bokomslag Hacking
Data & IT

Hacking

Alex Wagner

Pocket

669:-

Funktionen begränsas av dina webbläsarinställningar (t.ex. privat läge).

Uppskattad leveranstid 5-10 arbetsdagar

Fri frakt för medlemmar vid köp för minst 249:-

  • 716 sidor
  • 2019

This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.

If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY.

The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step.



There are many step by step deployment guides on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.

BUY THIS BOOK NOW AND GET STARTED TODAY!

IN THIS BOOK YOU WILL LEARN:

How to Install Kali Linux & TOR

How to use BurpSuite for various attacks

SSL & CMS Scanning Techniques

Port Scanning & Network Sniffing

How to Configure SPAN

How to implement SYN Scan Attack

How to Brute Force with Hydra

How to use Low Orbit ion Cannon

How to use Netcat, Meterpreter, Armitage, SET 

How to deploy Spear Phishing & PowerShell Attack

How to deploy various Wireless Hacking Attacks

How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS…

Phishing, Vishing, Smishing, Spear Phishing and Whaling

The history of social engineering

Psychological manipulation

Human Weaknesses

Social Engineering Categories

Cold Call Virus Scams

Authority & Fear Establishment

Executing the Social Engineering Attack

Signifying Legitimacy by Providing Value

Open-Source Intelligence

Organizational Reconnaissance

Identifying Targets Within an Organization

In-person social engineering techniques

Dumpster Diving & Data Breaches

Phishing Page Types

Filter Evasion Techniques

How to use PhishTank and Phish5

Identity Theft and Impersonation

Social Engineering Countermeasures

Paper & Digital Record Destruction

Physical Security Measures

Principle of Least Privilege

2FA & Side Channel ID Verification

Logging & Monitoring

How to respond to an Attack

Tips to Avoid Being a Victim

What is The OSI Model

What are Zone Based Firewalls

Firewall Behavior and TCP State Table

Network Address Translation

Port Address Translation

Demilitarized Zone

TCP & UDP Traffic on Firewalls

Client Connection Process 

System Intrusion Indicators

Indicators of Networ...

  • Författare: Alex Wagner
  • Format: Pocket/Paperback
  • ISBN: 9781839381188
  • Språk: Engelska
  • Antal sidor: 716
  • Utgivningsdatum: 2019-08-15
  • Förlag: Sabi Shepherd Ltd