WHAT'S NEW?
Loading...
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts


CBT NUGGETS
 EC Council Certified Ethical Hacker v7.0
Ethical hacking Course in Video

This series maps to an older version of the Certified Ethical Hacker exam objectives. James Conrad has produced an update to this series titled EC Council Certified Ethical Hacker v7.0 

In this series, you'll learn the 5 steps of a hack. You'll also learn legal considerations for working as an Ethical Hacker. You'll learn all about passive intelligence gathering, and get suggestions for gathering critical information through social engineering.

Because the work you do as an Ethical Hacker can prevent significant harm to businesses, companies will pay you top dollar to do some of the most interesting work in information security.

All trademarks and copyrights are the property of their respective holder

James Conrad    
                                                                                                  
CBT Nuggets Trainer  
Certifications:
CompTIA A+, Server+; Certified Ethical Hacker;   
 Microsoft MCSA, MCSE, MCITP, MCTS

Area Of Expertise:
Microsoft, including Windows Server, Windows Server administration, and Active Directory Design; hacking and security; photography and digital imaging. Author of the Server+ Guide to Advanced Hardware Support.

=============================================================


Windows 8 Hacks & secrets 2013

Published: 2013 | ISBN10 1449325750 | 422 Pages | PDF |SIZE 41 MB


Book Description

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the beginning. You’ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you’ll also discover why it works.
 Add folders and other objects to the Start screen 
 Run other Windows versions inside Windows 8 
 Juice up performance and track down bottlenecks 
 Use the SkyDrive cloud service to sync your files everywhere 
 Speed up web browsing and use other PCs on your home network 
 Secure portable storage and set up a virtual private network 
 Hack Windows 8 Mail and services such as Outlook 
 Combine storage from different devices into one big virtual disk 
 Take control of Window 8 setting with the Registr

==========================================================





Designing BSD Rootkits An Introduction to Kernel Hacking

Published: 2007 | ISBN10 1593271425 | 144 Pages | PDF |SIZE 8 MB


Book Description


Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.

Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.

Included:
- The fundamentals of FreeBSD kernel module programming
- Using call hooking to subvert the FreeBSD kernel
- Directly manipulating the objects the kernel depends upon for its internal record-keeping
- Patching kernel code resident in main memory  in other words, altering the kernel's logic while it's still running
- How to defend against the attacks described

=========================================================




Brute Force Cracking the Data Encryption Standard

Published: 2005 | ISBN10 0387201092 | 283 Pages | PDF |SIZE 2 MB


Book Description

In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and 

intriguing book, Matt Curtin charts the rise and fall 

of 
DES and chronicles the efforts of those who were determined to master it.

==========================================================



Hacking for Dummies: Test Network Security

Published: 2004 | 387 Pages | PDF |SIZE 10 MB


Book Description

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.

Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place

========================================================



Syngress SQL Injection Attacks & Defense

Published: 2012 | 576 Pages | ISBN: 1597499633 | PDF | 10MB


Book Description


SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award 
 "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog 
 SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. 
 SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. 
 SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you about: 
 Understanding SQL Injection - Understand what it is and how it works 
 Find, confirm and automate SQL injection discovery 
 Tips and tricks for finding SQL injection within code 
 Create exploits for using SQL injection 
 Design apps to avoid the dangers these attacks 
 SQL injection on different databases 
 SQL injection on different technologies 
 SQL injection testing techniques 
 Case Studies 
 Securing SQL Server, Second Edition is the only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. 
 Covers unique, publicly unavailable information, by technical experts in such areas as Oracle, Microsoft SQL Server, and MySQL -including new developments for Microsoft SQL Server 2012 (Denali). 
 Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials.

Reviews:

-------------------------------------------------------------------------------
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." 
--Richard Bejtlich, Tao Security blog 

"The most stunningly impactful attacks often leverage SQL Injection vulnerabilities. This book has everything you need to fight back, from applying the core fundamentals to protecting emerging technologies against such attacks. Keep it by your bedside and distribute it within your business." 
--Nitesh Dhanjani, Executive Director at Ernst & Young LLP
-------------------------------------------------------------------------------

About the Author:

-------------------------------------------------------------------------------
Justin Clarke (CISSP, CISM, CISA, MCSE, CEH) is a cofounder and executive director of Gotham Digital Science, based in the United Kingdom. He has over ten years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand.

============================================================




Hacking Exposed : Computer Forensics Secrets & Solutions

Published: 2009 | 544 Pages | ISBN: 0071626778 | PDF | 12 MB


Book Description

The latest strategies for investigating cyber-crime
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
Effectively uncover, capture, and prepare evidence for investigation
Store and process collected data in a highly secure digital forensic lab
Restore deleted documents, partitions, user activities, and file systems
Analyze evidence gathered from Windows, Linux, and Macintosh systems
Use the latest Web and client-based e-mail tools to extract relevant artifacts
Overcome the hacker's anti-forensic, encryption, and obscurity techniques
Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
Prepare legal documents that will hold up to judicial and defense scrutiny

=========================================================



Hacking: The Art of Exploitation, 2nd Edition

Published:2012 | ePub & mobi & pdf | 488 Pages | 14 Mb


Book Description

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

- Program computers using C, assembly language, and shell scripts
- Corrupt system memory to run arbitrary code using buffer overflows and format strings
- Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
- Outsmart common security measures like nonexecutable stacks and intrusion detection systems
- Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
- Redirect network traffic, conceal open ports, and hijack TCP connections

Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

=========================================================


Hacking Exposed 7 : Network Security Secrets & Solutions

Published: 2012 | ISBN: 0071780289 | 768 pages | EPUB | 45 MB


Book Description

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerâ?™s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--letâ?™s change the game; itâ?™s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your systemâ?™s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hackerâ?™s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”
Obstruct APTs and web-based meta-exploits
Defend against UNIX-based root access and buffer overflow hacks
Block SQL injection, spear phishing, and embedded-code attacks
Detect and terminate rootkits, Trojans, bots, worms, and malware
Lock down remote access using smartcards and hardware tokens
Protect 802.11 WLANs with multilayered encryption and gateways
Plug holes in VoIP, social networking, cloud, and Web 2.0 services
Learn about the latest iPhone and Android attacks and how to protect yourself.

==============================================



 Grey Hat Hacking 2nd Edition
 Mc--aw-Hill Osborne Media

2nd Edition | ISBN: 0071495681 | PDF | 550 pages | 11.2 MB

Book Description

“A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in.” –Bruce Potter, Founder, The Shmoo Group

“Very highly recommended whether you are a seasoned professional or just starting out in the security business.” –Simple Nomad, Hacker

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzzers and sniffers, perform reverse engineering, and find security holes in Windows and Linux applications. You'll also learn how to trap and autopsy stealth worms, viruses, rootkits, adware, and malware.
Implement vulnerability testing, discovery, and reporting procedures that comply with applicable laws
Learn the basics of programming, stack operations, buffer overflow and heap vulnerabilities, and exploit development
Test and exploit systems using Metasploit and other tools
Break in to Windows and Linux systems with perl scripts, Python scripts, and customized C programs
Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint, and decompilers
Understand the role of IDA Pro scripts, FLAIR tools, and third-party plug-ins in discovering software vulnerabilities
Reverse-engineer software using decompiling, profiling, memory monitoring, and data flow analysis tools
Reveal client-side web browser vulnerabilities with MangleMe, AxEnum, and AxMan
Probe Windows Access Controls to discover insecure access tokens, security descriptors, DACLs, and ACEs
Find and examine malware and rootkits using honeypots, honeynets, and Norman SandBox technology

 About the Author

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.


==============================================