Many people ask the question that they want to learn hacking. Many want to learn it for one purpose or another and don’t know where to start from.
Alan T. Norman, a proud, savvy, and ethical hacker from San Francisco City has compiled a pdf file on Hacking for beginners.
The file looks at How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, and Your First Hack
Table of contents
- Chapter 1. What is Hacking?
- Chapter 2. Vulnerabilities And Exploits
- Chapter 3. Getting Started
- Chapter 4. The Hacker’s Toolkit
- Chapter 5. Gaining Access
- Chapter 6. Malicious Activity and Code
- Chapter 7. Wireless Hacking
- Chapter 8. Your First Hack
- Chapter 9. Defensive Security & Hacker Ethics
- Chapter 10. Make your Own Keylogger in C++
- Chapter 11. Setting Up The Environment
- Chapter 12. Setting the Eclipse environment
- Chapter 13. Programming Basics (Crash course on C++)
- Chapter 14. A Typical Program
- Chapter 15. Pointers and Files
- Chapter 16. Basic Keylogger
- Chapter 17. Upper and Lower case letters
- Chapter 18. Encompassing other characters
- Chapter 19. Hide Keylogger console window
The book begins in Chapter 1: What is Hacking? with some basic definitions so that the reader can become familiar with some of the language and jargon used in the realms of hacking and computer security, as well as to clear up any ambiguities in terminology. Chapter 1 also distinguishes the different types of hackers with regard to their ethical and legal intentions and the ramifications of their activities.
In Chapter 2: Vulnerabilities and Exploits, the central concept of target vulnerability is introduced, describing the the main vulnerability categories and some specific examples. This leads into a discussion of how hackers take advantage of vulnerabilities through the practice of exploitation.
Chapter 3: Getting Started walks through the many subjects and skills with which a beginning hacker needs to become familiar. From computer and network hardware, to communication protocols, to computer programming languages, the chief topical areas of a hacker’s knowledge base are outlined.
Chapter 4: The Hacker’s Toolkit delves into the common hardware, software, operating systems, and programming languages generally preferred by hackers to ply their trade.
The general procedures for some common computer attacks are surveyed in Chapter 5: Gaining Access, providing some select examples of attacks that are often of interest to hackers and computer security professionals.
Chapter 6: Malicious Activity and Code reveals some of the more nefarious attacks and constructs of hackers who aim to cause harm. The differences between the different categories of malicious code are explained.
Chapter 7: Wireless Hacking focuses specifically on the exploitation of vulnerabilities in Wi-Fi network encryption protocols. The specific hardware and software tools needed to execute simple Wi-Fi attacks are listed.
The reader is given some practical guidance on setting up and practicing some beginner-level hacking in Chapter 8: Your First Hack. Two exercises are selected to help the aspiring hacker get their feet wet with some simple
tools and inexpensive equipment.
Chapter 9: Defensive Security & Hacker Ethics wraps up this introduction to hacking with some notes about protecting oneself from hackers, and discusses some of the philosophical issues associated with the ethics of hacking.
Reading your article helped me a lot and I agree with you. But I still have some doubts, can you clarify for me? I’ll keep an eye out for your answers.