Python Penetration Testing Essentials

Rating: 
Amazon Price: $10.69 (as of November 15, 2019 22:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Employ the power of Python to get the best out of pentesting

About This BookLearn to detect and avoid various types of attacks that put the privacy of a system at riskEmploy practical approaches to penetration testing using Python to build efficient code and eventually save timeEnhance your concepts about wireless applications and information gathering of a web server
Continue reading “Python Penetration Testing Essentials”

Introdução ao Pentest (Em Portuguese do Brasil)

Amazon Price: $60.97 (as of November 15, 2019 23:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Introdução ao Pentest tem o intuito de capacitar o leitor a entender e a realizar o pentest – uma auditoria minuciosa sobre falhas e vulnerabilidades em computadores e redes – e, assim, buscar a melhor forma de solucionar os problemas encontrados. Tendo como base a metodologia Backtrack para o ensino do pentest, que é extremamente didática e adaptada a partir da metodologia OSSTMM de testes de invasão, com certeza este livro fará você se sentir à vontade e confiante ao estudar pentest, tornando o seu aprendizado fácil e rápido. O leitor terá acesso às táticas e técnicas utilizadas na realização do pentest em um ambiente controlado por laboratório e máquinas virtuais. Cada capítulo aborda uma etapa do pentest e, no decorrer da leitura, você: – Conhecerá aspectos básicos de segurança da informação, como a instalação de máquinas virtuais e os primeiros passos com o Kali Linux. – Construirá redes zumbie para ataques DDoS por meio do projeto Perl-bot. – Aprenderá a realizar ataques Man-in-the-Middle remotamente pela internet (pivoteamento via VPN). – Construirá um pendrive infectado com programas maliciosos (o famigerado BadUSB). Fará a escrita e posterior criptografia de um relatório de pentest.[…]

Surviving Cyberwar

Rating: 
Amazon Price: $56.00 $50.60 You save: $5.40 (10%) (as of November 16, 2019 01:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack.

Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
Continue reading “Surviving Cyberwar”

Radware’s DDoS Handbook: The Ultimate Guide to Everything You Need to Know about DDoS Attacks

Rating: 
Amazon Price: $0.99 (as of November 16, 2019 01:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

DDoS attacks are the most persistent and damaging cyber-attacks. They reflect hackers' frustratingly high levels of tenacity and creativity – and create complex and dynamic challenges for anyone responsible for cyber security. Radware's DDoS Handbook offers expert advice, actionable tools and tips to help detect and stop DDoS attacks.