Hacking Zwave and Home Automation Systems, Max Dalziel
Автор: Max Dalziel Название: Hacking the Big Four Databases ISBN: 0128047216 ISBN-13(EAN): 9780128047217 Издательство: Elsevier Science Рейтинг: Цена: 4714.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi."
The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
Offers an overview of how to track people using WiFi and Bluetooth technologies
Описание: Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.
Автор: Johnny Long Название: Google Hacking for Penetration Testers ISBN: 0128029641 ISBN-13(EAN): 9780128029640 Издательство: Elsevier Science Рейтинг: Цена: 7915.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations.
You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.
This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.
Third edition of the seminal work on Google hacking
Google hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT)
Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs
Автор: Sudhanshu Chauhan Название: Hacking Web Intelligence ISBN: 0128018674 ISBN-13(EAN): 9780128018675 Издательство: Elsevier Science Рейтинг: Цена: 7409.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment--that is, reconnaissance--is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru