Anti-Hacker Tool Kit, Fourth Edition

Anti-Hacker Tool Kit, Fourth Edition

Author: Mike Shema

Publisher: McGraw Hill Professional

Published: 2014-02-07

Total Pages: 625

ISBN-13: 0071800158

DOWNLOAD EBOOK

Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR


Anti-Hacker Tool Kit, Fourth Edition

Anti-Hacker Tool Kit, Fourth Edition

Author: Mike Shema

Publisher: McGraw Hill Professional

Published: 2014-02-07

Total Pages: 768

ISBN-13: 0071800166

DOWNLOAD EBOOK

Featuring complete details on an unparalleled number of hacking exploits, this bestselling computer security book is fully updated to cover the latest attack types—and how to proactively defend against them. Anti-Hacker Toolkit, Fourth Edition is an essential aspect of any security professional's anti-hacking arsenal. It helps you to successfully troubleshoot the newest, toughest hacks yet seen. The book is grounded in real-world methodologies, technical rigor, and reflects the author's in-the-trenches experience in making computer technology usage and deployments safer and more secure for both businesses and consumers. The new edition covers all-new attacks and countermeasures for advanced persistent threats (APTs), infrastructure hacks, industrial automation and embedded devices, wireless security, the new SCADA protocol hacks, malware, web app security, social engineering, forensics tools, and more. You’ll learn how to prepare a comprehensive defense--prior to attack--against the most invisible of attack types from the tools explained in this resource, all demonstrated by real-life case examples which have been updated for this new edition. The book is organized by attack type to allow you to quickly find what you need, analyze a tool's functionality, installation procedure, and configuration--supported by screen shots and code samples to foster crystal-clear understanding. Covers a very broad variety of attack types Written by a highly sought-after security consultant who works with Qualys security Brand-new chapters and content on advanced persistent threats, embedded technologies, and SCADA protocols, as well as updates to war dialers, backdoors, social engineering, social media portals, and more


Anti-hacker Tool Kit

Anti-hacker Tool Kit

Author: Keith John Jones

Publisher: McGraw-Hill Osborne Media

Published: 2002

Total Pages: 711

ISBN-13: 9780072222821

DOWNLOAD EBOOK

Accompanied by a CD-ROM containing the latest security tools, this comprehensive handbook discusses the various security tools, their functions, how they work, and ways to configure tools to get the best results. Original. (Intermediate)


The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing

Author: Patrick Engebretson

Publisher: Elsevier

Published: 2013-06-24

Total Pages: 223

ISBN-13: 0124116418

DOWNLOAD EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test


The Car Hacker's Handbook

The Car Hacker's Handbook

Author: Craig Smith

Publisher: No Starch Press

Published: 2016-03-01

Total Pages: 306

ISBN-13: 1593277709

DOWNLOAD EBOOK

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.


Linux Firewalls

Linux Firewalls

Author: Steve Suehring

Publisher: Addison-Wesley Professional

Published: 2015-01-23

Total Pages: 425

ISBN-13: 0134000196

DOWNLOAD EBOOK

The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you’ll find just what you need to Install, configure, and update a Linux firewall running either iptables or nftables Migrate to nftables, or take advantage of the latest iptables enhancements Manage complex multiple firewall configurations Create, debug, and optimize firewall rules Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions Harden systems against port scanning and other attacks Uncover exploits such as rootkits and backdoors with chkrootkit


CEH Certified Ethical Hacker Study Guide

CEH Certified Ethical Hacker Study Guide

Author: Kimberly Graves

Publisher: John Wiley & Sons

Published: 2010-06-03

Total Pages: 424

ISBN-13: 0470642882

DOWNLOAD EBOOK

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf


CEH Certified Ethical Hacker All-in-One Exam Guide

CEH Certified Ethical Hacker All-in-One Exam Guide

Author: Matt Walker

Publisher: McGraw Hill Professional

Published: 2011-10-01

Total Pages: 420

ISBN-13: 0071772286

DOWNLOAD EBOOK

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hacking Cryptography Reconnaissance and footprinting Network scanning Enumeration System hacking Evasion techniques Social engineering and physical security Hacking web servers and applications SQL injection Viruses, trojans, and other attacks Wireless hacking Penetration testing Electronic content includes: Two practice exams Bonus appendix with author's recommended tools, sites, and references


Learning Kali Linux

Learning Kali Linux

Author: Ric Messier

Publisher: "O'Reilly Media, Inc."

Published: 2018-07-17

Total Pages: 392

ISBN-13: 1492028657

DOWNLOAD EBOOK

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kaliâ??s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. Youâ??ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. Youâ??ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine whatâ??s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete