Описание: The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Описание: Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don?t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Описание: Identity theft, fraud, and deception - these are the titles in every newspaper around the globe. As these threats increase it is even more important for consumers, IT Staff and security professionals to be aware and prepared to combat against these. How can we do that without proper education? This book provides a basis for this education and a foundation for protection from social engineering. The best deterrent to a crime is to reveal how the crime is perpetrated. This book provides that reveal and at the same time, steps through how to prevent social engineering threats. Of significant interest is the case study section: Dissecting The Art of Deception's Case Studies Obtaining Information from the DMV The Social Security Administration Our own Case Studies The Over confident CEO The Theme Park Email Scandal As a bonus, readers can also link directly to: http://www.backtrack-linux.org/downloads/ for the latest version of BackTrack Social Engineers Edition, one of the world's premiere penetration testing distributions, with tools and features focused on the social engineer. BackTrack and its solid community can be reviewed at www.remote-exploit.org.
Автор: Josh Pauli Название: The Basics of Web Hacking, ISBN: 0124166008 ISBN-13(EAN): 9780124166004 Издательство: Elsevier Science Рейтинг: Цена: 2766 р. Наличие на складе: Поставка под заказ.
Описание: The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
Автор: Mike Shema Название: Hacking Web Apps, ISBN: 159749951X ISBN-13(EAN): 9781597499514 Издательство: Elsevier Science Рейтинг: Цена: 4499 р. Наличие на складе: Поставка под заказ.
Описание: How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. . Attacks featured in this book include: . • SQL Injection . • Cross Site Scripting . • Logic Attacks . • Server Misconfigurations . • Predictable Pages . • Web of Distrust . • Breaking Authentication Schemes . • HTML5 Security Breaches . • Attacks on Mobile Apps . Even if you don’t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked—as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser – sometimes your last line of defense – more secure.
Автор: Dwivedi, Himanshu Stamos, Alex Lackey, Zane Cannin Название: Hacking exposed web 2.0 ISBN: 0071494618 ISBN-13(EAN): 9780071494618 Издательство: McGraw-Hill Рейтинг: Цена: 5499 р. Наличие на складе: Поставка под заказ.
Описание: Revealing security vulnerabilities in Web-based services, this book provides details on the hacks and attacks alongside countermeasures, risk ratings, and real-world case studies.
Описание: Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
Автор: Gomzin Slava Название: Hacking Point of Sale ISBN: 1118810112 ISBN-13(EAN): 9781118810118 Издательство: Wiley Рейтинг: Цена: 6531 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.
Автор: James Broad Название: Hacking with Kali, ISBN: 0124077498 ISBN-13(EAN): 9780124077492 Издательство: Elsevier Science Рейтинг: Цена: 3690 р. Наличие на складе: Поставка под заказ.
Описание: HackingwithKali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of theKali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of theKali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. . Once you're familiar with the basic components of the software, you'll learn how to use Kalithrough the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. . This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
Автор: Frank Thornton Название: Kismet Hacking, ISBN: 1597491179 ISBN-13(EAN): 9781597491174 Издательство: Elsevier Science Рейтинг: Цена: 5307 р. Наличие на складе: Поставка под заказ.
Описание: Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru