The Hacker Playbook: Practical Guide To Penetration Testing

Rating: 
Amazon Price: N/A (as of June 18, 2018 19:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
Continue reading “The Hacker Playbook: Practical Guide To Penetration Testing”

The Darkening Web: The War for Cyberspace

Rating: 
Amazon Price: $30.00 $20.40 You save: $9.60 (32%). (as of June 18, 2018 05:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In its earliest days, the Internet seemed to all of us to be an unqualified good: It was a way to share information, increase productivity, and experience new freedoms and diversions. Alexander Klimburg was a member of the idealistic generation that came of age with the Internet. Two decades later, he—and all of us—have been forced to confront the reality that an invention that was once a utopian symbol of connection has evolved into an unprecedented weapon and means of domination.

Cyberspace, Klimburg contends, is already the main stage for global confrontation for this century. In this new arena of conflict, brilliant individuals and informal networks have the capacity to bring ostensibly stable societies to their knees—but also save them from destruction—and nations are reconceiving information as the ultimate weapon and configuring their defenses accordingly. The debate about how individual nations and the global community alike will define this new domain of human interaction is more pressing and divisive than ever.
Continue reading “The Darkening Web: The War for Cyberspace”

Assessing the Effects of Honeypots on Cyber- Attackers

Amazon Price: N/A (as of September 25, 2016 04:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. While the security community is reaping fruits of this collection tool, the hacker community is increasingly aware of this technology. In response, they develop anti-honeypot technology to detect and avoid honeypots. Prior to the discovery of newer intelligence collection tools, we need to maintain the relevancy of honeypot. Since the development of anti-honeypot technology indicates the deterrent effect of honeypot, we can capitalize on this deterrent effect to develop fake honeypot. Fake honeypot is real production system with deterring characteristics of honeypot that induces the avoidance behavior of cyber-attackers. Fake honeypots will provide operators with workable production systems under obfuscation of deterring honeypot when deployed in hostile information environment. Deployed in a midst of real honeynets, it will confuse and delay cyber-attackers. To understand the effects of honeypot on cyber-attackers to design fake honeypot, we exposed a tightly secured, self-contained virtual honeypot to the Internet over a period of 28 days. We conclude that it is able to withstand the duration of exposure without compromise. The metrics pertaining to the size of last packet suggested departure of cyber-attackers during reconnaissance.

Ethical Hacking and Penetration Testing Guide

Rating: 
Amazon Price: $65.95 $36.48 You save: $29.47 (45%). (as of June 18, 2018 14:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test.

The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.
Continue reading “Ethical Hacking and Penetration Testing Guide”

Honeypots and Routers: Collecting Internet Attacks

Amazon Price: $72.95 $48.87 You save: $24.08 (33%). (as of June 18, 2018 15:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.

Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications
Continue reading “Honeypots and Routers: Collecting Internet Attacks”