Archive | Ebooks RSS for this section

Backtrack – Testing Wireless Network Security

http://ift.tt/WEns8N

What you will learn from this book

  • Update and configure the Backtrack tool
  • Analyze your wireless card for compatibility
  • Scavenge access points, even ones with a cloaked SSID
  • Pilfer information from the wireless spectrum and analyze it
  • Scrutinize the Radio Frequency data and identify wireless network traffic
  • Dissect wireless protocols at the packet level
  • Classify attacks against wireless networks
  • Deploy defenses against common attacks

In Detail

Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don’t let it happen to you.
BackTrack – Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. With this book, you will learn how to configure your hardware for optimum security, find network security holes, and fix them.
BackTrack – Testing Wireless Network Security looks at what tools hackers use and shows you how to defend yourself against them. Taking you from no prior knowledge all the way to a fully secure environment, this guide provides useful tips every step of the way. Learn how to select a wireless card to work with the Backtrack tools, run spectrum analysis scans using kismet, set up test networks, and perform attacks against wireless networks. Use the tools aircrack-ng and airodump-ng to crack the wireless encryption used on the network.
You will learn everything you need to know to set up your wireless network for use within Backtrack and also how to defend yourself against the included attack tools.

Approach

Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.

Who this book is for

BackTrack – Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.
All you need is some experience with networks and computers and you will be ready to go.

Backtrack – Testing Wireless Network Security

Ebooks

from iExplo1t http://ift.tt/1mFfmlk

Hacking Blackberry

 
This book is intended to be rewarding to a wide range of people who are interested in the BlackBerry. Many readers will instantly become more productive with their BlackBerry by learning the shortcuts, tricks, codes, and keystrokes that are unveiled in several chapters. Still others will be delighted to learn of add-on programs that greatly expand the tasks you can use your BlackBerry for…

This book is organized in two parts.
Part I, “Customizing the BlackBerry with Tweaks, Secret Codes, Hidden Keys, and Add-On Applications,” is useful to anyone who owns a BlackBerry or is looking to get one, and requires nothing more than a BlackBerry to play with. The chapters in this part provide a wealth of tips, tricks, and shortcuts that can be used in the BlackBerry e-mail, address book, calendar, phone dialer, and other built-in programs. Also covered are a wealth of add-on applications and hacks that enable you to play games, be more productive, search the Web, connect to your PC and network, and much more…

Part II, “Advanced BlackBerry Hacks: Put Your BlackBerry to Fun and Wacky Uses with Creative Software Projects,” presents a set of projects of a somewhat more ambitious nature, which highlight how, with a little bit of Java programming, you can get your BlackBerry to play music, act like an Etch-A-Sketch, print wirelessly, and more. A small amount of Java programming background will help you get the most out of these projects, but you can also simply skip the programming part and download the completed programs for your own amusement…
 
http://ift.tt/1kUsIuj

Hacking Blackberry

Ebooks

from iExplo1t http://ift.tt/1kUsKCA

Network Safety: Network5 Safety Certification (Network 5) 1st Edition

Network Safety is a diverse introductory networking book intended for anyone from the average home computer user to an office professional to someone looking to develop a career in information security. This book covers topics such as optimizing resource utilization, sharing infrastructure and making the best of technology. Those looking to learn about an economical balance for networked resources, make the most of the internet and add convenience using technology will benefit from this book. Whether a reader wants to learn about secure banking online, safely accessing work through the internet, or using a computer system at home, Network Safety will keep you up-to-date in this networked world.

Network Safety: Network5 Safety Certification (Network 5) 1st Edition

Ebooks

from iExplo1t http://ift.tt/1jFrjNd

Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Learn how to:

  • Crack passwords and wireless network keys with brute-forcing and wordlists
  • Test web applications for vulnerabilities
  • Use the Metasploit Framework to launch exploits and write your own Metasploit modules
  • Automate social-engineering attacks
  • Bypass antivirus software
  • Turn access to one machine into total control of the enterprise in the post exploitation phase

You’ll even explore writing your own exploits. Then it’s on to mobile hacking – Weidman’s particular area of research – with her tool, the Smartphone Pentest Framework.

With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.



Penetration Testing: A Hands-On Introduction to Hacking

Ebooks

from iExplo1t http://ift.tt/1m6PX3K

Anti-Hacker Tool Kit 4th Edition

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You’ll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.


Anti-Hacker Tool Kit 4th Edition

Ebooks

from iExplo1t http://ift.tt/1reJPvF

Penetration Testing with the Bash shell

 

What you will learn from this book

  • Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
  • Learn how to fuzz and reverse engineer using the Kali Linux command line tools
  • Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
  • Accomplish man-in-the-middle attacks straight from your command line
  • Assess SSL security using sslyze and openssl
  • Carry out network traffic analysis using tcpdump

Who this book is for

If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.

http://ift.tt/1mFYmLE
http://ift.tt/1xU0aJp

Penetration Testing with the Bash shell

Ebooks

from iExplo1t http://ift.tt/1mKatgC

Seven Deadliest Web Application Attacks

 
Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include:
  1. Cross-Site Scripting (XSS)
  2. Cross-Site Request Forgery (CSRF)
  3. SQL Injection
  4. Server Misconfiguration and Predictable Pages
  5. Breaking Authentication Schemes
  6. Logic Attacks
  7. Malware and Browser Attacks

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
 Link 1
http://ift.tt/1mFYmLE
http://ift.tt/1mFYsmf
 **************************************
Link 2
http://ift.tt/1x4f6UR
http://ift.tt/1qgtCq8

Seven Deadliest Web Application Attacks

Ebooks

from iExplo1t http://ift.tt/1mFYsmo

Mastering Metasploit

What you will learn from this book
* Exploiting vulnerabilities in application
* Develop exploits for Software and Web applications in Metasploit
* Learn a Variety of Programming languages such as Assembly, Ruby and CORTANA
* Practically Demonstrate advanced Client Exploitation and speed up attacks with SET and Fasttrack
* Learn how to generate Metasploit modules and automate Metasploit

http://ift.tt/1wRpOhb
http://ift.tt/1jvzPJ6

Mastering Metasploit

Ebooks

from iExplo1t http://ift.tt/1qV8CXO

Raspberry Pi Cookbook for Python Programmers

 

What you will learn from this book

  • Set up and run Raspberry Pi for the first time
  • Develop desktop applications, and handle images and process files with ease
  • Make use of graphics and user control to develop your own exciting games
  • Create 3D worlds by using the Raspberry Pi’s powerful GPU
  • Discover how to create your own electronic circuits to interact with the Raspberry Pi
  • Use the Raspberry Pi Camera to create animations and timelapses
  • Design and build your own Raspberry Pi controlled robots
  • Take control of the real world and interface with physical hardware, combining hardware and software for your own needs

http://ift.tt/1wRpOhb
http://ift.tt/1wRpOhl

Raspberry Pi Cookbook for Python Programmers

Ebooks

from iExplo1t http://ift.tt/1qjNUAL

The Wireshark Field Guide

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world’s foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features.
The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into theinformation contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more.
The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.

Learn the fundamentals of using Wireshark in a concise field manualQuickly create functional filters that will allow you to get to work quickly on solving problemsUnderstand the myriad of options and the deep functionality of WiresharkSolve common network problemsLearn some advanced features, methods and helpful ways to work more quickly and efficientlyTable of Contents

Chapter 1. About Wireshark
Chapter 2. Installing Wireshark
Chapter 3. Configuring a System
Chapter 4. Capturing Packets
Chapter 5. Color Codes
Chapter 6. Filters
Chapter 7. Sample Captures
Chapter 8. Inspecting Packets
Chapter 9. Deep Analysis
Chapter 10. Saving Captures
http://ift.tt/Ty0aiZ

The Wireshark Field Guide

Ebooks

from iExplo1t http://ift.tt/Ty07ne