Join us on a literary world trip!
Add this book to bookshelf
Write a new comment Default profile 50px
Subscribe to read the full book or read the first pages for free!
All characters reduced
Some Tutorials in Computer Networking Hacking - cover

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

Publisher: Dr. Hidaia Mahmood Alassouli

  • 0
  • 0
  • 0


The objective of this work is to provide some quick tutorials in computer networking hacking.The work includes the following tutorials:Tutorial 1: Setting Up Penetrating Tutorial in Linux.Tutorial 2: Setting Up Penetrating Tutorial in Windows.Tutorial 3: OS Command Injection: Tutorial 4: Basic SQL Injection Commands. Tutorial 5: Manual SQL injection using order by and union select technique.Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.Tutorial 7: Uploading Shell in the Site having LFI.Tutorial 8: Advanced Way for Uploading ShellTutorial 9: Uploading shell Using Sqli Command.Tutorial 10: Uploading Shell Using SQLmapTutorial 11: Post Based SQL InjectionTutorial 12: Cracking the Hashes Using  Hashcat. Tutorial  13: Hacking windows 7 and 8 through Metasploite Tutorial  14: Tutorial on Cross Site Scripting Tutorial 15: Hacking Android Mobile Using MetasploitTutorial 16: Man of the middle attack:Tutorial 17: Using SQLmap for SQL injectionTutorial 18:  Hide Your IpTutorial 19: Uploading Shell and  Payloads Using SQLmap Tutorial 20: Using Sql Shell in SQLmapTutorial 21: Blind SQL InjectionTutorial 22: Jack Hridoy SQL Injection SolutionTutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. Tutorial 25: How to root the server using back connect Tutorial 25: How to root the server using back connectTutorial 26: HTML InjectionTutorial 27: Tutuorial in manual SQl InjectionTutorial 28: Venom psh-cmd-exe payload Tutorial 29: Cross site Request Forgery (CSRF)Tutorial 30: Disable Victim ComputerTutorial 31: Exploit any firefox by  xpi_bootstrapped addonTutorial 32: Hack android mobile with metasploitTutorial 33: PHP Code Injection to Meterpreter SessionTutorial 34: Basic google operatorsTutorial 35: Hacking Credit Cards with googleTutorial 36: Finding Vulnerable Websites in GoogleTutorial 37: Using the httrack to download websiteTutorial 38: Getting the credit cards using sql injection and the SQLi dumperTutorial 39: Using burp suite to brute force password

Other books that might interest you

  • What on Earth Evolved? in Brief - 100 species that have changed the world - cover

    What on Earth Evolved? in Brief...

    Christopher Lloyd

    • 0
    • 11
    • 0
    Why have creatures evolved as they are?  
    Which species have been the most successful?  
    How do life forms adapt to a world dominated by nearly seven billion humans?  
    Christopher Lloyd leads us on an exhilarating journey from the birth of life to the present day, as he attempts to answer these fundamental questions. Along the way, he reveals the stories of the 100 most influential species that have ever lived, from slime, dragonflies, and dung beetles to dogs, yeast, and bananas. These 100 species are scored and ranked in order of their impact on the planet, life and people.  
    What on Earth Evolved ... in Brief? is a lively and eye-opening insight into mankind's place in nature, and our pivotal relationship with the Earth itself: past, present and future.
    Show book
  • The Healing Power of Sound - cover

    The Healing Power of Sound

    David Gibson

    • 0
    • 0
    • 0
    Sound is medicine, according to the research of David Gibson. Every person, emotion, and ailment has a tone. Sound and frequency can be used to influence mental states, enhance human experience, and heal disease. He explains how music therapy is being applied in healthcare. “It’s unbelievable what’s been happening with people just by using sound and music.”
    Show book
  • Armoured Cruiser Cressy - Detailed in the Original Builders' Plans - cover

    Armoured Cruiser Cressy -...

    Andrew Choong

    • 0
    • 0
    • 0
    The complete set of builders’ plans for the Royal Navy’s Victorian era armored cruiser famously sunk during WWI. 
    The builders of British warships created a highly detailed set of plans for each ship upon completion. These highly detailed, multicolored drawings represented the exact appearance and specifications of the ship as it entered service. Today, the National Maritime Museum and Seaforth Publishing are making these invaluable resources available to the public through a series of books featuring high-quality digital reproductions. 
    This volume presents the plans for the armored cruiser HMS Cressy. Launched on December 4th, 1899, it best known for the disaster of September 22nd, 1914, in which Cressy and two sister-ships were sunk by a small submarine. Though obsolete by the First World War, Cressy-class cruisers were innovative ships in their day. 
    In full color, with many close-ups and enlargements, these plans make every aspect of the HMS Cressy clear and comprehensible. Extensive captions point the reader to important features to be found in the plans, and an introduction covers the design’s background.
    Show book
  • Communicating in Dental Practice - Stress-Free Dentistry and Improved Patient Care - cover

    Communicating in Dental Practice...

    Ruth Freeman, Gerry Humphris

    • 0
    • 0
    • 0
    This book focuses on major communication challenges in clinical practice—that is, communicating effectively with anxious, "difficult," or dissatisfied patients; communicating and integrating preventive and oral health messages and education in primary dental care; and finding ways to improve patient care without adding to the stress of frontline clinical practice. Implementing the strategies devised by these international experts can dramatically improve the success of any dental practice.
    Show book
  • HACKING - Hacking Firewalls & Bypassing Honeypots - cover

    HACKING - Hacking Firewalls &...

    Alex Wagner

    • 0
    • 0
    • 0
    If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. 
    The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work. 
    Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker aka Penetration Tester. 
    -What is The OSI Model 
    -What are Zone Based Firewalls 
    -Firewall Behavior and TCP State Table 
    -Network Address Translation 
    -Port Address Translation 
    -Demilitarized Zone 
    -TCP & UDP Traffic on Firewalls 
    -Client Connection Process 
    -System Intrusion Indicators 
    -Indicators of Network Intrusion 
    -Anomalous Behaviour 
    -Firewall Implementations & Architectures 
    -Packet Filtering Firewalls 
    -Circuit-level Gateway 
    -Application Firewalls 
    -Stateful Firewalls 
    -Next-Gen Firewalls 
    -Detecting Firewalls 
    -IP address spoofing 
    -Source Routing 
    -Tiny fragment attack 
    -Evasion Tools 
    -Intrusion Detection Systems 
    -Signature-based IDS 
    -Statistical Anomaly-based IDS 
    -Network-Based IDS 
    -Host Intrusion Detection System 
    -Evasion by Confusion 
    -Fragmentation attack 
    -Overlapping Fragments Attack 
    -Time-to-Live attack 
    -DoS Attack & Flooding Attack 
    -IDS weakness Detection 
    -Honeypot Types & Honeypot Detection 
    Show book
  • Carving Out a Living on the Land - Lessons in Resourcefulness and Craft from an Unusual Christmas Tree Farm - cover

    Carving Out a Living on the Land...

    Emmet Van Driesche, Verlyn...

    • 0
    • 0
    • 0
    When he first envisioned becoming a farmer, author Emmet Van Driesche never imagined his main crop would be Christmas trees, nor that such a tree farm could be more of a managed forest than the conventional grid of perfectly sheared trees. Carving Out a Living on the Land tells the story of how Van Driesche navigated changing life circumstances, took advantage of unexpected opportunities, and leveraged new and old skills to piece together an economically viable living, while at the same time respecting the land’s complex ecological relationships. 
    From spoon carving to scything, coppicing to wreath-making, Carving Out a Living on the Land proves that you don’t need acres of expensive bottomland to start your land-based venture, but rather the creativity and vision to see what might be done with that rocky section or ditch or patch of trees too small to log. You can lease instead of buy; build flexible, temporary structures rather than sink money into permanent ones; and take over an existing operation rather than start from scratch. What matters are your unique circumstances, talents, and interests, which when combined with what the land is capable of producing, can create a fulfilling and meaningful farming life.
    Show book