6. Hacking Windows
BIOS setup
Windows login password
Changing windows visuals
Internet Explorer users
Cookies
URL address bar
URL history
7. Getting your Hands Wet: Net Tool I
IP Address
Domain Name System or DNS
Ports
Sockets & Ports
PING
Tracert
Netstat
8. Getting your Hands Wet: Net Tool II
Port 23
FTP Port
Different FTP Commands
SMTP (Port 25) and POP (Port 110)
Receiving mail without an Email client
POP3 (Port 110)
MailBombing
9. Getting Past the Password
Password
Password Cracking
Cracking the Windows Login Password
Windows Screen Saver
XOR
Bypassing the Dial Up Server Password
Default Passwords
10. Batch File
REM command
ECHO: The Batch printing tool
The FOR loop
PIPING
12. A Deeper Approach
Number System
Decimal Number System
Binary Number System
Hexadecimal System
Converting into different form
ASCII
Firewalls
13. VIRUS
What is Virus
File or Program Virus
Polymorphic Viruses
Macro Virus
How to create new virus
Simple Encryption Method
14. Perl
The Basics
Operators
Loops
While Loop & For Loop
Push & Pop
Input Output
Deleting Files
15. Other Important Topic
Protection
C Programming
Java Scripts Program
Hostile Applets
The Motive
The Attack
XOOM
17. Need of Ethical Hacking
To decrease cyber attacks
For national security
Banking account
Social networking media
Personal information
Terrorism attacks
18. Drawbacks of Ethical Hacking
The ethical hacker using the
knowledge they gain to do
malicious hacking activities.
The possibility that the ethical
hacker will send and/or place
malicious code, viruses,
malware and other destructive
and harmful things on a
computer system.
Allowing the company’s
financial and banking details to
be seen.
19. Career on Network Security &
Ethical Hacking
Network Security Systems Manager
Network Security Administrator
Systems/Applications Security
Executive
Web Security Administrator
Certifications in Network Security
21. Clearing Misconception about this book
If you are planning to follow this book
so that you can hack your girl-friend's
account to check whether she is
cheating on you then forget it.
For that you better use scripts
available on the internet.
This book gives you a clear overview
of what hacking is and what you can
and cannot do with hacking.
Basically it will guide you how to be
secure.
22. What Others Said About This Book
Scared of Hackers? Indian Teenager offers help.
– The New York Times (Reuters)
He is a teenage prodigy all set to revolutionize the world of
information technology.
– The Hindu
The book throws light on unexplored horizons of the wired world.
– Internet.com
Teen’s ‘Ethical Hacking’ book a hit.
– ZD Net
Teenage Robin Hood of cyber jungle.
– Indian Express
Sixteen and he knows it all.
– The Pioneer
Indian teen writes a real web cracker.
– The Asian Age
23. MBA, 1st Sem, 2013-2015 Batch
iLEAD, Kolkata
West Bengal University of Technology