Search: in
Hacking
Hacking in Books Books
  Tutorials     Encyclopedia     Videos     Books     Software     DVDs  
       
Book search results for Hacking

Hacking


Hacking

Hacking

Book search results for Hacking

    1.
        
[More Info ...]
     Hacking: The Art of Exploitation, 2nd Edition
Publisher: No Starch Press
Author(s): Jon Erickson

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

  • Program computers using C, assembly language, and shell scripts


  • Corrupt system memory to run arbitrary code using buffer overflows and format strings


  • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening


  • Outsmart common security measures like nonexecutable stacks and intrusion detection systems


  • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence


  • Redirect network traffic, conceal open ports, and hijack TCP connections


  • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.



[More Info ...]






    2.
        
[More Info ...]
     The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
Publisher: Syngress
Author(s): Patrick Engebretson

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you� to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

  • Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases
  • Written by an author who has practical experience as a Penetration Tester and who has taught "Introduction to Penetration Testing? for 5 years
  • Utilizes Backtrack Linux distribution and the "core? tools required to complete a penetration test


[More Info ...]






    3.
        
[More Info ...]
     Hacking For Dummies
Publisher: For Dummies
Author(s): Kevin Beaver

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.

  • Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
  • Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place
  • Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux
  • Explains ethical hacking and why it is essential

Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.

[More Info ...]







    4.
        
[More Info ...]
     Hacking For Beginners - a beginners guide for learning hacking (Original)
Publisher:
Author(s): Manthan Desai

This Book Will Guide You Through The Basic And Advanced Steps of Hacking And Will Help You Develop The Hacker Attitude.You Will Learn Various Kinds Of Hacking Including Windows Hacking, Linux Installation & Use, Linux Hacking, Virus Programming, Malware Programming, Trojan Programming, Rootkit Programming, Cross Site Scripting (XXS), Wireless Hacking (Wep, Wpa & Wpa2), Email Hacking, Mobile Hacking, Sniffing & Password Cracking. This Book Promises You To Take You To High Fields Of Advanced Hacking & Cracking & Hence Make You One Of the Best Ethical Hackers Ever.

[More Info ...]






    5.
        
[More Info ...]
     Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Publisher: McGraw-Hill Osborne Media
Author(s): Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

  • Develop and launch exploits using BackTrack and Metasploit
  • Employ physical, social engineering, and insider attack techniques
  • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
  • Understand and prevent malicious content in Adobe, Office, and multimedia files
  • Detect and block client-side, Web server, VoIP, and SCADA attacks
  • Reverse engineer, fuzz, and decompile Windows and Linux software
  • Develop SQL injection, cross-site scripting, and forgery exploits
  • Trap malware and rootkits using honeypots and SandBoxes


[More Info ...]






    6.
        
[More Info ...]
     The BackTrack Experience - Introduction to WhiteHat Hacking
Publisher:
Author(s): Karthik Ranganath

"The BackTrack Experience of a Novice - Introduction to WhiteHat Hacking" is about my experience with back track and I have documented it in the form of a book. I am sure beginners will surely save a lot of their time in understanding concepts, if they go through this book.

This book is purely practical in nature, with hints of theory just where needed.

[More Info ...]






    7.
        
[More Info ...]
     Social Engineering: The Art of Human Hacking
Publisher: Wiley
Author(s): Christopher Hadnagy

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick?one of the most famous social engineers in the world?popularized the term ?social engineering.? He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers?now you can do your part by putting to good use the critical information within its pages.

From the Author: Defining Neuro-Linguistic Hacking (NLH)

Author Chris Hadnagy
NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to ?hack? the human infrastructure. Let?s take a closer at each to see how it applies.

Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on "a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them" and "a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior"

Neuro: This points to our nervous system which we process our five senses:
? Visual
? Auditory
? Kinesthetic
? Smell
? Taste

Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:
? Pictures
? Sounds
? Feelings
? Tastes
? Smells
? Words

Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.

In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).

Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person?s true emotions.

Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.

[More Info ...]






    8.
        
[More Info ...]
     WINDOWS HACKING
Publisher: VIKAS PUBLISHING HOUSE PVT LTD
Author(s): Ankit Fadia

About the Book:

"Want to improve the security of your Windows system? Want to customize the look and feel of your Windows system? Want to control all aspects and features of your Windows? Windows Hacking throws light on how to tweak the operating system to make the most of all its features, functionally, looks and feel. The comprehensively researched security tips, tricks and hacks covered in this book shall allow readers to secure Windows better, customize almost all its aspects to suit personal preferences and make it work the extra mile. After reading this book, not only with readers be able to protect their Windows system against the most common vulnerabilities, loopholes and threats, but will also be able to play cool tricks to impress their friends. A fun and light read that will also make the reader more aware of Windows related security issues and practices. Windows Hacking can help you have harmless fun with friends and family. It will also help you guard against malicious attacks. Handle with care and happy hacking. "

Contents:

1.Passwords, 2.The Look and Feel

About The Author:

Ankit Fadia is an acknowledged worldwide prodigy on computers security and cyber terrorism. At 21 years of age, he has rare distinction of having authored seven internationally best-selling books. He has conducted more than 1000 seminars in 25 countries, received 45 awards, set up his own computer security consulting, training and publishing company in Kuala Lumpur, Malaysia, with operations all across the Asia Pacific region and runs independent courses. Based out of the Silicon Valley in California, USA, he is also a student at Standard University. Widely traveled, he has provided customized security solutions to an impressive clientele across North America, Asia, Australia and the Middle East. Honoured with numerous international awards, he is regularly invited by BBC Radio World News, London, UK, to share the latest updates on computer security.

[More Info ...]






    9.
        
[More Info ...]
     Hacking: The Next Generation (Animal Guide)
Publisher: O'Reilly Media
Author(s): Nitesh Dhanjani, Billy Rios, Brett Hardin

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

  • Learn how "inside out" techniques can poke holes into protected networks
  • Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations


[More Info ...]






    10.
        
[More Info ...]
     Hacking Exposed Wireless, Second Edition
Publisher: McGraw-Hill Osborne Media
Author(s): Johnny Cache, Joshua Wright, Vincent Liu

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide.

  • Build and configure your Wi-Fi attack arsenal with the best hardware and software tools
  • Explore common weaknesses in WPA2 networks through the eyes of an attacker
  • Leverage post-compromise remote client attacks on Windows 7 and Mac OS X
  • Master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, and the all new KillerBee
  • Evaluate your threat to software update impersonation attacks on public networks
  • Assess your threat to eavesdropping attacks on Wi-Fi, Bluetooth, ZigBee, and DECT networks using commercial and custom tools
  • Develop advanced skills leveraging Software Defined Radio and other flexible frameworks
  • Apply comprehensive defenses to protect your wireless devices and infrastructure


[More Info ...]






    11.
        
[More Info ...]
     Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition: Network Security Secrets and Solutions
Publisher: McGraw-Hill Osborne Media
Author(s): Stuart McClure, Joel Scambray, George Kurtz

A fully updated edition of the world?s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new ?5 Deployments? approach for the first time that provides five key actions for every countermeasure?focused on five areas of expertise:

1. Network Security
2. Server Security
3. Mobile Security
4. Endpoint Security
5. Web Security

Hacking Exposed 7 applies the authors? internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving ?one best? command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
?If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.? --Marty Roesch, creator of the Snort tool

?Informational gold.? --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

?Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed? --Thomas Ptacek, Researcher at Arbor Networks

?If this book doesn't scare and motivate you to take security seriously, nothing will.? --AlephOne, Bugtraq Moderator

?The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.? - Simple Nomad, author of The Hack FAQ and Pandora

?A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.? --Lance Spitzner, President and Founder of the Honeynet Project

[More Info ...]







    12.
        
[More Info ...]
     Low Tech Hacking: Street Smarts for Security Professionals
Publisher: Syngress
Author(s): Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture


[More Info ...]






    13.
        
[More Info ...]
     Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Publisher: McGraw-Hill Osborne Media
Author(s): Stuart McClure, Joel Scambray, George Kurtz

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

"For security to be successful in any company, you must ?think evil' and be attuned to your ?real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems

"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company

"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code


[More Info ...]






    14.
        
[More Info ...]
     Hands-On Ethical Hacking and Network Defense
Publisher: Delmar Cengage Learning
Author(s): Michael T. Simpson, Kent Backman, James Corley

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

[More Info ...]






    15.
        
[More Info ...]
     Hacking Exposed, Sixth Edition
Publisher: McGraw-Hill Osborne Media
Author(s): Joel Scambray, George Kurtz, Stuart McClure

The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. Hacking Exposed 6� applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers."A cross between a spy novel and a tech manual." --Mark A. Kellner,� Washington Times ;The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure. --Bill Machrone, PC Magazine ;A must-read for anyone in security . . . One of the best security books available. --Tony Bradley, CISSP, About.com.

[More Info ...]






    16.
        
[More Info ...]
     Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Publisher: Syngress
Author(s): Thomas Wilhelm, Jason Andress

Ever thought of using the time-tested tactics and techniques of�the ancient�ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse!

  • Discusses techniques used by malicious attackers in real-world situations
  • Details unorthodox penetration testing techniques by getting inside the mind of a ninja
  • Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks


[More Info ...]






    17.
        
[More Info ...]
     HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Publisher: McGraw-Hill Osborne Media
Author(s): Joel Scambray, Vincent Liu, Caleb Sima

The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.

  • Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster
  • See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation
  • Understand how attackers defeat commonly used Web authentication technologies
  • See how real-world session attacks leak sensitive data and how to fortify your applications
  • Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques
  • Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments
  • Safety deploy XML, social networking, cloud computing, and Web 2.0 services
  • Defend against RIA, Ajax, UGC, and browser-based, client-side exploits
  • Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures


[More Info ...]






    18.
        
[More Info ...]
     Metasploit: The Penetration Tester's Guide
Publisher: No Starch Press
Author(s): David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni

"The best guide to the Metasploit Framework." ?HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Learn how to:

  • Find and exploit unmaintained, misconfigured, and unpatched systems
  • Perform reconnaissance and find valuable information about your target
  • Bypass anti-virus technologies and circumvent security controls
  • Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
  • Use the Meterpreter shell to launch further attacks from inside the network
  • Harness standalone Metasploit utilities, third-party tools, and plug-ins
  • Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.



[More Info ...]






    19.
        
[More Info ...]
     The Hacker's Cookbook: The Ultimate Book of Hacks, Mods, and Computer Tricks
Publisher: Mod Press
Author(s): Jason Nigel

Have you always wanted to be an amateur hacker, but didn't know how? This book will get you started. It's a beginners guide to basic computer and video game hacks, and is intended for people with no prior experience.

In this edition of the book, you will learn how to:
*Convert and back-up DVDs and even put them on your cell phone
*Hack into a Wi-Fi to see what the WEP key is
*Play old Nintendo games on your computer
*Build a virtual cloud to share files with your friends online
*Get free cable on your computer
*Receive email on your phone without a data plan
*Make back-up copies of Wii games

And much more!

[More Info ...]






    20.
        
[More Info ...]
     Hacking College
Publisher: Dean Kohrs
Author(s): Dean Kohrs

I wish I had known that when I was in college!" Sadly, it's an all too common phrase among college graduates. There's a big difference between college graduates, who often end up working the same Mcjobs after graduation they had as students, and those who have used college as a launching platform which prepares them to survive and thrive in the 21st century. How do you learn this neat little hack? By listening to those who already have. Hacking College will teach you how college works. More importantly, it will teach you how to make college work for you! Among the valuable and often surprising lessons Hacking College offers: College is a portal to the world--use it as one! Why you are a start-up company. What you need to master in college to thrive in the globalized world. Why all schools are not the same and why a "good school" might be a bad choice for you. How you can get into and afford almost any school if you plan ahead. How to navigate Finance and financial aid in the 21st century. What to do when the system fails you and how to prevent it from happening. How your social network can be more valuable than your degree. There is a digital divide, and you don't want to be on the wrong side. The easiest route to the most valuable degree.

[More Info ...]







Books 1 - 20 of 1000          Next

Hacking
Search   in  
Search for Hacking in Tutorials
Search for Hacking in Encyclopedia
Search for Hacking in Videos
Search for Hacking in Books
Search for Hacking in Software
Search for Hacking in DVDs
Search for Hacking in Store


Advertisement




Hacking in Books
Hacking top Hacking

Home - Add TutorGig to Your Site - Disclaimer

©2011-2013 TutorGig.info All Rights Reserved. Privacy Statement