eBooks-it.org Logo
eBooks-IT.org Inner Image

Dissecting the Hack

The F0rb1dd3n Network, Revised Edition

Dissecting the Hack Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Jayson E. Street
Edition:1
ISBN-10:1597495689
ISBN-13:9781597495684
Pages:360
Published:Jul 15 2010
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:2.57 MB

Book Description:

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.Revised edition includes a completely NEW STAR Section (Part 2)Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learning

Download Link:

Related Books:

Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis Image
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to:Set up a safe virtual environment to analyze malwareQuickly extract network signatures and host-based indicatorsUse key analysis tools like IDA Pro, OllyDbg, and WinDbgOvercome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-v...

Hack the Stack

Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
Hack the Stack Image
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and w...

Knoppix Hacks

Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC
Knoppix Hacks Image
2nd Edition
If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing.Knoppix Hacks is just like the distribution it covers: a veritable Swiss Army knife packed full of tools. Scores of industrial-strength hacks-many of them new to this second edition-cover both the standard Kno...



2007 - 2021 © eBooks-IT.org