Prateek Shukla Navneet Mehra

The Unrevealed Secrets of Hacking and Cracking; Hack Before You Get Cracked - 73.7% Plagiarized

Sat Feb 16 15:27:14 CST 2013

By Prateek Shukla & Navneet Mehra

ISBN: 978-81-7806-326-3

Publisher: Unicorn Books


The book "The Unrevealed Secrets of Hacking and Cracking; Hack Before You Get Cracked" was 'written' by Prateek Shukla (prateek2654@gmail.com) and Navneet Mehra (hackers_beware@yahoo.in). According to one article, Mehra has written four other books, which have not been reviewed by attrition.org, and contributed to this one. Via an email conversation, Shukla told us that he wrote most of this book, and Navneet only wrote three chapters (Introduction, Securing Wireless Network, Security for an Organization). Before going into the review, we wanted to point out a few things that bring more clarity to the author's intentions and understanding of writing.

The book begins with acknowledgements that include:

We would like to specially thank Mrs. Sophia Mitra, Mrs. Patralekha Ghosh, Mrs. Suparna Das and Mr. Bunny for being supportive to us and believing in our writing capabilities since a long time. Without valuable inputs from Unicorn Books and the editorial team, this manuscript would not have taken the shape of a book.

Specifically note that all those people "believed in their writing capabilities" when you read the email thread between Prateek Shukla and Jericho, where he attempts to explain the plagiarism.

The Plagiarism

The following table details the portions of the book that were taken from other sources. A full review was not performed due to the amount of plagiarism found by the halway point. Note that we also reviewed the two technical chapters written by Mehra to determine if the plagiarism was limited to one author, and it was not. Information is included to distinguish not only plagiarized material, but also what was done in an attempt to obscure the original source (e.g., removing text or credit). This shows willful infringement of copyright and inexcusable plagiarism.

The percentage calculated is based on the material reviewed, and then projected for the other half of the book. While the second half was largely left alone, there is no reason to suspect that the frequency of plagiarism changed.

Pages / total Description Original Source
1 - 13 Introduction, not counted in review n/a
14 - 15 Footprinting, one and a half page verbatim: hackersthirst.com
Wikipedia
15 Domain Query, 2 sentences verbatim: CSSLP Exam
16 - 17 Port Scanning, some text & images from: hackersknight.blogspot.com
22 Types of Fingerprinting, almost verbatim: symantec.com
23 - 26 Malware Research, three pages from: expect-us.net
29 - 30 Trojans, 1 full page verbatim: hack2wwworld.blogspot.com
30 - 34 Keylogger, Rats, Malware from: expect-us.net
35 RATs, 1 paragraph from: Wikipedia
41 Botnets, 1 paragraph: wiki.answers.com
44 - 47 Keyloggers, 7 paragraphs & 3 screenshots from: makeuseof.com
47 Cookies & Protective Software, 3 paragraphs verbatim: ehacking.net
48 Keyloggers, 1 paragraph: hacker9.com
49 - 50 Antivirus, most verbatim from two sources: 101hacker.com
epictuts.blogspot.com
50 FUD Crypters & Parts of a Crypter, from multiple sources: hacker9.com
thefuturehackers.com
hackforums.net
51 Different Types of Crypters hackingloops.com
51 - 52 What is a Binder, 2 paragraphs: hackpconline.com
52 Disadvantages of Binders, 2 paragraphs: about-spyware01.blogspot.com
54 Icon Changing, mostly from: msantoshkumar.blogspot.com
57 Entire page, from multiple sources: chegg.com
hackersonlineclub.com
CISSP Book
57 - 58 Purpose of Crypto & Key Types, verbatim from: garykessler.net
58 - 59 Secret Key Cryptography, entire section almost verbatim: ihackers.in
59 - 60 Public-key Cryptography, half page & image verbatim: hackersonlineclub.com
60 - 62 One paragraph & Bullets, changed examples names (e.g. s/Dan/Raj etc.) cccure.org
62 Hash Functions, verbatim: garykessler.net
62 Types of Cryptographic Attacks, verbatim from: cccure.org
65 Social Engineering, large parts from: securityxploded.com
66 Art of Manipulation & Reverse Social Engineering, mostly from: CEH Book
66 Phishing Attacks, partially from: securityxploded.com
67 Human-based Social Engineering, 4 bullets verbatim: CEH Book
securityxploded.com
67 - 68 Computer Based Social Engineering, verbatim from: www.cmu.edu
68 - 69 Cycle of Social Engineering, from: securityxploded.com
69 Weapons of Social Engineer, largely from: securityxploded.com
70 Doxing, verbatim from: rafayhackingarticles.net
71 - 72 Social Engineering Countermeasures, verbatim: securityxploded.com
73 Email, 1 paragraph verbatim: Wikipedia
75 - 78 Email Forging, 3 paragraphs & example & countermeasures verbatim from: feedreader.com
80 Phishing, almost verbatim: gohacking.com
82 Countermeasures, almost verbatim: hiponhunter.blogspot.com
88-89 Tabnapping, 5 paragraphs verbatim: techchai.com
90 Prevent Yourself from Being Tabnapped & Browser Security, 5 paragraphs verbatim: techchai.com
90 - 96 Desktop Phishing, most verbatim from: explorehacking.com
97 What is Proxy Server, mostly from whatismyip.com
98 Types of Proxy Servers, taken from multiple sources squid-cache.org
Wikipedia
99 Sockschain Proxy, 3 paragraphs verbatim ufasoft.com
99 - 103 Tor Onion text & walkthrough, most verbatime from: legallyuncensor.blogspot.com
103 - 106 Sectino on Ultrasurf, largely from: shoutmeloud.com
174 - 176 Securing Wireless Networks, almost verbatim: dummies.com
onguardonline.gov #1
onguardonline.gov #2
176 VPN section, verbatim pcworld.com
180 Basic Tips for Network Administrator, verbatim: jobiantony.com
181 Securing Organization's Network, some verbatim, but entirely from: antivirus.coolstudy.org


Total Pages Reviewed Total Pages w/ Plagiarism
99 / 191 (51.8%) 73 / 99 (73.7%)



main page ATTRITION feedback