activities including changing some codes within the installed programs. Some hackers also assume that they can carry out some
📄 Page 20
improvements on the mechanical and electronic devices that are currently being used. Various forms of evidence also showcase that hackers can hack for different gains. For instance, they may have some political motives. Other companies may also hire them to get rid of the competition. In some instances, they hack into different networks for their financial gain. Some of the malicious acts have proven to affect many individuals negatively. It is also good to note that some of these hackers do not care about what happens to the individuals who are behind the firewall that is supposed to ensure that the network is safe. They always carry out attacks since they will gain a lot in the process. Some of the negative issues that arise from these attacks include jeopardizing the jobs of certain individuals who are in charge of securing the systems. In some instances, there is a high chance that some people within the company may be targeting various forms of information and they intend to use it for their gain. Such individuals are known as internal hackers. They normally root the files on different servers while also sharing every piece of information that they have managed to access. At times, they also delete sensitive pieces of information. It is hard to identify some of these individuals who harbor malicious motives. In some instances, they may also influence some of the employees within an organization negatively.  Some of the malicious users have a criminal background. It is advisable to perform certain checks when hiring people. Their past behaviors may influence them in different ways and they may compromise the integrity of your organization. Although a person may have a clean record, it does not mean that they cannot engage in criminal activities. Every criminal always starts from somewhere. Although hacking is quite bad, such people usually play a key role in the advancement of technology. When hackers managed to penetrate a network, security experts usually work towards ensuring that they have devised different measures they can use to secure the network. If the world did not have hackers, there is a high chance that people would care less about the presence of various tools that can prevent data leakage and tool scanning. Such a world would not be bad in any way; the main issue is that the technology would not be advanced. Technology has ensured
The above is a preview of the first 20 pages. Register to read the complete e-book.

💝 Support Author

0.00
Total Amount (¥)
0
Donation Count

Login to support the author

Login Now
Back to List