Ethical Hacking : A Hands-on Introduction to Breaking In / Daniel G. Graham. ; foreward by Juan Gilbert
Publisher: San Francisco : No Starch Press, [2021]Copyright date: ©2021Description: xviii, 347 pages : black and white illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9781718501874
- 005.8 23
- QA76.9.A25 G685 2021
Item type | Current library | Shelving location | Call number | URL | Copy number | Status | Notes | Date due | Barcode | Course reserves | |
---|---|---|---|---|---|---|---|---|---|---|---|
BOOK GPS | FRANCIS LIGHT LIBRARY | Link to resource | Not for loan | ||||||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 GRA (Browse shelf(Opens below)) | 1 | Available | DCS2333 (Ethical Hacking and Intrusion Prevention) | 00001402 |
Browsing FRANCIS LIGHT LIBRARY shelves, Shelving location: SHELVES 1 Close shelf browser (Hides shelf browser)
Includes index.
Setting up -- Capturing traffic with ARP spoofing -- Analyzing capture traffic -- Crafting TCP shells and botnets -- Cryptography and ransomware -- TLS and Diffie-Hellman -- Phishing and deepfakes -- Scanning targets -- Fuzzing and zero-day vulnerabilities -- Building Trojans -- Building and installing Linux rootkits -- Stealing and cracking passwords -- Serious cross-site scripting exploitation -- Pivoting and privilege escalation -- Moving through the Corporate Windows Network -- Next steps.
"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." -- Provided by publisher.
There are no comments on this title.