(BQ) This book, give you an overview of hacking and penetration testing, show you how it’s done, and then I’m going to tell you how to keep your systems secure so that you can’t be hacked! | HACKING BEGINNER’S TO INTERMEDIATE HOW TO HACK GUIDE TO COMPUTER HACKING, PENETRATION TESTING AND BASIC SECURITY TABLE OF CONTENTS Introduction DISCLAIMER What is Hacking? Script Kiddie White Hat Hacker Black Hat Hacker Grey Hat Hacker Hacktivists How to Become a Hacker Web Hacking Writing Exploits Reverse Engineering Finding Exploits and Vulnerabilities Step 1 Step 2 Step 3 Step 4 What is Penetration Testing? What Is A Penetration Test? How to Get Started with Penetration Testing SQL Injection The 5 Phases of Penetration Testing Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks Basic Security How to Protect Yourself from Trojans or a Virus Protecting Yourself Top 10 Security Practices Everyone Should Be Following Use Anti-Virus Software Leave UAC Enabled Enable Your Firewall and Configure It Properly Uninstall Java Keep Your Software Fully Up to Date Be Wary Of Programs You Install and Run Don’t Download Cracked or Pirate Software Be Very Aware of Phishing and Social Engineering Never Reuse Passwords Use Secure .