In today’s time where geographical boundaries are easily covered by Internet and computers with click of a button, there are lies risks within The ecosystem. Hacking somebody’s details could lead to damages and losses. In This book we have tried to provide a glimpse into The technology world of The common terms and procedures used by The hackers to intrude into The system. It is a humble effort to make students understand and with help of diagram and images The procedures through which The vulnerabilities are exploited.