Chapter 1 Hacking Basics 1.1 Brief introduction to hackers 1.1.1 The journey of hackers 1.1.2 The origin of hackers 1.2 Hacking process 1.2.1 Target system information collection 1.2.2 Vulnerability information mining and analysis 1.2.3 Obtaining target usage rights 1.2.4 Opening up backdoors 1.2.5 Common techniques used by hackers 1.3 Common commands used by hackers 1.3.1 ping command 1.3.2 net and netstat commands 1.3.3 telnet and ftp commands 1.3.4 tracer[command 1.3.5 ipconfig command 1.3.6 route command 1.3.7 netsh command 1.3.8 arp command 1.4 Exercises for this chapter Chapter 2 Scanning, sniffing and fraud prevention 2.1 Scanning and anti-scanning tools 2.1.1 Check NWindows system 2.1.2 Extremely fast vulnerability scanner 2.1.3 RPC service and vulnerability scanning 2.1.4 Scan personal servers 2.1.5 Scan web pages to see if they are safe 2.1.6 Defense scanner ProtectX 2.2 Typical sniffer 2.2.1 SnifferPortable sniffer captures data 2.2.2 Iris sniffer for LAN 2.2.3 Easy-to-operate audio and video sniffer 2.2.4 Effie Web Detective for capturing web content 2.3 Internet deception 2.3.1 Honeypot with great trapping function 2.3.2 Network law enforcement officers who deny malicious access 2.4 Exercises in this chapter Chapter 3 The secret of password cracking Chapter 4 Intrusion and prevention based on system vulnerabilities Chapter 5 Intrusion and prevention based on Trojan horse Chapter 6 Removal and prevention of Trojan horse Chapter 7 The secret of QQ account theft Chapter 8 Email deception and Bombing Chapter 9 Browser Malicious Attacks Chapter 10 IIS Server Intrusion and Prevention Chapter 11 Security Prevention from Hacker Intrusion