CyberWar

Si Vis Pacem, Para Bellum

By

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition @ CyberWar: Si Vis Pacem, Para BellumFully updated expanded to cover the latest devious hacking methods

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.

Gray Hat Hacking, Third Edition features eight new chapters, covering:

  • Social engineering
  • Physical attacks
  • Insider attacks
  • VoIP attacks
  • SCADA attacks
  • Dradis framework and information sharing
  • Client content-based attacks
  • Web server attacks

Detailed, authoritative coverage Introduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware

Price: $60.00

Click here to buy from Amazon

By

Hacking Exposed: Malware, Rootkits Secrets and Solutions

Hacking Exposed: Malware, Rootkits Secrets and Solutions @ CyberWar: Si Vis Pacem, Para Bellum“A harrowing guide to where the bad guys hide, and how you can find them.” –Dan Kaminsky, Director of Penetration Testing, IOActive

“An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face.” –From the Foreword by Lance Spitzner, President of the Honeynet Project

Don’t let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today’s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

Price: $49.99

Click here to buy from Amazon

By

Poder Cibernético

Ano 2019, o Brasil teria passado por uma Guerra Civil.
Muito sangue, corrupção e convulsão social. O garoto gênio, tripulante do submarino de pesquisa oceanográfica SeaQuest, é convidado a participar de uma ação cibernética junto com outros hackers em um Centro de Comunicações no fundo do oceano.
Cabos submarinos são facilmente grampeados e alimentam o Centro com dados e metadados.
Mensagens diplomáticas, transferências bancárias, notícias, tudo é monitorado.
Um Heat Map consolidando essas informações mostra que está ocorrendo uma fraude eleitoral.
No intuito de atender ao clamor da população, o jovem hacker injeta um cavalo-de-tróia na rede do Sistema Eleitoral de modo a acompanhar e reverter o resultado das eleições no Brasil.

Fonte: Episódio “Photon Bullet” da primeira temporada (1993) do seriado americano para TV “SeaQuest”.
Trecho publicado no Youtube no dia 25 de setembro de 2013. Mantido em acesso restrito até o dia 7 de outubro de 2013 para fins de “experiência” (http://www.tobem.com/cyberwar). No dia 27 de setembro, foi utilizado na palestra “Poder Cibernético – Um Estudo de Caso” (http://www.niconnect.com) proferida pelo Analista de Inteligência Cibernética do Instituto Sagres, Coronel Av R1 Adrian Nicolaiev, por ocasião do XIII ENEE (Encontro Nacional de Estudos Estratégicos) promovido pela SAE (Secretaria de Assuntos Estratégicos da Presidência da República do Brasil) http://www.sae.gov.br/enee/

Poder Cibernético @ CyberWar: Si Vis Pacem, Para Bellum

9EC4C12949A4F31474F299058CE2B22A

Slideshare: http://www.slideshare.net/saepr/poder-ciberntico-um-estudo-de-caso

By

Audio Jammer

Rating: 
Amazon Price: N/A (as of October 24, 2014 12:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Keep your private conversations private. The AJ-34 AUDIO JAMMER protects your sensitive room conversations by generating a random masking sound which desensitizes any near-by microphone. Effective against any microphone based eavesdropping device including tape recorders RF transmitters hard-wired microphones – including contact type – and shotgun microphones. It also protects against microwave or laser reflection pickups. Because the sound from the jammer varies randomly in frequency and amplitude it cannot be easily filtered and the only sound the eavesdropper will hear is the jammer noise. The convenient end-mounted control lets you select the level of protection for your situation. One unit will protect up to 150 sq. ft. For protecting rooms larger than this we recommend and additional jammer for each 150 sq. ft. of area. The illustrated instructions show suggested jammer placement for different types of rooms and situations so that you can use the AJ-34 effectively. The AJ-34 is powered by one 9 volt alkaline battery – included. The unit measures 4 x 2.5 x 1.5 inches and weighs 7 oz.

By

Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments @ CyberWar: Si Vis Pacem, Para BellumImagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code that a computer is running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, making this book a one stop shop for this new attack vector.

  • Introduces the reader briefly to managed code environments and rootkits in general
  • Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation
  • Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scenarios

Price: $49.95

Click here to buy from Amazon