SlideShare uma empresa Scribd logo
1 de 23
UNOFFICIAL GUIDE TO
© Macmillan India Ltd., 2001 
MACMILLAN INDIA LTD. 
Published by Rajiv Beri for Macmillan India Ltd. 
2/10 Ansari Road, Daryaganj, New Delhi– 110002 
Printed at Rajkamal Electric Press 
B-35/9, G.T. Karnal Road Industrial Area, Delhi– 1100033 
First Published, 2001 
Reprinted, 2001(thrice), 2002(thrice), 2003(thrice), 2004,2005 
ISBN 0333 936795 
ANKIT 
FADIA 
Born – 
1985 (age 27–28) 
Residence – 
India, Mumbai 
Occupation – 
Author, computer security 
consultant, MTV host 
 In 2008, the IMT Ghaziabad Centre for 
Distance Learning signed an MoU with Fadia 
to organise its one-year Post-Graduate 
Diploma in Cyber Security. 
 In addition, he started providing his own 
computer security courses, including the 
"Ankit Fadia Certified Ethical Hacker" 
programme in alliance with Reliance World. 
Website – www.ankitfadia.in
Hacking 
Computer hacking is when someone 
modifies computer hardware or software 
in a way that alters the creator's original 
intention
Ethical Hacking 
An ethical hacker is a computer and network 
expert who attacks a security system on 
behalf of its owners
Book Contents
Hacking Windows 
BIOS setup 
Windows login password 
Changing windows visuals 
Internet Explorer users 
Cookies 
URL address bar 
URL history
Getting your Hands Wet: Net Tool I 
IP Address 
Domain Name System or DNS 
Ports 
Sockets & Ports 
PING 
Tracert 
Netstat
Getting your Hands Wet: Net Tool II 
Port 23 
FTP Port 
Different FTP Commands 
SMTP (Port 25) and POP (Port 110) 
Receiving mail without an Email client 
POP3 (Port 110) 
MailBombing
Getting Past the Password 
Password 
Password Cracking 
Cracking the Windows Login Password 
Windows Screen Saver 
XOR 
Bypassing the Dial Up Server Password 
Default Passwords
Batch File 
REM command 
ECHO: The Batch printing tool 
The FOR loop 
PIPING
TCP/IP 
Transport Layer 
TCP protocols 
IP protocols 
UDP scanning
A Deeper Approach 
Number System 
Decimal Number System 
Binary Number System 
Hexadecimal System 
Converting into different form 
ASCII 
Firewalls
VIRUS 
What is Virus 
File or Program Virus 
Polymorphic Viruses 
Macro Virus 
How to create new virus 
Simple Encryption Method
Perl 
The Basics 
Operators 
Loops 
While Loop & For Loop 
Push & Pop 
Input Output 
Deleting Files
Other Important Topic 
Protection 
C Programming 
Java Scripts Program 
Hostile Applets 
The Motive 
The Attack 
XOOM
Book Review & 
Information
Need of Ethical Hacking 
 To decrease cyber attacks 
 For national security 
 Banking account 
 Social networking media 
 Personal information 
 Terrorism attacks
Drawbacks of Ethical Hacking 
 The ethical hacker using the 
knowledge they gain to do 
malicious hacking activities. 
 The possibility that the ethical 
hacker will send and/or place 
malicious code, viruses, 
malware and other destructive 
and harmful things on a 
computer system. 
 Allowing the company’s 
financial and banking details to 
be seen.
Career on Network Security & 
Ethical Hacking 
 Network Security Systems Manager 
 Network Security Administrator 
 Systems/Applications Security 
Executive 
 Web Security Administrator 
 Certifications in Network Security
Future of Ethical Hacking
Clearing Misconception about this book 
If you are planning to follow this book 
so that you can hack your girl-friend's 
account to check whether she is 
cheating on you then forget it. 
 For that you better use scripts 
available on the internet. 
This book gives you a clear overview 
of what hacking is and what you can 
and cannot do with hacking. 
Basically it will guide you how to be 
secure.
What Others Said About This Book 
 Scared of Hackers? Indian Teenager offers help. 
– The New York Times (Reuters) 
 He is a teenage prodigy all set to revolutionize the world of 
information technology. 
– The Hindu 
 The book throws light on unexplored horizons of the wired world. 
– Internet.com 
 Teen’s ‘Ethical Hacking’ book a hit. 
– ZD Net 
Teenage Robin Hood of cyber jungle. 
– Indian Express 
Sixteen and he knows it all. 
– The Pioneer 
Indian teen writes a real web cracker. 
– The Asian Age
MBA, 1st Sem, 2013-2015 Batch 
iLEAD, Kolkata 
West Bengal University of Technology

Mais conteúdo relacionado

Mais procurados

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Vinod Kumar
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
 

Mais procurados (20)

Learn hacking be saved
Learn hacking be savedLearn hacking be saved
Learn hacking be saved
 
Arya
AryaArya
Arya
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015
 
Hacking
HackingHacking
Hacking
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Mobile security
Mobile securityMobile security
Mobile security
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 

Destaque

www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
Chandra Pr. Singh
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
E Hacking
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
Mercury Solutions Limited
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 

Destaque (17)

www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
 
Afceh 2.0 Final
Afceh 2.0 FinalAfceh 2.0 Final
Afceh 2.0 Final
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Super1
Super1Super1
Super1
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
CEHV9
CEHV9CEHV9
CEHV9
 
Campus To Corporate
Campus To CorporateCampus To Corporate
Campus To Corporate
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 

Semelhante a Ethical hacking Book Review

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Semelhante a Ethical hacking Book Review (20)

It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Ch01
Ch01Ch01
Ch01
 
Ch01
Ch01Ch01
Ch01
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Hacking
Hacking Hacking
Hacking
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

Mais de Tirtha Mal (8)

Tirtha Mal Resume
Tirtha Mal ResumeTirtha Mal Resume
Tirtha Mal Resume
 
Fleet management system
Fleet management systemFleet management system
Fleet management system
 
Leadership Style of the richest Indian Mukesh ambani
Leadership Style of the richest Indian Mukesh ambaniLeadership Style of the richest Indian Mukesh ambani
Leadership Style of the richest Indian Mukesh ambani
 
Communication ppt
Communication pptCommunication ppt
Communication ppt
 
Intel proccessor manufacturing
Intel proccessor manufacturingIntel proccessor manufacturing
Intel proccessor manufacturing
 
Service of Newspaper
Service of NewspaperService of Newspaper
Service of Newspaper
 
Kids jewellery
Kids jewelleryKids jewellery
Kids jewellery
 
Canvas2 presentation
Canvas2 presentationCanvas2 presentation
Canvas2 presentation
 

Último

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 

Último (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 

Ethical hacking Book Review

  • 2. © Macmillan India Ltd., 2001 MACMILLAN INDIA LTD. Published by Rajiv Beri for Macmillan India Ltd. 2/10 Ansari Road, Daryaganj, New Delhi– 110002 Printed at Rajkamal Electric Press B-35/9, G.T. Karnal Road Industrial Area, Delhi– 1100033 First Published, 2001 Reprinted, 2001(thrice), 2002(thrice), 2003(thrice), 2004,2005 ISBN 0333 936795 ANKIT FADIA Born – 1985 (age 27–28) Residence – India, Mumbai Occupation – Author, computer security consultant, MTV host  In 2008, the IMT Ghaziabad Centre for Distance Learning signed an MoU with Fadia to organise its one-year Post-Graduate Diploma in Cyber Security.  In addition, he started providing his own computer security courses, including the "Ankit Fadia Certified Ethical Hacker" programme in alliance with Reliance World. Website – www.ankitfadia.in
  • 3. Hacking Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention
  • 4. Ethical Hacking An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners
  • 6. Hacking Windows BIOS setup Windows login password Changing windows visuals Internet Explorer users Cookies URL address bar URL history
  • 7. Getting your Hands Wet: Net Tool I IP Address Domain Name System or DNS Ports Sockets & Ports PING Tracert Netstat
  • 8. Getting your Hands Wet: Net Tool II Port 23 FTP Port Different FTP Commands SMTP (Port 25) and POP (Port 110) Receiving mail without an Email client POP3 (Port 110) MailBombing
  • 9. Getting Past the Password Password Password Cracking Cracking the Windows Login Password Windows Screen Saver XOR Bypassing the Dial Up Server Password Default Passwords
  • 10. Batch File REM command ECHO: The Batch printing tool The FOR loop PIPING
  • 11. TCP/IP Transport Layer TCP protocols IP protocols UDP scanning
  • 12. A Deeper Approach Number System Decimal Number System Binary Number System Hexadecimal System Converting into different form ASCII Firewalls
  • 13. VIRUS What is Virus File or Program Virus Polymorphic Viruses Macro Virus How to create new virus Simple Encryption Method
  • 14. Perl The Basics Operators Loops While Loop & For Loop Push & Pop Input Output Deleting Files
  • 15. Other Important Topic Protection C Programming Java Scripts Program Hostile Applets The Motive The Attack XOOM
  • 16. Book Review & Information
  • 17. Need of Ethical Hacking  To decrease cyber attacks  For national security  Banking account  Social networking media  Personal information  Terrorism attacks
  • 18. Drawbacks of Ethical Hacking  The ethical hacker using the knowledge they gain to do malicious hacking activities.  The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.  Allowing the company’s financial and banking details to be seen.
  • 19. Career on Network Security & Ethical Hacking  Network Security Systems Manager  Network Security Administrator  Systems/Applications Security Executive  Web Security Administrator  Certifications in Network Security
  • 20. Future of Ethical Hacking
  • 21. Clearing Misconception about this book If you are planning to follow this book so that you can hack your girl-friend's account to check whether she is cheating on you then forget it.  For that you better use scripts available on the internet. This book gives you a clear overview of what hacking is and what you can and cannot do with hacking. Basically it will guide you how to be secure.
  • 22. What Others Said About This Book  Scared of Hackers? Indian Teenager offers help. – The New York Times (Reuters)  He is a teenage prodigy all set to revolutionize the world of information technology. – The Hindu  The book throws light on unexplored horizons of the wired world. – Internet.com  Teen’s ‘Ethical Hacking’ book a hit. – ZD Net Teenage Robin Hood of cyber jungle. – Indian Express Sixteen and he knows it all. – The Pioneer Indian teen writes a real web cracker. – The Asian Age
  • 23. MBA, 1st Sem, 2013-2015 Batch iLEAD, Kolkata West Bengal University of Technology