Hackers are out to get you . . . but these experts are on the job to stop them! Cybercrime is a growing problem, affecting businesses, governments, and individuals. A growing number of computer wizards are using science to prevent crime . . . or track down the cybercriminals. Visit this secret world inside! Every book in the SCIENTISTS IN ACTION! series takes you on a journey where science and adventure meet. Science is not just for the classroom or the labits a living, breathing, exciting part of our world today. Throw off that lab coat and get out and do some science! Each title in this series contains color photos, insider quotes from real scientists in the field, recent news items highlighting the excitement of each field, and back matter including: an index, further reading lists for books and internet resources, and a series glossary. Mason Crests editorial team has placed Key Icons to Look for throughout the books in this series in an effort to encourage library readers to build knowledge, gain awareness, explore possibilities and expand their viewpoints through our content rich non-fiction books. Key Icons are as follows: Words to Understand are shown at the front of each chapter with definitions. These words are then used in the prose throughout that chapter, and are emboldened, so that the reader is able to reference back to the definitions- building their vocabulary and enhancing their reading comprehension. Sidebars are highlighted graphics with content rich material within that allows readers to build knowledge and broaden their perspectives by weaving together additional information to provide realistic and holistic perspectives. Text Dependent Questions are placed at the end of each chapter. They challenge the readers comprehension of the chapter they have just read, while sending the reader back to th
One the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including:
* Hacktivism; hackers and populist politics
* Cyberwar; hackers and the nation-state
* Digital Proletariat; hacking for the man
* Viruses; virtual life on the Internet
* Digital Commons; hacking without software
* Cypherpunks; encryption and digital security
* Nerds and Geeks; hacking cultures or hacking without the hack
* Cybercrime; blackest of black hat hacking
Hackers end debates over the meaning of technological determinism while recognising that at any one moment we are all always determined by technology. Hackers work constantly within determinations of their actions created by technologies as they also alter software to enable entirely new possibilities for and limits to action in the virtual world. Through this fascinating introduction to the people who create and recreate the digital media of the Internet, students, scholars and general readers will gain new insight into the meaning of technology and society when digital media are hacked.
Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.
Gray Hat Hacking, Third Edition features eight new chapters, covering:
- Social engineering
- Physical attacks
- Insider attacks
- VoIP attacks
- SCADA attacks
- Dradis framework and information sharing
- Client content-based attacks
- Web server attacks
Detailed, authoritative coverage Introduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware
- Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook (tobem.com)
- The Ethical Hack: A Framework for Business Value Penetration Testing (tobem.com)
- Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts (tobem.com)
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (tobem.com)
- Professional Penetration Testing: Creating and Operating a Formal Hacking Lab (tobem.com)
- The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (tobem.com)
- The Oracle Hacker's Handbook: Hacking and Defending Oracle (tobem.com)
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
- A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
- Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
- Two convicts who joined forces to become hackers inside a Texas prison
- A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.