Backtrack – Testing Wireless Network Security
- Update and configure the Backtrack tool
- Analyze your wireless card for compatibility
- Scavenge access points, even ones with a cloaked SSID
- Pilfer information from the wireless spectrum and analyze it
- Scrutinize the Radio Frequency data and identify wireless network traffic
- Dissect wireless protocols at the packet level
- Classify attacks against wireless networks
- Deploy defenses against common attacks
All you need is some experience with networks and computers and you will be ready to go.
Backtrack – Testing Wireless Network Security
Ebooks
from iExplo1t http://ift.tt/1mFfmlk
Hacking Blackberry
Part I, “Customizing the BlackBerry with Tweaks, Secret Codes, Hidden Keys, and Add-On Applications,” is useful to anyone who owns a BlackBerry or is looking to get one, and requires nothing more than a BlackBerry to play with. The chapters in this part provide a wealth of tips, tricks, and shortcuts that can be used in the BlackBerry e-mail, address book, calendar, phone dialer, and other built-in programs. Also covered are a wealth of add-on applications and hacks that enable you to play games, be more productive, search the Web, connect to your PC and network, and much more…
Part II, “Advanced BlackBerry Hacks: Put Your BlackBerry to Fun and Wacky Uses with Creative Software Projects,” presents a set of projects of a somewhat more ambitious nature, which highlight how, with a little bit of Java programming, you can get your BlackBerry to play music, act like an Etch-A-Sketch, print wirelessly, and more. A small amount of Java programming background will help you get the most out of these projects, but you can also simply skip the programming part and download the completed programs for your own amusement…
Hacking Blackberry
Ebooks
from iExplo1t http://ift.tt/1kUsKCA
Network Safety: Network5 Safety Certification (Network 5) 1st Edition
Network Safety is a diverse introductory networking book intended for anyone from the average home computer user to an office professional to someone looking to develop a career in information security. This book covers topics such as optimizing resource utilization, sharing infrastructure and making the best of technology. Those looking to learn about an economical balance for networked resources, make the most of the internet and add convenience using technology will benefit from this book. Whether a reader wants to learn about secure banking online, safely accessing work through the internet, or using a computer system at home, Network Safety will keep you up-to-date in this networked world.
Network Safety: Network5 Safety Certification (Network 5) 1st Edition
Ebooks
from iExplo1t http://ift.tt/1jFrjNd
Penetration Testing: A Hands-On Introduction to Hacking
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
- Crack passwords and wireless network keys with brute-forcing and wordlists
- Test web applications for vulnerabilities
- Use the Metasploit Framework to launch exploits and write your own Metasploit modules
- Automate social-engineering attacks
- Bypass antivirus software
- Turn access to one machine into total control of the enterprise in the post exploitation phase
You’ll even explore writing your own exploits. Then it’s on to mobile hacking – Weidman’s particular area of research – with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
Penetration Testing: A Hands-On Introduction to Hacking
Ebooks
from iExplo1t http://ift.tt/1m6PX3K
Anti-Hacker Tool Kit 4th Edition
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You’ll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.
Anti-Hacker Tool Kit 4th Edition
Ebooks
from iExplo1t http://ift.tt/1reJPvF
Penetration Testing with the Bash shell
What you will learn from this book
- Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
- Learn how to fuzz and reverse engineer using the Kali Linux command line tools
- Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
- Accomplish man-in-the-middle attacks straight from your command line
- Assess SSL security using sslyze and openssl
- Carry out network traffic analysis using tcpdump
If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
Penetration Testing with the Bash shell
Ebooks
from iExplo1t http://ift.tt/1mKatgC
Seven Deadliest Web Application Attacks
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- SQL Injection
- Server Misconfiguration and Predictable Pages
- Breaking Authentication Schemes
- Logic Attacks
- Malware and Browser Attacks
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Seven Deadliest Web Application Attacks
Ebooks
from iExplo1t http://ift.tt/1mFYsmo
Mastering Metasploit
What you will learn from this book
* Exploiting vulnerabilities in application
* Develop exploits for Software and Web applications in Metasploit
* Learn a Variety of Programming languages such as Assembly, Ruby and CORTANA
* Practically Demonstrate advanced Client Exploitation and speed up attacks with SET and Fasttrack
* Learn how to generate Metasploit modules and automate Metasploit
Mastering Metasploit
Ebooks
from iExplo1t http://ift.tt/1qV8CXO
Raspberry Pi Cookbook for Python Programmers
- Set up and run Raspberry Pi for the first time
- Develop desktop applications, and handle images and process files with ease
- Make use of graphics and user control to develop your own exciting games
- Create 3D worlds by using the Raspberry Pi’s powerful GPU
- Discover how to create your own electronic circuits to interact with the Raspberry Pi
- Use the Raspberry Pi Camera to create animations and timelapses
- Design and build your own Raspberry Pi controlled robots
- Take control of the real world and interface with physical hardware, combining hardware and software for your own needs
Raspberry Pi Cookbook for Python Programmers
Ebooks
from iExplo1t http://ift.tt/1qjNUAL
The Wireshark Field Guide
Learn the fundamentals of using Wireshark in a concise field manualQuickly create functional filters that will allow you to get to work quickly on solving problemsUnderstand the myriad of options and the deep functionality of WiresharkSolve common network problemsLearn some advanced features, methods and helpful ways to work more quickly and efficientlyTable of Contents
Chapter 2. Installing Wireshark
Chapter 3. Configuring a System
Chapter 4. Capturing Packets
Chapter 5. Color Codes
Chapter 6. Filters
Chapter 7. Sample Captures
Chapter 8. Inspecting Packets
Chapter 9. Deep Analysis
Chapter 10. Saving Captures
The Wireshark Field Guide
Ebooks
from iExplo1t http://ift.tt/Ty07ne