Some Tutorials In Computer Hacking

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Some Tutorials In Computer Hacking by Dr. Hidaia Alassouli, Dr. Hidaia Mahmood Alassouli
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dr. Hidaia Alassouli ISBN: 1230002131931
Publisher: Dr. Hidaia Mahmood Alassouli Publication: January 31, 2018
Imprint: Language: English
Author: Dr. Hidaia Alassouli
ISBN: 1230002131931
Publisher: Dr. Hidaia Mahmood Alassouli
Publication: January 31, 2018
Imprint:
Language: English

 

The objective of this work is to provide some quick tutorials in certified ethical hacking.

The work includes the following tutorials:

Tutorial 1: Setting Up Penetrating Tutorial in Linux.
Tutorial 2: Setting Up Penetrating Tutorial in Windows.
Tutorial 3: OS Command Injection:
Tutorial 4: Basic SQL Injection Commands.
Tutorial 5: Manual SQL injection using order by and union select technique.
Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.
Tutorial 7: Uploading Shell in the Site having LFI.
Tutorial 8: Advanced Way for Uploading Shell
Tutorial 9: Uploading shell Using Sqli Command.
Tutorial 10: Uploading Shell Using SQLmap
Tutorial 11: Post Based SQL Injection
Tutorial 12: Cracking the Hashes Using  Hashcat.
Tutorial  13: Hacking windows 7 and 8 through Metasploite
Tutorial  14: Tutorial on Cross Site Scripting
Tutorial 15: Hacking Android Mobile Using Metasploit
Tutorial 16: Man of the middle attack:
Tutorial 17: Using SQLmap for SQL injection
Tutorial 18:  Hide Your Ip
Tutorial 19: Uploading Shell and  Payloads Using SQLmap
Tutorial 20: Using Sql Shell in SQLmap
Tutorial 21: Blind SQL Injection
Tutorial 22: Jack Hridoy SQL Injection Solution
Tutorial 23: Using Hydra to Get the Password\
Tutorial 24: Finding the phpmyadmin page using websploit.
Tutorial 25: How to root the server using back connect
Tutorial 25: How to root the server using back connect
Tutorial 26: HTML Injection
Tutorial 27: Tutuorial in manual Sql Injection
Tutorial 28: Venom psh-cmd-exe payload
Tutorial 29: Cross site Request Forgery (CSRF)
Tutorial 30: Disable Victim Computer
Tutorial 31: Exploit any firefox by  xpi_bootstrapped addon
Tutorial 32: Hack android mobile with metasploit
Tutorial 33: PHP Code Injection to Meterpreter Session
Tutorial 34: Basic google operators
Tutorial 35: Hacking Credit Cards with google
Tutorial 36: Finding Vulnerable Websites in Google
Tutorial 37: Using the httrack to download website
Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper
Tutorial 39: Using burp suite to brute force password:

Note: a lot of tutorials taken from the Pentesting with spirit!  Youtube web site https://www.youtube.com/channel/UC_bzikURwRp3Vdbl3VL959Q

Author: Dr. Hdiaia Alassouli

Email: hidaia_alassouli@hotmail.com

 

 

 

 

 

 

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

 

The objective of this work is to provide some quick tutorials in certified ethical hacking.

The work includes the following tutorials:

Tutorial 1: Setting Up Penetrating Tutorial in Linux.
Tutorial 2: Setting Up Penetrating Tutorial in Windows.
Tutorial 3: OS Command Injection:
Tutorial 4: Basic SQL Injection Commands.
Tutorial 5: Manual SQL injection using order by and union select technique.
Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.
Tutorial 7: Uploading Shell in the Site having LFI.
Tutorial 8: Advanced Way for Uploading Shell
Tutorial 9: Uploading shell Using Sqli Command.
Tutorial 10: Uploading Shell Using SQLmap
Tutorial 11: Post Based SQL Injection
Tutorial 12: Cracking the Hashes Using  Hashcat.
Tutorial  13: Hacking windows 7 and 8 through Metasploite
Tutorial  14: Tutorial on Cross Site Scripting
Tutorial 15: Hacking Android Mobile Using Metasploit
Tutorial 16: Man of the middle attack:
Tutorial 17: Using SQLmap for SQL injection
Tutorial 18:  Hide Your Ip
Tutorial 19: Uploading Shell and  Payloads Using SQLmap
Tutorial 20: Using Sql Shell in SQLmap
Tutorial 21: Blind SQL Injection
Tutorial 22: Jack Hridoy SQL Injection Solution
Tutorial 23: Using Hydra to Get the Password\
Tutorial 24: Finding the phpmyadmin page using websploit.
Tutorial 25: How to root the server using back connect
Tutorial 25: How to root the server using back connect
Tutorial 26: HTML Injection
Tutorial 27: Tutuorial in manual Sql Injection
Tutorial 28: Venom psh-cmd-exe payload
Tutorial 29: Cross site Request Forgery (CSRF)
Tutorial 30: Disable Victim Computer
Tutorial 31: Exploit any firefox by  xpi_bootstrapped addon
Tutorial 32: Hack android mobile with metasploit
Tutorial 33: PHP Code Injection to Meterpreter Session
Tutorial 34: Basic google operators
Tutorial 35: Hacking Credit Cards with google
Tutorial 36: Finding Vulnerable Websites in Google
Tutorial 37: Using the httrack to download website
Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper
Tutorial 39: Using burp suite to brute force password:

Note: a lot of tutorials taken from the Pentesting with spirit!  Youtube web site https://www.youtube.com/channel/UC_bzikURwRp3Vdbl3VL959Q

Author: Dr. Hdiaia Alassouli

Email: hidaia_alassouli@hotmail.com

 

 

 

 

 

 

 

More books from Dr. Hidaia Mahmood Alassouli

Cover of the book Hacking of Computer Network by Dr. Hidaia Alassouli
Cover of the book Transmission of Electrical Power by Dr. Hidaia Alassouli
Cover of the book Electrical Machines by Dr. Hidaia Alassouli
Cover of the book Some Power Electronics Case Studies Using Matlab by Dr. Hidaia Alassouli
Cover of the book Optimal and Suboptimal Control of SMES Devices for Power System Stability Enhancement. by Dr. Hidaia Alassouli
Cover of the book Creating Wordpress Online Store and Wordpress Online Magazine by Dr. Hidaia Alassouli
Cover of the book Evaluation of Some Windows and Linux Security Tools by Dr. Hidaia Alassouli
Cover of the book Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server by Dr. Hidaia Alassouli
Cover of the book Reactive Power Compensation by Dr. Hidaia Alassouli
Cover of the book Comparison Between Internet Fax Services by Dr. Hidaia Alassouli
Cover of the book Signal, Audio and Image Processing by Dr. Hidaia Alassouli
Cover of the book Quick Configuration Of Openldap and Kerberos In Linux And Authenticating Linux To Active Directory by Dr. Hidaia Alassouli
Cover of the book Methods for increasing the Quality and Reliability of Power System using FACTS Devices by Dr. Hidaia Alassouli
Cover of the book Monitoring of Power System Quality by Dr. Hidaia Alassouli
Cover of the book Generation of Electrical Power by Dr. Hidaia Alassouli
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy