Information security is paramount to reducing unauthorized access to sensitive information, achieving mission success, and could very well save soldiers’ lives. Part I and II will follow the history that developed the network and that molded it to its current state. Additionally, Part III will describe the potential demands and threats towards future military networks.
Firewall hacking secrets for security professionals enables both penetration testers and security professionals to plan and execute better testing of firewalls.
Unlike most 'hacking' books, we discuss all aspects of testing a firewall covering the scope of testing, expectations, policy and process reviews, design, strategy, implementation, operational support, third party managed firewalls and more.
Continue reading “Firewall Hacking Secrets For Security Professionals (HackerStorm Penetration Testing Guides Book 1)”
Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.
Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
Tras el best seller de su libro "Técnicas de seguimiento", Manuel Gris regresa con su esperadísimo libro sobre seguridad informática. En "Hackers, crackers e ingeniería social" conocerás uno de los aspectos menos conocidos de los hackers mediante sorprendentes historias que te abrirán los ojos a una realidad alternativa, a un mundo en donde nada es lo que parece.
Manuel Gris nos descubre las oscuras amenazas a las que se enfrentan no sólo políticos, compañías multinacionales y gobiernos del mundo entero, sino también el ciudadano de a pie. Este libro te abrirá los ojos a la auténtica realidad hacker en el mundo de hoy.
Continue reading “Hackers, Crackers, e ingeniería social (Spanish Edition)”
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
Continue reading “The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws”