YOUTUBE
>>> MANISH
O
>>> PUNDER
1|Page
,IMPORTANT DISCLAIMER
The tools and techniques presented are open source, and thus
available to everyone. Investigators and pentesters use them
regularly in assignments, but so do attackers. If you recently
suffered a breach and found a technique or tool illustrated in this
book, this neither incriminates the author of this book in any
way, nor implies any connection between the author and the
perpetrators.
Any actions and/or activities related to the material contained
within this book are solely your responsibility. Misuse of the
information in this book can result in criminal charges being
brought against the persons in question. The author will not be
held responsible in the event that any criminal charges are
brought against any individuals using the information in this
book to break the law.
This book does not promote hacking, software cracking, and/or
piracy. All of the information provided in this book is for
educational purposes only.
Performing any hack attempts or tests without written
permission from the owner of the computer system is illegal.
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the
publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without
warranty, either express or implied. Neither the author nor HackLikePro Publishing or its
dealers and distributors will be held liable for any damages caused or alleged to have been
caused directly or indirectly by this book.
WHO THIS BOOK IS FOR
This book starts from scratch, assuming the reader has no prior knowledge of
hacking/penetration testing. Therefore, it is for anybody interested in learning how to hack or
test the security of systems like real hackers and secure them like security experts.
2|Page
,INSTAGRAM >>> HACKLIKEPRO
YOUTUBE >>> MANISH PUNDER
BOOK DESCRIPTION
This is a Penetration Testing & Information Security Training Book. This book will empower you
with knowledge in a simplified and easily graspable manner. In the training, we teach our
students how hackers break into the systems, network, mobiles, and websites to make them
aware of the possible loopholes and therefore, making them proficient in reverse-penetration.
By doing so, they can create a virtual wall between their data and the hackers. This training
will enable you to carry out attacking as well as defensive methodologies which will help you
and your organization to not only protect but also assess the safety and vulnerability ratio.
READER FEEDBACK
• We always welcome feedback from our students. Let us know what you think, did you
find the book useful and if you liked it or not.
• To send feedback simply sends an email to .
PIRACY
• The free flow of information on the internet has, in addition to many benefits, brought
its share of problems, one of them is copyright infringement. We are well aware that we
can’t fight every unauthorized copy of this book. However, if you have come upon a
copy of this book somewhere on the internet we would like to invite you to take a look
at our courses.
• We are sure once you see the wealth of information and the knowledge you can gain
you will support us by subscribing to a course.
• We often provide discount coupons, making our courses very affordable.
GET IN TOUCH WITH US
Keep a connection with us and we have a lot more things for you.
• Instagram: https://instagram.com/hacklikepro/
• YouTube: SUBSCRIBE NOW
• Telegram Channel: https://t.me/hackworm/
• Telegram (Admin): https://t.me/elliotmalek/
CONTENTS
IMPORTANT
DISCLAIMER .............................................................................................................................
........... 2
MODULE 01: INTRODUCTION TO ETHICAL
HACKING ..................................................................................................... 6
INFORMATION SECURITY
OVERVIEW ........................................................................................................................ 7
MOTIVES, GOALS AND OBJECTIVES OF INFORMATION SECURITY
ATTACKS .............................................................. 7
3|Page
, CLASSIFICATION OF
ATTACKS .................................................................................................................................
8
CYBER KILL
CHAIN........................................................................................................................................
......... 10
INDICATORS OF COMPROMISE
(IOCS) .................................................................................................................... 12
WHAT IS
HACKING? .................................................................................................................................
.............. 13 WHO IS A
HACKER?...................................................................................................................................
............. 14
TYPES OF HACKERS AND WHAT THEY
DO?............................................................................................................. 14
PHASES OF
HACKING ..................................................................................................................................
.......... 14
MODULE 02: HOW
TO ................................................................................................................................................
. 18
FOOTPRINTING THROUGH SEARCH
ENGINES ......................................................................................................... 19
FOOTPRINTING USING ADVANCED GOOGLE HACKING
TECHNIQUES ....................................................................... 21
FOOTPRINTING THROUGH SOCIAL NETWORKING
SITES ......................................................................................... 22
WEBSITE
FOOTPRINTING .........................................................................................................................
.............. 23
FOOTPRINTING .........................................................................................................................
.................. 24
WHOIS
FOOTPRINTING .........................................................................................................................
................. 25
DNS
FOOTPRINTING .........................................................................................................................
..................... 26
NETWORK
FOOTPRINTING .........................................................................................................................
............ 27
4|Page