Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Learn firsthand just how easy a cyberattack can be. Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are. You’ll be guided through setting up a virtual hacking lab, so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform.

Author(s): Bryson Payne
Edition: Illustrated
Publisher: No Starch Press
Year: 2022

Language: English
Pages: 245

Title Page
Copyright
Dedication
About the Author
Acknowledgments
Introduction
Hacking Basics
Keeping It Ethical
How This Book Is Organized
Basics of Cyber Self-Defense
Chapter 1: Security Through Obscurity
How Browsers “Secure” Passwords
Revealing an Obscured Password
Using and Misusing This Hack
Protecting Your Passwords
The Takeaway
Chapter 2: Physical Access Hacks
The Sticky Keys Hack
Booting from a Windows 10 Installation Disc
Gaining Administrator-Level Access
Now You’re an Administrator. Log In!
The Mac Root Hack
Updating the Root User Settings
You’re the Root User Now!
Other Physical Hacks
Protecting Against Physical Hacks
The Takeaway
Chapter 3: Building Your Own Virtual Hacking Lab
Setting Up VirtualBox
Creating a Kali Linux Virtual Machine
Running the Kali VM
Creating a Windows VM
Connecting Your VMs to a Virtual Network
Connecting Your Kali VM
Connecting Your Windows VM
Updating Your VM Operating Systems
Updating Kali Linux
Updating Windows
The Takeaway
Chapter 4: Online Reconnaissance and Self-Defense
Google Yourself (Before Your Enemy Does)
Advanced Google Searching
Finding Passwords with the ext: Operator
Finding Passwords with the site: Operator
The Google Hacking Database
How Ethical Hackers Use Google
Social Media and the Dangers of Oversharing
Location Data—Social Media’s Unspoken Danger
Protecting Yourself on Social Media
The Takeaway
Chapter 5: Social Engineering and Phishing Attacks
How Social Engineering Works
Creating a Phishing Website
Cloning a Login Page
Let’s Harvest Some Credentials!
Creating a Phishing Email
Protecting Yourself Against Phishing Attacks
The Takeaway
Chapter 6: Remote Hacking with Malware
Building Your Own Virus
Sharing the Malware
Listening for the Trojan to Phone Home
Infecting Your Windows VM
Controlling Your Windows VM with Meterpreter
Viewing and Uploading Files
Downloading Files from the Victim Computer
Viewing the Victim Computer’s Screen
Logging Keystrokes
Spying Through Webcams
Defending Against Malware
The Takeaway
Chapter 7: Stealing and Cracking Passwords
Password Hashes
Stealing Windows Password Hashes
Creating Windows Users
Hacking Back into Windows 10 with Meterpreter
Escalating Privileges
Stealing Password Hashes with Mimikatz
Cracking Passwords
Free Online Password Databases
John the Ripper
Using Safer Passwords
The Takeaway
Chapter 8: Web Hacking
The Metasploitable VM
Web Hacking from a Browser
Launching Cross-Site Scripting Attacks
Launching SQL Injection Attacks on Databases
Securing Web Applications from XSS, SQLi, and More
The Takeaway
Chapter 9: Hacking Mobile Devices
Creating an Android Phone/Tablet VM
Launching an Android Trojan
Infecting the Android VM
Controlling the Android VM
Running Apps
Accessing Contacts
Spying Through the Camera
Stealing Files and Snooping Around in Logs
Turning Off the Ringer and More
Defending Against Malicious Apps
The Takeaway
Chapter 10: Car Hacking and the Internet of Things
Installing the Car-Hacking Software
Preparing the Virtual CAN Bus Network
Hacking the Car
Viewing Packets
Capturing Packets
Replaying Packets
Sending New Commands
How Attackers Hack Real Cars
The Takeaway
Chapter 11: Ten Things You Can Do Right Now to Protect Yourself Online
1. Realize you’re a target.
2. Watch out for social engineering.
3. Remember the importance of physical security and turn off devices when possible.
4. Always think before you click.
5. Use a password manager and turn on two-factor authentication.
6. Keep your software up-to-date.
7. Protect your most sensitive data.
8. Use security software wisely.
9. Back up the data you want to keep.
10. Talk with your family.
The Takeaway
Appendix A: Creating a Windows 10 Installation Disc or USB Flash Drive
Downloading Windows 10
Burning Windows 10 onto a DVD
Installing Windows 10 onto a USB Flash Drive
Appendix B: Troubleshooting VirtualBox
Troubleshooting VirtualBox on Mac
Troubleshooting VirtualBox on Windows
Turn Off Hyper-V Options
Turn On Virtualization in BIOS/UEFI Settings
One Last Issue: Certain Antivirus Programs
Index