The Hacker’s Underground Handbook
By: David Melnichuk

What is Hacking?
Hacking is identifying weaknesses in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system

History of hacking/hackers
In its current usage, the term dates back to the 1970s. In 1980, an article in Psychology Today used the term “hacker” in its title: “The Hacker Papers,” which discussed the addictive nature of computer use.
Then there's the 1982 American science fiction film, Tron, in which the protagonist describes his intentions to break into a company's computer system as hacking into it. The plot of another movie released the next year, WarGames, centered on a teenager's computer intrusion into the North American Aerospace Defense Command (NORAD). It was a fiction that introduced the specter of hackers as a threat to national security. With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time. And these hackers cause many destructive problems making it difficult for other users to use the Internet safely. But have you ever heard of ethical hackers?
         IT Security and Ethical Hacking.
         Network Hacking Continued - Intermediate to Advanced.
         Learn Ethical Hacking in 2020: Beginner to Advanced!
         Ultimate Ethical Hacking Boot Camp - Beginner to Pro.
         Real-World Ethical Hacking: Hands-on Cybersecurity.
         Learn the Methods of Facebook hacking in Ethical Way.


Content
Programming................................................................9
Linux............................................................................12
Passwords Cracking.....................................................33
Phishing
Network Hacking.........................................................48
Wireless Hacking.........................................................70
Windows Hacking.......................................................79
Malware.......................................................................93
Web Hacking...............................................................104
Conclusion...................................................................114