Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

by Bryson Payne
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

by Bryson Payne

Paperback

$26.99  $29.99 Save 10% Current price is $26.99, Original price is $29.99. You Save 10%.
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Learn firsthand just how easy a cyberattack can be.

Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are.

You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform.

You’ll learn:
  • How to practice hacking within a safe, virtual environment
  • How to use popular hacking tools the way real hackers do, like Kali Linux, Metasploit, and John the Ripper
  • How to infect devices with malware, steal and crack passwords, phish for sensitive information, and more
  • How to use hacking skills for good, such as to access files on an old laptop when you can’t remember the password
  • Valuable strategies for protecting yourself from cyber attacks

  • You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe.

    Product Details

    ISBN-13: 9781718502000
    Publisher: No Starch Press
    Publication date: 01/18/2022
    Pages: 192
    Sales rank: 627,212
    Product dimensions: 6.90(w) x 9.10(h) x 0.70(d)

    About the Author

    Dr. Bryson Payne is an award-winning cyber coach, professor, author, TEDx speaker, and the founding Director of the Center for Cyber Operations Education at the University of North Georgia. He has taught aspiring coders and cyber professionals at UNG since 1998, including coaching UNG’s #1-in-the-nation NSA Codebreaker Challenge cyber operations team. He served on the coaching staff for the national team representing the US at the 2021 International Cybersecurity Challenge. He enjoys working with K-12 schools worldwide to promote computer science and cybersecurity education, and is the author of Teach Your Kids to Code and Learn Java the Easy Way (both No Starch Press).

    Table of Contents

    Acknowledgments xv

    Introduction vii

    Hacking Basics xvii

    Keeping It Ethical xviii

    How This Book Is Organized xix

    Basics of Cyber Self-Defense xx

    1 Security through Obscurity 1

    How Browsers "Secure" Passwords 2

    Revealing an Obscured Password 2

    Using and Misusing This Hack 6

    Protecting Your Passwords 7

    The Takeaway 8

    2 Physical Access Hacks 9

    The Sticky Keys Hack 10

    Booting from a Windows 10 Installation Disc 10

    Gaining Administrator-Level Access 13

    Now You're an Administrator. Log In! 15

    The Mac Root Hack 17

    Updating the Root User Settings 17

    You're the Root User Nowl 18

    Other Physical Hacks 19

    Protecting Against Physical Hacks 19

    The Takeaway 20

    3 Building Your Own Virtual Hacking Lab 21

    Setting Up VirtualBox 22

    Creating a Kali Linux Virtual Machine 22

    Running the Kali VM 23

    Creating a Windows VM 25

    Connecting Your VMs to a Virtual Network 26

    Connecting Your Kali VM 27

    Connecting Your Windows VM 28

    Updating Your VM Operating Systems 29

    Updating Kali Linux 29

    Updating Windows 30

    The Takeaway 30

    4 Online Reconnaissance and Self-Defense 31

    Google Yourself (Before Your Enemy Does) 32

    Advanced Google Searching 33

    Finding Passwords with the ext: Operator 34

    Finding Passwords with the site: Operator 36

    The Google Hacking Database 37

    How Ethical Hackers Use Google 38

    Social Media and the Dangers of Oversharing 39

    Location Data-Social Media's Unspoken Danger 39

    Protecting Yourself on Social Media 41

    The Takeaway 41

    5 Social Engineering and Phishing Attacks 43

    How Social Engineering Works 44

    Creating a Phishing Website 44

    Cloning a Login Page 47

    Let's Harvest Some Credentials! 48

    Creating a Phishing Email 50

    Protecting Yourself Against Phishing Attacks 51

    The Takeaway 52

    6 Remote Hacking with Malware 53

    Building Your Own Virus 54

    Sharing the Malware 56

    Listening for the Trojan to Phone Home 57

    Infecting Your Windows VM 58

    Controlling Your Windows VM with Meterpreter 61

    Viewing and Uploading Files 63

    Downloading Files from the Victim Computer 64

    Viewing the Victim Computer's Screen 65

    Logging Keystrokes 67

    Spying Through Webcams 68

    Defending Against Malware 70

    The Takeaway 71

    7 Stealing and Cracking Passwords 73

    Password Hashes 74

    Stealing Windows Password Hashes 74

    Creating Windows Users 75

    Hacking Back into Windows 10 with Meterpreter 75

    Escalating Privileges 76

    Stealing Password Hashes with Mimikatz 78

    Cracking Passwords 80

    Free Online Password Databases 80

    John the Ripper 81

    Using Safer Passwords 88

    The Takeaway 89

    8 Web Hacking 91

    The Metasploitable VM 92

    Web Hacking from a Browser 94

    Launching Cross-Site Scripting Attacks 96

    Launching SQL injection Attacks on Databases 100

    Securing Web Applications from XSS, SQLi, and More 103

    The Takeaway 104

    9 Hacking Mobile Devices 105

    Creating an Android Phone/Tablet VM 106

    Launching an Android Trojan 108

    Infecting the Android VM 109

    Controlling the Android VM 111

    Running Apps 113

    Accessing Contacts 115

    Spying Through the Camera 116

    Stealing Files and Snooping Around in Logs 117

    Turning Off the Ringer and More 120

    Defending Against Malicious Apps 122

    The Takeaway 122

    10 Car Hacking and the Internet of Things 125

    Installing the Car-Hacking Software 126

    Preparing the Virtual CAN Bus Network 127

    Hacking the Car 129

    Viewing Packets 129

    Capturing Packets 131

    Replaying Packets 132

    Sending New Commands 132

    How Attackers Hack Real Cars 134

    The Takeaway 134

    11 Ten Things You Can Do Right Now to Protect Yourself Online 135

    1 Realize you're a target 135

    2 Watch out for social engineering 136

    3 Remember the importance of physical security and turn off devices when possible 136

    4 Always think before you click 137

    5 Use a password manager and turn on two-factor authentication 137

    6 Keep your software up-to-date 138

    7 Protect your most sensitive data 138

    8 Use security software wisely 139

    9 Back up the data you want to keep 139

    10 Talk with your family 140

    The Takeaway 140

    A Windows 10 Installation Disc or USB Flash Drive 141

    Downloading Windows 10 142

    Burning Windows 10 onto a DVD 143

    Installing Windows 10 onto a USB Flash Drive 143

    B Troubleshooting Virtualbox 147

    Troubleshooting VirfualBox on Mac 147

    Troubleshooting VirfualBox on Windows 148

    Turn Off Hyper-V Options 148

    Turn On Virtualization in BIOS/UEFI Settings 149

    One Last Issue: Certain Antivirus Programs 151

    Index 153

    From the B&N Reads Blog

    Customer Reviews