A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.
You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network.
You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like:
"Sinopsis" puede pertenecer a otra edición de este libro.
Dr. Daniel Graham is an Assistant professor of Computer Science at The University of Virginia in Charlottesville, Virginia. His research interests include secure embedded systems and networks. Before joining UVA, Dr. Graham was a Program Manager at Microsoft in Seattle, Washington. He publishes in IEEE journals relating to sensors and networks.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
Paperback. Condición: Fair. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way. Nº de ref. del artículo: 1718501870-7-1
Cantidad disponible: 1 disponibles
Librería: World of Books (was SecondSale), Montgomery, IL, Estados Unidos de America
Condición: Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. Nº de ref. del artículo: 00092484080
Cantidad disponible: 1 disponibles
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
Paperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Nº de ref. del artículo: S_433364926
Cantidad disponible: 1 disponibles
Librería: clickgoodwillbooks, Indianapolis, IN, Estados Unidos de America
Condición: acceptable. Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may be missing bundled media. Nº de ref. del artículo: CSIV.1718501870.A
Cantidad disponible: 1 disponibles
Librería: Goodwill Books, Hillsboro, OR, Estados Unidos de America
Condición: acceptable. Fairly worn, but readable and intact. If applicable: Dust jacket, disc or access code may not be included. Nº de ref. del artículo: GICWV.1718501870.A
Cantidad disponible: 1 disponibles
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
Paperback. Condición: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Nº de ref. del artículo: GOR012668358
Cantidad disponible: 1 disponibles
Librería: Follow Books, SOUTHFIELD, MI, Estados Unidos de America
Condición: New. New Book. Nº de ref. del artículo: 1718501870-TUX
Cantidad disponible: 1 disponibles
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
Paperback. Condición: new. Paperback. A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.You'll begin with the basics- capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network.You'll work with a wide range of professional penetration testing tools-and learn to write your own tools in Python-as you practice tasks like-Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming filesCapturing passwords in a corporate Windows network using MimikatzScanning (almost) every device on the internet to find potential victimsInstalling Linux rootkits that modify a victim's operating systemPerforming advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloadsAlong the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more.Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker- someone who can carefully analyze systems and creatively gain access to them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Nº de ref. del artículo: 9781718501874
Cantidad disponible: 1 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 42594168
Cantidad disponible: 15 disponibles
Librería: INDOO, Avenel, NJ, Estados Unidos de America
Condición: As New. Unread copy in mint condition. Nº de ref. del artículo: RH9781718501874
Cantidad disponible: Más de 20 disponibles