![Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.8.5)
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
192![Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.8.5)
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
192Paperback
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
Overview
Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are.
You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform.
You’ll learn:
You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe.
Product Details
ISBN-13: | 9781718502000 |
---|---|
Publisher: | No Starch Press |
Publication date: | 01/18/2022 |
Pages: | 192 |
Sales rank: | 629,852 |
Product dimensions: | 6.90(w) x 9.10(h) x 0.70(d) |
About the Author
Table of Contents
Acknowledgments xv
Introduction vii
Hacking Basics xvii
Keeping It Ethical xviii
How This Book Is Organized xix
Basics of Cyber Self-Defense xx
1 Security through Obscurity 1
How Browsers "Secure" Passwords 2
Revealing an Obscured Password 2
Using and Misusing This Hack 6
Protecting Your Passwords 7
The Takeaway 8
2 Physical Access Hacks 9
The Sticky Keys Hack 10
Booting from a Windows 10 Installation Disc 10
Gaining Administrator-Level Access 13
Now You're an Administrator. Log In! 15
The Mac Root Hack 17
Updating the Root User Settings 17
You're the Root User Nowl 18
Other Physical Hacks 19
Protecting Against Physical Hacks 19
The Takeaway 20
3 Building Your Own Virtual Hacking Lab 21
Setting Up VirtualBox 22
Creating a Kali Linux Virtual Machine 22
Running the Kali VM 23
Creating a Windows VM 25
Connecting Your VMs to a Virtual Network 26
Connecting Your Kali VM 27
Connecting Your Windows VM 28
Updating Your VM Operating Systems 29
Updating Kali Linux 29
Updating Windows 30
The Takeaway 30
4 Online Reconnaissance and Self-Defense 31
Google Yourself (Before Your Enemy Does) 32
Advanced Google Searching 33
Finding Passwords with the ext: Operator 34
Finding Passwords with the site: Operator 36
The Google Hacking Database 37
How Ethical Hackers Use Google 38
Social Media and the Dangers of Oversharing 39
Location Data-Social Media's Unspoken Danger 39
Protecting Yourself on Social Media 41
The Takeaway 41
5 Social Engineering and Phishing Attacks 43
How Social Engineering Works 44
Creating a Phishing Website 44
Cloning a Login Page 47
Let's Harvest Some Credentials! 48
Creating a Phishing Email 50
Protecting Yourself Against Phishing Attacks 51
The Takeaway 52
6 Remote Hacking with Malware 53
Building Your Own Virus 54
Sharing the Malware 56
Listening for the Trojan to Phone Home 57
Infecting Your Windows VM 58
Controlling Your Windows VM with Meterpreter 61
Viewing and Uploading Files 63
Downloading Files from the Victim Computer 64
Viewing the Victim Computer's Screen 65
Logging Keystrokes 67
Spying Through Webcams 68
Defending Against Malware 70
The Takeaway 71
7 Stealing and Cracking Passwords 73
Password Hashes 74
Stealing Windows Password Hashes 74
Creating Windows Users 75
Hacking Back into Windows 10 with Meterpreter 75
Escalating Privileges 76
Stealing Password Hashes with Mimikatz 78
Cracking Passwords 80
Free Online Password Databases 80
John the Ripper 81
Using Safer Passwords 88
The Takeaway 89
8 Web Hacking 91
The Metasploitable VM 92
Web Hacking from a Browser 94
Launching Cross-Site Scripting Attacks 96
Launching SQL injection Attacks on Databases 100
Securing Web Applications from XSS, SQLi, and More 103
The Takeaway 104
9 Hacking Mobile Devices 105
Creating an Android Phone/Tablet VM 106
Launching an Android Trojan 108
Infecting the Android VM 109
Controlling the Android VM 111
Running Apps 113
Accessing Contacts 115
Spying Through the Camera 116
Stealing Files and Snooping Around in Logs 117
Turning Off the Ringer and More 120
Defending Against Malicious Apps 122
The Takeaway 122
10 Car Hacking and the Internet of Things 125
Installing the Car-Hacking Software 126
Preparing the Virtual CAN Bus Network 127
Hacking the Car 129
Viewing Packets 129
Capturing Packets 131
Replaying Packets 132
Sending New Commands 132
How Attackers Hack Real Cars 134
The Takeaway 134
11 Ten Things You Can Do Right Now to Protect Yourself Online 135
1 Realize you're a target 135
2 Watch out for social engineering 136
3 Remember the importance of physical security and turn off devices when possible 136
4 Always think before you click 137
5 Use a password manager and turn on two-factor authentication 137
6 Keep your software up-to-date 138
7 Protect your most sensitive data 138
8 Use security software wisely 139
9 Back up the data you want to keep 139
10 Talk with your family 140
The Takeaway 140
A Windows 10 Installation Disc or USB Flash Drive 141
Downloading Windows 10 142
Burning Windows 10 onto a DVD 143
Installing Windows 10 onto a USB Flash Drive 143
B Troubleshooting Virtualbox 147
Troubleshooting VirfualBox on Mac 147
Troubleshooting VirfualBox on Windows 148
Turn Off Hyper-V Options 148
Turn On Virtualization in BIOS/UEFI Settings 149
One Last Issue: Certain Antivirus Programs 151
Index 153