Introduction to gaining access

Now you have enough information to go ahead and try to gain access to other systems, to computers, servers, web servers, and stuff like that. In this section, we're going to be talking about gaining access to computer devices. What do we mean by computer devices? Any electronic device you see is a computer. A phone, a TV, a laptop, a web server, a website, a network, a router; all of these things are computers. Each one of them has an operating system, and they have programs installed on these operating systems. In most cases, these computers are used by a user. Here, we are going to be talking about how to gain access to computers. In this example, we are going to use a computer. We are going to have a Windows device target, and we're going to have a Linux device hacker. But the concept is always the same; getting access to computer devices is always the same. We can apply the same concepts if we are targeting a phone, a tablet, or a web server, but we will be considering them all just like a normal computer. This is very important to understand: every device we see is a computer, and they work just like our personal computer. We can set up a web server on our computer, we can make it look and act like a website, or even make it act like a TV, or, for that matter, anything we want. Literally, TVs and all such things are just simple computers with less complicated hardware in them.

We're going to be talking about attacking these devices from two main sides: the server side and the client side.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.229.113