Stealing the Network: How to Own a Shadow

Rating: 
Amazon Price: N/A (as of September 26, 2017 18:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
Continue reading “Stealing the Network: How to Own a Shadow”

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Rating: 
Amazon Price: $49.95 $32.62 You save: $17.33 (35%). (as of September 25, 2017 18:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.
Continue reading “No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing”

Google Hacking for Penetration Testers, Second Edition

Rating: 
Amazon Price: $59.95 $48.35 You save: $11.60 (19%). (as of September 25, 2017 20:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations.
You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.
The Second Edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.All new edition of the seminal work on Google hackingGoogle hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT)Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs

Google Hacking for Penetration Testers: 2

Rating: 
Amazon Price: N/A (as of September 26, 2017 04:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations.
Continue reading “Google Hacking for Penetration Testers: 2”

Google Hacking Para Pentest (Em Portuguese do Brasil)

Amazon Price: N/A (as of September 25, 2017 20:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

O Google é o mecanismo de busca mais popular já criado, e seus recursos de pesquisa são tão poderosos que às vezes encontram conteúdo que não deveria ser disponibilizado publicamente na web, o que inclui números de CPF, números de cartão de crédito, segredos comerciais e documentos sigilosos. Google Hacking para Pentest, mostra como profissionais de segurança e administradores de sistemas manipulam o Google para encontrar essas informações confidenciais com o intuito de proteger suas empresas. E você verá também como pessoas mal-intencionadas conseguem manipular o Google para criar superworms e como elas fazem o mashup do Google com o Facebook, o LinkedIn e outros recursos para se beneficiar do reconhecimento passivo. Inclui conteúdo inteiramente atualizado e todos os novos hacks, como a criação de scripts no Google e o uso do Google hacking com outros mecanismos de busca e APIs. O famoso autor Johnny Long, fundador da Hackers for Charity, fornece as ferramentas necessárias para a condução definitiva de testes open source de reconhecimento e pentest. Principais recursos O Google hacking continua sendo uma fase crítica do reconhecimento em pentests e na Open Source Intelligence (OSINT) Apresenta novos hacks interessantes como a busca de relatórios gerados por scanners de segurança e arquivos de backup, a procura de informações sigilosas em arquivos de configuração do WordPress e SSH, e todos os novos capítulos sobre os hacks de criação de scripts no Google que geram pesquisas melhores, assim como o uso do Google hacking com outros mecanismos de busca e APIs.