Skip to content
Paperback The Unofficial Guide to Ethical Hacking Book

ISBN: 1598630628

ISBN13: 9781598630626

The Unofficial Guide to Ethical Hacking

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$14.59
Save $35.40!
List Price $49.99
Almost Gone, Only 2 Left!

Book Overview

Intended for beginning hackers and business managers interested in security, this guide explains how to break into the Windows operating system, network servers, e-mails, instant messages, and web... This description may be from another edition of this product.

Customer Reviews

5 ratings

Easy Read; Informative

As an IT professional, I was looking for comprehensive reading to strengthen my network security knowledge. This book fulfilled that goal well. I am very pleased at the value obtained. I would surely recommend this material to those interested. It appears easy enough of a read for a beginner, but even as a seasoned vet I found it very useful.

Easy Read; Informative

As an IT professional, I was looking for comprehensive reading to strenghten my network security knowledge. This book fulfilled that goal well. I am very pleased at the value obtained. I would surely recommend this material to those interested. It appears easy enough of a read for a beginner, but even as a seasoned vet I found it very useful.

Very Impressive!

Even after spending 6 years in the security field this kid did not fail to leave an impact on me. I am thoroughly impressed by his effort and would like to take this opportunity to congratulate the author for his work. The Unofficial Guide to ethical hacking is a huge book consisting of 7 hundred pages. It starts off with the author clarifying the stand of hackers and crackers and goes onto the first thing that a person would see as soon as he switches his system on: The Operating System. This section describes and discusses the core of the system, changing the core of system, changing the entire OS to make it work your own, the Registry and hex editing the various system files etc etc. This chapter also has a very interesting section on various fun tips and tricks that one can play on others. The section that was of great use to me was the section on Privacy on the Internet, which explained how to remain anonymous on the net and not leave behind any tracks. Another main attraction of this first chapter is the Untold tips and tricks.Next the author moves onto the various Protocols & small networking concepts like HTTP, POP, Telnet, Ports, coding your own sockets, port scanning, writing your own port scanner etc etc which are essential for every beginner to come onto the right track and also important for every expert to refresh his\her memory. This chapter also has very interesting sections like "Hacking into Routers", "Coding your own Keylogger", "Writing HTA Applications", How to study email headers to prevent spam, ping, traceroute etc etc.The best chapter without any doubt is the chapter titled: Getting Past the Password. In this chapter the author has discussed in great detail, as to how one can bypass\crack all\any kind of passwords that they come across: Windows login Password, Internet connection Password, HTTP Password, UNIX Password file, \etc\passwd,ICQ Password, File Sharing Passwords, NT Password, Netzero Passwords,BIOS Passwords, Cisco Router Passwords, DES Algorithms and Screen Saver Passwords, and any other password that one comes across on a network. The chapter also has an exhaustive listings of around 1000 default passwords which work on varoius OS's and daemons. Other key sections include XOR Encryption, Cryptography, Number Systems etc. Lots of code has also been included.Another favorite chapter of mine is the chapter on Networking. It discusses all of the following topics in amazingly simple but more importantly in an exhaustive manner: Port Scanning, IP Spoofing, DNS Spoofing, DOS Attacks, TCP\UDP, the TCP/IP Protocol Suite. Distributed DOS Attacks. It portrays networking in a very simplied easy to comprehend manner. Again lots of source code has been included. One can never not learn networking from this chapter.Although I do not have much interest in Viruses, however in the later stages of the book the author has also covered in excrutiating detail about Viruses: How to Code them?, How to fight viruses and how they wor

A must buy book

Although I am yet to receive my copy of this book, I have read this young lad's tutorials on his Hacking Truths site and I am pretty impressed. I work for a security firm in the US and found myself referring to the author's website for several purposes. What I really like about his work, is his writing style: simple but extremely comprehensive. Going by his website, I think this book is going to be smashing bestseller. I have already ordered one and can't wait to receive it. Overall all his writings are very well written.

Great Buy

I think "The Unofficial Guide of Ethical Hacking" is definitely great buy. I am a beginner in the field of computer security and found this book the perfect prep to learning how to hack. Before buying this book, I had also bought other books like Happy Hacker and Hacking Exposed etc etc so on, however, both of them were not as satisfactory and as compreensive as this one. I really loved this book and would recommend it to all.Signed,Steve J
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured