Ethical hacking : a hands-on introduction to breaking in / Daniel G. Graham. ; foreward by Juan Gilbert
By: Graham, Daniel G [author].
Contributor(s): Ohio Library and Information Network.
Publisher: San Francisco : No Starch Press, ©2021Copyright date: ©2021Description: 347 p: black and white illustrations.Content type: text Media type: computer Carrier type: online resourceSubject(s): Penetration testing (Computer security)Genre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 G685 2021 (Browse shelf) | Available | AU00000000018625 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
No cover image available | ||||||||
QA76.9 .A25 E75 2008 Hacking : the art of exploitation / | QA76.9.A25 G535 2014 Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / | QA76.9.A25 G67 2020 Cyber breach response that actually works : organizational approach to managing residual risk / | QA76.9.A25 G685 2021 Ethical hacking : a hands-on introduction to breaking in / | QA76.9.A25 G75 2020 Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / | QA76.9.A25 G75 2021 Hacking multifactor authentication / <br> | QA76.9 .A25 G758 2017 Hacking the hacker : learn from the experts who take down hackers / |
Includes index
Setting up -- Capturing traffic with ARP spoofing -- Analyzing capture traffic -- Crafting TCP shells and botnets -- Cryptography and ransomware -- TLS and Diffie-Hellman -- Phishing and deepfakes -- Scanning targets -- Fuzzing and zero-day vulnerabilities -- Building Trojans -- Building and installing Linux rootkits -- Stealing and cracking passwords -- Serious cross-site scripting exploitation -- Pivoting and privilege escalation -- Moving through the Corporate Windows Network -- Next steps
Available to OhioLINK libraries
"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." --