Amazon Price: $49.99 $49.99 (as of May 30, 2017 01:41 –
Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
About This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenariosGet this completely updated edition with new useful methods and techniques to make your network robust and resilient
Continue reading “Mastering Metasploit – Second Edition”
Amazon Price: $49.99 $49.97 You save: $0.02 (%). (as of May 30, 2017 03:34 –
A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts
About This BookA professional, step-by-step approach to forensic analysis complete with key strategies and techniquesAnalyze the most popular Android applications using free and open source toolsLearn forensically-sound core data extraction and recovery techniques
Who This Book Is For
Continue reading “Learning Android Forensics”
Amazon Price: $43.49 $43.49 (as of May 30, 2017 01:41 –
This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual.s
Overview Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools
Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security – from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network – directly attacking the end user.
This book will provide all the practical knowledge needed to test your network's security using a proven hacker's methodology.
What you will learn from this book Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network Select and configure the most effective tools from Kali Linux to test network security Employ stealth to avoid detection in the network being tested Recognize when stealthy attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network -the end users
This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.
Amazon Price: $49.99 $44.20 You save: $5.79 (12%). (as of May 29, 2017 21:49 –
Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide
Overview Clear and concise explanations for forensic examinations of mobile devices Master the art of extracting data, recovering deleted data, bypassing screen locks, and much more The first and only guide covering practical mobile forensics on multiple platforms
With the advent of smartphones, the usage and functionality of mobile devices has grown enormously along with the sensitive information contained in these devices. Law enforcement agencies around the world have realized the importance of evidence present on a mobile device and how it can influence the outcome of an investigation.
Practical Mobile Forensics explains mobile forensic techniques on the iOS, Android, Windows, and BlackBerry platforms. You will learn the fundamentals of mobile forensics, and different techniques to extract data from a device, recover deleted data, bypass the screen lock mechanisms, and various other tools that aid in a forensic examination.
This book will teach you everything you need to know to forensically examine a mobile device. The techniques described are not only useful for budding forensic investigators, but will also come in handy for those who may want to recover accidentally deleted data.
What you will learn from this book Learn different approaches to practical mobile forensics Understand the architecture and security mechanisms present in iOS and Android platforms Identify sensitive files on iOS and Android platforms Set up the forensic environment Extract data on iOS and Android platforms Recover data on iOS and Android platforms Understand the forensics of Windows and BlackBerry devices
The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics.
Who this book is written for
If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.
Amazon Price: N/A (as of March 31, 2016 10:18 –