Hacking exposed

1.9K 280 0
Hacking exposed

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Đây là bộ sách tiếng anh cho dân công nghệ thông tin chuyên về bảo mật,lập trình.Thích hợp cho những ai đam mê về công nghệ thông tin,tìm hiểu về bảo mật và lập trình.

[...]... Footprinting 2 Scanning 3 Enumeration Part II Endpoint and Server Hacking 4 Hacking Windows 5 Hacking UNIX 6 Cybercrime and Advanced Persistent Threats Part III Infrastructure Hacking 7 Remote Connectivity and VoIP Hacking 8 Wireless Hacking 9 Hacking Hardware Part IV Application and Data Hacking 10 Web and Database Hacking 11 Mobile Hacking 12 Countermeasures Cookbook Part V Appendixes A Ports B Top... Scanners Web Application Hacking Finding Vulnerable Web Apps with Google (Googledorks) Web Crawling Web Application Assessment Common Web Application Vulnerabilities Database Hacking Database Discovery Database Vulnerabilities Other Considerations Summary 11 Mobile Hacking Hacking Android Android Fundamentals Hacking Your Android Hacking Other Androids Android as a Portable Hacking Platform Defending... Indicators Summary Part III Infrastructure Hacking Case Study: Read It and WEP 7 Remote Connectivity and VoIP Hacking Preparing to Dial Up Wardialing Hardware Legal Issues Peripheral Costs Software Brute-Force Scripting—The Homegrown Way A Final Note About Brute-Force Scripting PBX Hacking Voicemail Hacking Virtual Private Network (VPN) Hacking Basics of IPSec VPNs Hacking the Citrix VPN Solution Voice... Hardware Physical Access: Getting in the Door Hacking Devices Default Configurations Owned Out of the Box Standard Passwords Bluetooth Reverse Engineering Hardware Mapping the Device Sniffing Bus Data Sniffing the Wireless Interface Firmware Reversing ICE Tools Summary Part IV Application and Data Hacking Case Study 10 Web and Database Hacking Web Server Hacking Sample Files Source Code Disclosure Canonicalization... various security conferences over the years Brad Antoniewicz works in Foundstone’s security research division to uncover flaws in popular technologies He is a contributing author to both the Hacking Exposed and Hacking Exposed Wireless series of books and has authored various internal and external Foundstone tools, whitepapers, and methodologies Christiaan Beek is a principal architect on the McAfee Foundstone... are Citrix and kiosk hacking, post exploitation, and SCADA exploitation As an avid educator, Tony has instructed thousands of students at many venues worldwide, including government agencies, universities, corporations, and conferences such as Black Hat He takes every opportunity to share knowledge as a lead instructor for a series of classes that includes Foundstone’s Ultimate Hacking (UH), UH: Windows,... Attacking VoIP Summary 8 Wireless Hacking Background Frequencies and Channels Session Establishment Security Mechanisms Equipment Wireless Adapters Operating Systems Miscellaneous Goodies Discovery and Monitoring Finding Wireless Networks Sniffing Wireless Traffic Denial of Service Attacks Encryption Attacks WEP Authentication Attacks WPA Pre-Shared Key WPA Enterprise Summary 9 Hacking Hardware Physical Access:... with Metasploit Summary 3 Enumeration Service Fingerprinting Vulnerability Scanners Basic Banner Grabbing Enumerating Common Network Services Summary Part II Endpoint and Server Hacking Case Study: International Intrigue 4 Hacking Windows Overview What’s Not Covered Unauthenticated Attacks Authentication Spoofing Attacks Remote Unauthenticated Exploits Authenticated Attacks Privilege Escalation Extracting... Windows Service Hardening Compiler-based Enhancements Coda: The Burden of Windows Security Summary 5 Hacking UNIX The Quest for Root A Brief Review Vulnerability Mapping Remote Access vs Local Access Remote Access Data-driven Attacks I Want My Shell Common Types of Remote Attacks Local Access After Hacking Root Rootkit Recovery Summary 6 Cybercrime and Advanced Persistent Threats What Is an APT? Operation... Android Android Fundamentals Hacking Your Android Hacking Other Androids Android as a Portable Hacking Platform Defending Your Android iOS Know Your iPhone How Secure Is iOS? Jailbreaking: Unleash the Fury! Hacking Other iPhones: Fury Unleashed! Summary 12 Countermeasures Cookbook General Strategies (Re)move the Asset Separation of Duties Authenticate, Authorize, and Audit Layering Adaptive Enhancement Orderly . popular technologies. He is a contributing author to both the Hacking Exposed ™ and Hacking Exposed ™ Wireless series of books and has authored various internal. the creator, lead author, and original founder of the Hacking Exposed series of books and has been hacking for the good guys for over 25 years. Widely recognized

Ngày đăng: 19/03/2014, 13:34

Tài liệu cùng người dùng

Tài liệu liên quan