Seven Deadliest USB Attacks

Seven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series)Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

 

 

 

Attacks detailed in this book include:

  1. USB Hacksaw
  2. USB Switchblade
  3. USB Based Virus/Malicous Code Launch
  4. USB Device Overflow
  5. RAMdump
  6. Pod Slurping
  7. Social Engineering and USB Technology
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Price: $24.95

Click here to buy from Amazon

Penetration Tester’s Open Source Toolkit, Vol. 2

Penetration Tester's Open Source Toolkit, Vol. 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

. Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
. Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
. Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
. Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
. Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
. Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
. Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
. Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
. Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.

Price: $59.95

Click here to buy from Amazon

Malware: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red (German Edition)

Malware: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red (German Edition)Der Erwerb des Buches enthält gleichzeitig die kostenlose Mitgliedschaft im Buchklub des Verlags zum Ausprobieren – dort können Sie von über einer Million Bücher ohne weitere Kosten auswählen. Das Buch besteht aus Wikipedia-Artikeln: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red, Spyware, Witty-Wurm, Stoned, XCP, Ransomware, Loveletter, (c)Brain, Michelangelo, Drive-by-Download, Tequila, Sasser, Slowloris, Waledac, W32.Blaster, Optix Pro, DLL-Injection, Ramen-Wurm, Vienna-Virus, Bootvirus, 29A, Bagle, Handymalware, Scareware, Archivbombe, Russian Business Network, EICAR-Testdatei, CIH-Virus, Call Home, Back Orifice, NetBus, Lamer Exterminator, Makrovirus, SQL Slammer, Bliss, SubSeven, Look2Me, XM/Compat, Form-Virus, Staog, Kernelvirus, Network Admission Control, TSR-Virus, Rogue-Software, Elk Cloner, Creeper-Virus, Virensignatur, Parity Boot, Bootkit, Browser-Hijacker, Dropper, CommWarrior, Common Malware Enumeration, Linkvirus, Nepenthes, OsxTrojan/1a, MTE, In-the-wild, Malicious Code, Riskware, Netsky, Reaper-Programm,. Online finden Sie die kostenlose Aktualisierung der Bücher. Nicht dargestellt. Auszug: Ein Computerwurm (im Computerkontext kurz Wurm) ist ein Computerprogramm oder Skript mit der Eigenschaft, sich selbst zu vervielfältigen, nachdem er ausgeführt wurde. In Abgrenzung zum Computervirus verbreitet sich der Wurm ohne fremde Dateien oder Bootsektoren mit seinem Code zu infizieren. Würmer verbreiten sich über Netzwerke oder über Wechselmedien wie USB-Sticks. Dafür benötigen sie gewöhnlich (aber nicht zwingend) ein Hilfsprogramm, wie einen Netzwerkdienst oder eine Anwendungssoftware als Schnittstelle zum Netz; für Wechselmedien benötigen sie meist einen Dienst, der nach dem Anschluss des belasteten Mediums den automatischen Start des Wurms ermöglicht (wie Autorun, mitunter auch den aktiven Desktop von Windows). French Navy Rafales planes were unable to take off after military computers were infected by Conficker. Royal Navy and RAF were attacked by a version of Conficker that infected some 24 RAF bases, 75% of the Royal Navy fleet and the Ark Royal aircraft carrier.

Price: $35.44

Click here to buy from Amazon

Conficker, Mydoom, Iloveyou, Anna Kournikova and Blaster – Windows Viruses

Conficker, Mydoom, Iloveyou, Anna Kournikova, Blaster - Windows VirusesChapters: Conficker, Mydoom, Iloveyou, Anna Kournikova, Blaster. Source: Wikipedia. Pages: 43. Not illustrated. Free updates online. Purchase includes a free trial membership in the publisher's book club where you can select from more than a million books without charge. Excerpt: Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows software and Dictionary attacks on administrator passwords to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors. Conficker has since spread rapidly into what is now believed to be the largest computer worm infection since the 2003 SQL Slammer, with more than seven million government, business and home computers in over 200 countries now under its control. The worm has been unusually difficult to counter because of its combined use of many advanced malware techniques. The origin of the name Conficker is thought to be a portmanteau of the English term “configure” and the German word Ficker, which translates as “fucker”. Microsoft analyst Joshua Phillips gives an alternate interpretation of the name, describing it as a rearrangement of portions of the domain name trafficconverter.biz, which was used by early versions of Conficker to download updates. The first variant of Conficker, discovered in early November 2008, propagated through the Internet by exploiting a vulnerability in a network service (MS08-067) on Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 Beta. While Windows 7 may have been affected by this vulnerability, the Windows 7 Beta was not publicly available until January 2009. Although Microsoft released an emergency out-of-band patch on October 23, 2008 to close the vulnerability, a large number of Windows PCs (estimated at 30%) remained unpatched. French Navy Rafales planes were unable to take off after military computers were infected by Conficker. Royal Navy and RAF were attacked by a version of Conficker that infected some 24 RAF bases, 75% of the Royal Navy fleet and the Ark Royal aircraft carrier.

Price: $14.14

Click here to buy from Amazon