The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example.
|Published (Last):||18 October 2005|
|PDF File Size:||18.44 Mb|
|ePub File Size:||6.96 Mb|
|Price:||Free* [*Free Regsitration Required]|
Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Product Description: The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking.
It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows Product Description: The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways.
It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner. Get A Copy. Paperback , pages.
More Details Other Editions 1. Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about The Hacker's Underground Handbook , please sign up. See 1 question about The Hacker's Underground Handbook…. Lists with This Book. This book is not yet featured on Listopia. Community Reviews.
Showing Average rating 3. Rating details. More filters. Sort order. May 17, David Glad rated it liked it Shelves: all-your-brains-are-belong-to-me , survival. Picked this off a shelf and skimmed through the pages, and, really, it does seem like a lot of fluff. Although this book is officially meant famous last words, people only for educational purposes and not to try this on any systems you have not been given permission to try to gain unauthorized access to fun to word it that way for the absurdity of it , I would imagine there are wannabes in the book's target group.
I suppose at some point in my teenage years when I really did not know jack, I Picked this off a shelf and skimmed through the pages, and, really, it does seem like a lot of fluff. I suppose at some point in my teenage years when I really did not know jack, I would have been tempted too If you are a security profession, you really have to be paranoid and get it right all of the time, whereas an attacker merely has to get lucky.
As for a quick breakdown of what security is, it is a question of visibility -- perhaps a sloppy network administrator made it possible for users on the Internet, rather than just the "local" computer network, to try to access the database of the server hosting the company website -- and vulnerability: If you are running a server accessible from the Internet, you better install those security updates.
Coincidentally, this is a huge source of fluff in the book as they take many many pages -- and pictures! If you are a computer science student or interested in IT, it really is an excellent opportunity to learn how software works. Also, as the book notes, is a great way to learn about computer security.
Seems funny the book does not mention Kali Linux, which is currently the preeminent Linux distribution for security testing. Does however mention its predecessor Backtrack.
As time goes by, the best options will probably be easily found by merely reading up on Wikipedia rather than even necessarily needing to go to sites specially in security. Funny the book seems to endorse what is probably the most popular desktop Linux Ubuntu even if it is likely among the most versatile for the software available for it.
With those lines about Linux now mentioned, great time to move on to the book's next flaw of how it suggests using some site or another to look up a website's ip address and similar content. Anyone who knows basic UNIX commands knows there is the "host" command type url after to see what their ip address is and "whois" to find who a domain belongs to.
Gets comical when it suggests you "ping" a target to see if they are online. Plenty of routers and I would imagine real server operating systems ignore such requests, letting them "time out" which would make them appear to be offline. Other making this sound like a For Dummies book is that on the wireless section, it talks about bar strength as indicating how strong a wireless signal is..
Anyone who uses a computer for any length of time could have figured that out. So long story short, I know this is intended merely as a starting point, but luckily for the rest of us you would likely only end up in prison if you try to do anything for illegal purposes.
Worthwhile advice on value of learning to program, rather than try be a "script kiddie," and there is plenty of hope that anyone who invests the time to really learn how to program would probably put it to productive use rather than ending up a prison b :D I'm just starting some research on the subject and had absolutely no knowledge of beforehand.
I don't feel like any version of an expert now, but I have an idea of what's goin on and where to go from here to expand my knowledge. As I do more to expand my knowledge I may have to alter this 3 star score up or down, but who knows? View 1 comment. May 14, Kiko Prompanya rated it it was amazing. He rendered me a personal service of cloning and entire cellphone within 12hours, I could monitor the entire phone on my computer. He offers many other services. Oct 09, Greyfang rated it liked it.
This is a decent introduction to various hacking methods, some of which are still viable, some are outdated. Disclosure: I got this book in a purchase in Amazon, since most of people that it was useful for learning to be a hacker, but the fact was somehow elementary.
I have an eBook of the same version above. Overview: The book is a technical result of all the past hacking attacks, first they tell you that by reading this book you may have a job a white hacker or as a security protector, But I don't see such a thing.
Positive and Negative Aspects: The main positive aspects would be go as the following, first the book gave me a notion on how Hackers did their malicious deeds, besides it tells to never trust any message that contains request of bank codes or account information, however, I had a knowledge on how to protect myself during a sudden attack of some virus against my operating system but anyway I have never implement any sort of techniques used in the book.
I just stick on my knowledge to this sort of new science. Speaking of Negatives, I would say that it is a shame to deceive the reader for the ability to have a job offer as a white hacker, because this offend me so often, I read the book with enthusiasm but I didn't get the pay off that they promise in the introduction.
My Personal Reaction: I admit having no prior knowledge of how the hacking goes but due the help that the book gave me, I was feeling somehow like a professional for being so. I enjoy the techniques used in the book, the sort of the explanations and the images that goes as proofs for showing the reader what to do, In fact the book consider the reader as a complete beginner so the steps of knowledge goes smoothly and coherent. Recommendations: To those who want to improve their knowledge, I recommend this book to all the folks who want to know how hacking goes, and to those who want to improve their security systems, In addition I would recommend this book to people who want to help and protect not people who want to destroy and be so negative.
Mar 23, Adam Smith rated it really liked it. A quick and simple study course on the basics of computer hacking. It's interesting to see the techniques and tactics used by hackers, but without implementing the exercises covered in this course it's easy to get bogged down in technical jargon. I didn't have the time or know how to complete the exercise, so I just read the book as is.
I doubt I'd ever manage to pull off the techniques described, but it's still interesting to know. Jan 17, Joredos rated it liked it Shelves: it. Exclusively fundamental stuff without any deep explanations. Just for users which are inspired by hackers.
Not for advanced users,but probably would be interesting for school report. Apr 10, Rupinder rated it liked it Shelves: ebooks-free-downloaded-deleted. It was informative, considering i had no prior knowledge of hacking. I didnt download any of the software mentioned, but i did take note of the counter-measures. There were some terms and programming languages that i knew about, but it was informative enough to refresh my memory. Jul 29, Waffle's Crazy Peanut rated it it was amazing.
A precise way of introducing hacking to someone. Kid's stuff Recommended for newbies who're interested in possible ways of intruding a system strange title, which does attract the crowd. Abdalmalek ALsbr rated it liked it Aug 10, Jan rated it it was amazing Aug 30, Abdullah Joseph rated it it was ok Mar 16, Damien rated it liked it Jun 26, Sumbul Qasmani rated it did not like it Apr 03, Wai Phyo rated it it was amazing Jun 09, Kevin rated it it was ok Feb 13, Olem Diga rated it did not like it Aug 22, Uday Singh rated it it was ok Oct 13,
The Hacker’s Underground Handbook
ISBN 13: 9781451550184