Hack the risk off security
Abhishek Joshi

Hacking Crux 2 by Rahul Tyagi is a fluff-free primer of ethical hacking techniques. It is a guide to protecting data from cyber hacks. This is especially relevant in times when cyber crime has made inroads into every nook and cranny of the cyberworld. Interspersed as it is with screenshots and handy tips, the book covers a wide gamut of topics ranging from how to gather information about websites to how to deal with wireless network attacks. Black hat hackers or crackers perform illegal activities typically with malicious intent. 

Hacking Crux 2
By Rahul Tyagi. GyanKosh. Pages 176. `194.

White hat hackers are as capable and experienced as the black hat hackers, but they hack to protect the system rather than destroy it. They are supposed to be ethical hackers who help to protect the system. Each website has who-is information, i.e., to whom the domain name is registered, when it was registered and when it will expire. This information can be accessed at the website www.who.is. HTTrack website copier allows you to download the theme, images and data of any website from the World Wide Web on to your local directory; even the structure of the website will remain intact. This tool can be downloaded from www.httrack.com. You can download an ebook from Google by writing the name of the book in quotes with its extension, for example, “youcanwin.pdf”.

The book warns that most website hackers are capable of targeting your website’s admin panel directly from Google without any hard work. The author thus suggests changing the name of the admin script of your website to something that is not easily identifiable.

Rahul also maintains that an HTML website could be protected by changing the local .xml file directory to some custom directory.

And one can guard against Trojans and backdoor attacks by updating the computer with the latest antivirus program and firewall. The author suggests F-Secure antivirus and Zone Alarm firewall.

Binders and crypter, website hacking techniques, spamming and email forging techniques, email hacking, system hacking, steganography (hiding information), basics of the programming language Python, virus, proxy server and virtual private network, hacking mobile phones and wireless network attacks are other aspects of hacking the book deals with. 

In India, one can trace the city of purchase of a mobile from the mobile number.  This can be done at the website www.way2sms.com And you can track a lost mobile through its IMEI code. So it is indeed a good idea to make a note of the International Mobile Equipment Identity code, a 15-digit number which is unique to a mobile handset. Just key in *#06# on your mobile phone and it will display the IMEI number in most cases. 

In a chapter on wireless network attacks, the writer notes that most Internet users do not realise that connecting their system to the Web through WiFi routers can make them more vulnerable to hackers.

This is a compendium that is packed with practical information and tips for the uninitiated and techies alike. 

 





HOME