The book "The Unrevealed Secrets of Hacking and Cracking; Hack Before You Get Cracked" was 'written' by Prateek Shukla (prateek2654@gmail.com) and Navneet Mehra (hackers_beware@yahoo.in). According to one article, Mehra has written four other books, which have not been reviewed by attrition.org, and contributed to this one. Via an email conversation, Shukla told us that he wrote most of this book, and Navneet only wrote three chapters (Introduction, Securing Wireless Network, Security for an Organization). Before going into the review, we wanted to point out a few things that bring more clarity to the author's intentions and understanding of writing.
The book begins with acknowledgements that include:
We would like to specially thank Mrs. Sophia Mitra, Mrs. Patralekha Ghosh, Mrs. Suparna Das and Mr. Bunny for being supportive to us and believing in our writing capabilities since a long time. Without valuable inputs from Unicorn Books and the editorial team, this manuscript would not have taken the shape of a book.
Specifically note that all those people "believed in their writing capabilities" when you read the email thread between Prateek Shukla and Jericho, where he attempts to explain the plagiarism.
The following table details the portions of the book that were taken from other sources. A full review was not performed due to the amount of plagiarism found by the halway point. Note that we also reviewed the two technical chapters written by Mehra to determine if the plagiarism was limited to one author, and it was not. Information is included to distinguish not only plagiarized material, but also what was done in an attempt to obscure the original source (e.g., removing text or credit). This shows willful infringement of copyright and inexcusable plagiarism.
The percentage calculated is based on the material reviewed, and then projected for the other half of the book. While the second half was largely left alone, there is no reason to suspect that the frequency of plagiarism changed.
Pages / total | Description | Original Source |
1 - 13 | Introduction, not counted in review | n/a |
14 - 15 | Footprinting, one and a half page verbatim: | hackersthirst.com Wikipedia |
15 | Domain Query, 2 sentences verbatim: | CSSLP Exam |
16 - 17 | Port Scanning, some text & images from: | hackersknight.blogspot.com |
22 | Types of Fingerprinting, almost verbatim: | symantec.com |
23 - 26 | Malware Research, three pages from: | expect-us.net |
29 - 30 | Trojans, 1 full page verbatim: | hack2wwworld.blogspot.com |
30 - 34 | Keylogger, Rats, Malware from: | expect-us.net |
35 | RATs, 1 paragraph from: | Wikipedia |
41 | Botnets, 1 paragraph: | wiki.answers.com |
44 - 47 | Keyloggers, 7 paragraphs & 3 screenshots from: | makeuseof.com |
47 | Cookies & Protective Software, 3 paragraphs verbatim: | ehacking.net |
48 | Keyloggers, 1 paragraph: | hacker9.com |
49 - 50 | Antivirus, most verbatim from two sources: | 101hacker.com epictuts.blogspot.com |
50 | FUD Crypters & Parts of a Crypter, from multiple sources: | hacker9.com thefuturehackers.com hackforums.net |
51 | Different Types of Crypters | hackingloops.com |
51 - 52 | What is a Binder, 2 paragraphs: | hackpconline.com |
52 | Disadvantages of Binders, 2 paragraphs: | about-spyware01.blogspot.com |
54 | Icon Changing, mostly from: | msantoshkumar.blogspot.com |
57 | Entire page, from multiple sources: | chegg.com hackersonlineclub.com CISSP Book |
57 - 58 | Purpose of Crypto & Key Types, verbatim from: | garykessler.net |
58 - 59 | Secret Key Cryptography, entire section almost verbatim: | ihackers.in |
59 - 60 | Public-key Cryptography, half page & image verbatim: | hackersonlineclub.com |
60 - 62 | One paragraph & Bullets, changed examples names (e.g. s/Dan/Raj etc.) | cccure.org |
62 | Hash Functions, verbatim: | garykessler.net |
62 | Types of Cryptographic Attacks, verbatim from: | cccure.org |
65 | Social Engineering, large parts from: | securityxploded.com |
66 | Art of Manipulation & Reverse Social Engineering, mostly from: | CEH Book |
66 | Phishing Attacks, partially from: | securityxploded.com |
67 | Human-based Social Engineering, 4 bullets verbatim: | CEH Book securityxploded.com |
67 - 68 | Computer Based Social Engineering, verbatim from: | www.cmu.edu |
68 - 69 | Cycle of Social Engineering, from: | securityxploded.com |
69 | Weapons of Social Engineer, largely from: | securityxploded.com |
70 | Doxing, verbatim from: | rafayhackingarticles.net |
71 - 72 | Social Engineering Countermeasures, verbatim: | securityxploded.com |
73 | Email, 1 paragraph verbatim: | Wikipedia |
75 - 78 | Email Forging, 3 paragraphs & example & countermeasures verbatim from: | feedreader.com |
80 | Phishing, almost verbatim: | gohacking.com |
82 | Countermeasures, almost verbatim: | hiponhunter.blogspot.com |
88-89 | Tabnapping, 5 paragraphs verbatim: | techchai.com |
90 | Prevent Yourself from Being Tabnapped & Browser Security, 5 paragraphs verbatim: | techchai.com |
90 - 96 | Desktop Phishing, most verbatim from: | explorehacking.com |
97 | What is Proxy Server, mostly from | whatismyip.com |
98 | Types of Proxy Servers, taken from multiple sources | squid-cache.org Wikipedia |
99 | Sockschain Proxy, 3 paragraphs verbatim | ufasoft.com |
99 - 103 | Tor Onion text & walkthrough, most verbatime from: | legallyuncensor.blogspot.com |
103 - 106 | Sectino on Ultrasurf, largely from: | shoutmeloud.com |
174 - 176 | Securing Wireless Networks, almost verbatim: | dummies.com onguardonline.gov #1 onguardonline.gov #2 |
176 | VPN section, verbatim | pcworld.com |
180 | Basic Tips for Network Administrator, verbatim: | jobiantony.com |
181 | Securing Organization's Network, some verbatim, but entirely from: | antivirus.coolstudy.org |
Total Pages Reviewed | Total Pages w/ Plagiarism |
99 / 191 (51.8%) | 73 / 99 (73.7%) |