Dissecting the hack the FOrb1dd3n network
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference,...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier / Syngress
c2010.
|
Edición: | Rev. ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627772906719 |
Tabla de Contenidos:
- Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; A New Assignment; CHAPTER 0N3; Problem Solved; Getting Started; The Acquisition; CHAPTER TW0; Just Another Day; The Installation; CHAPTER THR33; In Country; CHAPTER F0UR; In Real Life; CHAPTER F1V3; Status Check; Log Review; CHAPTER S1X; The Meeting; First Lead; The Discovery; CHAPTER S3V3N; Code Review; CHAPTER E1GHT; Battle Plans; Data Collection; CHAPTER N1N3; Data Analysis
- Shrinking TeamTenuous Connections; Loose Ends; Expendable Assets; CHAPTER T3N; Choosing Sides; 3P1L0GU3; End Process; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; Social Networking; Exploit Techniques; Best Practices; Summary of Social Networking; For More Information; Google Hacking; Exploit Techniques; Best Practices; Summary of Google Hacking; For More Information; Deep Web Searching; Exploit Techniques; Best Practices; Summary of Deep Web Searching; For More Information; Physical Surveillance; Exploit Techniques; Best Practices; Summary of Physical Surveillance
- For More InformationLog Analysis; Exploit Techniques; Best Practices; Summary of Log Analysis; For More Information; Do It Yourself: Hacking 3DNF; Targeting Human Resources; Google Apps; Blog Recon; Domain Information; Twitter Recon; Endnotes; CHAPTER 2. Scan; Wardriving; Exploit Techniques; Best Practices; Summary of Wardriving; For More Information; Long-Range Wireless Scanning; Exploit Techniques; Best Practices; Summary of Long-Range Wireless Scanning; For More Information; Scanning Tools; Exploit Techniques; Best Practices; Summary of Scanning Tools; For More Information
- Bluetooth SecurityExploit Techniques; Best Practices; Summary of Bluetooth Security; For More Information; Endnotes; CHAPTER 3. Explore; Authentication Security; Exploit Techniques; Best Practices; Summary of Authentication Security; For More Information; Physical Security; Exploit Techniques; Best Practices; Summary of Physical Security; For More Information; Network Traffic Sniffing; Exploit Techniques; Best Practices; Summary of Network Traffic Sniffing; For More Information; Dormant Malware; Exploit Techniques; Best Practices; Summary of Dormant Malware; For More Information
- Web Browser SecurityExploit Techniques; Best Practices; Summary of Web Browser Security; For More Information; Out-of-Band Communications; Exploit Techniques; Best Practices; Summary of Out-of-Band Communications; For More Information; Endnotes; CHAPTER 4. Exploit; Encrypted Storage; Exploit Techniques; Best Practices; Summary of Encrypted Storage; For More Information; Attack Research; Exploit Techniques; Best Practices; Summary of Attack Research; For More Information; Password Security; Exploit Techniques; Best Practices; Summary of Password Security; For More Information; E-Mail Security
- Exploit Techniques