The objective of the book is to summarize to the user with main topics in computer networking hacking.
The book consists of the following parts:
The book consists of the following parts:
- Part 1: Lab Setup
- Part2: Foot printing and Reconnaissance
- Part 3: Scanning Methodology
- Part 4: Enumeration
- Part 5:System Hacking
- Part 6: Trojans and Backdoors and Viruses
- Part 7: Sniffer and Phishing Hacking
- Part 8: Hacking Web Servers
- Part 9:Hacking Windows and Linux Systems
- Part 10: Wireless Hacking
- Part 11: Hacking Mobile Applications