3. TO MY LOVING PARENTS, MY FRIENDS AND THE GIRL WHO STOOD BY ME ALL THE
TIME AND WHO PROVIDED INSPIRATION, GUIDANCE, AND UNWAVERING SUPPORT.
TO MY BROTHER FOR HELPING ME DEFINE MY CHARACTER AND TEACHING ME TO
OVERCOME ADVERSITY.
--MANISH KUMAR
TO ALL OPEN SOURCE DEVELOPERS, ETHICAL HACKERS, AND SUPPORTERS OF FULL DISCLOSER,
WITHOUT WHOM SECURITY COULD NEVER TRULY BE ACHIEVED.
4. ABOUT THE AUTHOR
MANISH KUMAR, CHFI, CEH, RHCE, MCP
MR. MANISH KUMAR IS THE CHIEF SECURITY OFFICER OF LEO IMPACT SECURITY, A
PROFESSIONAL INFORMATION SECURITY SERVICES COMPANY , FOCUSSED ON PROVIDING SPECIALISED
SOLUTIONS AND ASSISTANCE TO ORGANISATIONS IN PROTECTING AND SAGEGUARDING THEIR MOST VITAL
BUSINESS RESOURCE I.E. INFORMATION, AGAINST LATEST THREATS.
WITH AN EXPERIENCE OF MORE THAN 4 YEARS IN LEADING THE IT INDUSTRY, MR MANISH IS A PRINCIPAL
INFORMATION SECURITY CONSULTANT, AUDITOR AND TRAINER, HAVING MORE THAN 1000 HOURS OF
TRAINING PER YEAR IN THE VARIOUS DOMAINS OF THE INFORMATION SECURITY, CYBER FORENSIC,
ETHICAL HACKING, BUSINESS CONTINUITY, WI-FI SECURITY AND MORE. HE HAS BEEN AWARDED
MANY CERTIFICATIONS LIKE CERTIFIED HACKING FORENSIC INVESTIGATOR (CHFI), CERTIFIED ETHICAL
HACKER (CEH), RED HAT CERTIFIED ENGINEER (RHCE) AND MICROSOFT CERTIFIED PROFESSIONAL,
JUST TO NAME A FEW. POSSESSING AN INDEPTH KNOWLEDGE AND INSIGHT INTO TODAY'S SECURITY
RISKS AND TOMORROWS POTENTIAL THREATS, HE HAS TO HIS CREDIT MANY REGISTERED AND
PENDING PATENTS IN CYBER FORENSIC AND INFORMATION SECURITY DOMAIN .
HE SPECIALIZES IN NETWORK SECURITY, PENETRATION TESTING AND FORENSIC INVESTIGATION.
HIS RESEARCH INTERESTS INCLUDE COMPUTER SECURITY, NETWORKING, DATA FORENSIC,
VIRTUALIZATION AND INFORMATION SECURITY. HE HAS BEEN INTERVIEWED BY SEVERAL PRINT AND
ONLINE NEWSPAPERS WHERE HE HAS SHARED HIS EXPERIENCES RELATING TO CYBERWAR AND CYBER
CRIMES.
EMAIL: manish@leoimpact.com
5. CONTENTS
1. INTRODUCTION TO REAL HACKING
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT & DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE & COMPUTER FORENSIC
10. VOIP & WIRELESS HACKING
11. VULNERABILITY DISCOVERY & PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS & HONEY POT HACKING.
14. SECURING SYSTEM & NETWORKS
LINKS
FEEDBACK
6. ACKNOWLEDGEMENTS
IT IS IMPOSSIBLE TO ACCOMPLISH THE CONCEPTION AND AUTHORING OF A BOOK WITHOUT RESOURCES,
INPUTS, COMMITMENT AND DEDICATED EFFORTS OF MANY HANDS. WE HAVE RELIED HEAVILY ON EACH OTHER,
OUR EDITORS, AND ALL THE SECURITY FREAKS WHO HAVE BEEN PRESENT MUCH BEFORE THE PUBLIC RISE
OF THE INTERNET.
MOST IMPORTANTLY, THANKS TO OUR FAMILIES FOR SUPPORTING US DURING THE ENDLESS
MONTHS OF RESEARCH, WRITING, AND REVISIONS. WE THOUGHT THE SECOND TIME AROUND
WOULD GO QUICKER.
AND FINALLY, A TREMENDOUS “THANK YOU” TO ALL THE READERS OF THE “THE SECRET OF
HACKING”. YOUR NEVER-ENDING SUPPORT HAS INSPIRED AND ENSURED THAT THE TOPIC OF
SECURITY COMES TO THE MUCH DESERVED LIMELIGHT , THEREBY EXPOSING THE TECHNIQUES
OF HACKERS TO THOSE WHO MAY DESPERATELY NEED THEM.
NAVIGATION
THIS IS THE ATTACK ICON
This makes it easy to identify specific hacking attack. Every attack is countered with practical, relevant and field
tested procedures, which have their own special countermeasure icon.