by Kevin Beaver, CISSP
Hacking
FOR
DUMmIES
‰
4TH EDITION
Hacking For Dummies
®
, 4th Edition
Published by
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2013 by John Wiley & Sons, Inc., Hoboken, New Jersey
Published by John Wiley & Sons, Inc., Hoboken, New Jersey
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit-
ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written
permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the
Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600.
Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley
& Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://
www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!,
The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and
related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its afli-
ates in the United States and other countries, and may not be used without written permission. All other
trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any
product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO
REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF
THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITH-
OUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE
CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES
CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE
UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR
OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF
A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE
AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZA-
TION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE
OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES
THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT
MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS
WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND
WHEN IT IS READ.
For general information on our other products and services, please contact our Customer Care
Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.
For technical support, please visit www.wiley.com/techsupport.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material
included with standard print versions of this book may not be included in e-books or in print-on-demand.
If this book refers to media such as a CD or DVD that is not included in the version you purchased, you
may download this material at http://booksupport.wiley.com. For more information about Wiley
products, visit www.wiley.com.
Library of Congress Control Number: 2012955723
ISBN 978-1-118-38093-2 (pbk); ISBN 978-1-118-38094-9 (ebk); ISBN 978-1-118-38095-6 (ebk);
ISBN 978-1-118-38096-3 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
About the Author
Kevin Beaver is an independent information security consultant, expert
witness, professional speaker, and author with Atlanta-based Principle
Logic, LLC. He has two and a half decades of experience and specializes in
performing information security assessments for corporations, security
product vendors, independent software developers, universities, government
agencies, and nonprot organizations. Before starting his information
security consulting practice in 2001, Kevin served in various information
technology and security roles for several healthcare, e-commerce, nancial,
and educational institutions.
Kevin has appeared on CNN television as an information security expert
and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small
Business, Women’s Health, and Inc. magazine’s technology site IncTechnology.
com. Kevin’s work has also been referenced by the PCI Council in their Data
Security Standard Wireless Guidelines. Kevin has been a top-rated speaker,
giving hundreds of presentations and panel discussions for IT and security
seminars, conferences, and webcasts over the past decade.
Kevin has authored/coauthored 10 information security books, including
Hacking Wireless Networks For Dummies, Implementation Strategies for
Fullling and Maintaining IT Compliance (Realtimepublihers.com), and The
Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). Kevin
has written more than 30 whitepapers and 600 articles and is a regular
contributor to SearchCompliance.com, SearchEnterpriseDesktop.com, and
Security Technology Executive magazine. Kevin is the creator and producer
of the Security On Wheels audiobooks, which provide security learning for
IT professionals on the go (securityonwheels.com), and the Security On
Wheels blog (securityonwheels.com/blog). He also covers information
security and related matters on Twitter (@kevinbeaver) and YouTube
(PrincipleLogic). Kevin earned his bachelor’s degree in Computer
Engineering Technology from Southern College of Technology and his
master’s degree in Management of Technology from Georgia Tech. He has
obtained his CISSP certication in 2001 and also holds MCSE, Master CNE,
and IT Project+ certications.
Kevin can be reached through his website, www.principlelogic.com,
and you can connect to him via LinkedIn at www.linkedin.com/in/
kevinbeaver.