Hands on Hacking /

Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately tra...

Full description

Bibliographic Details
Main Authors: Hickey, Matthew, author 635083, Arcuri, Jennifer, author 635084
Format: text
Language:eng
Published: Indianapolis : Wiley, 2020
Subjects:
_version_ 1826470222569144320
author Hickey, Matthew, author 635083
Arcuri, Jennifer, author 635084
author_facet Hickey, Matthew, author 635083
Arcuri, Jennifer, author 635084
author_sort Hickey, Matthew, author 635083
collection OCEAN
description Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a targetcompany, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits-including tools developed by real-world government financed state-actors.
first_indexed 2024-03-05T16:45:00Z
format text
id KOHA-OAI-TEST:593176
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:45:00Z
publishDate 2020
publisher Indianapolis : Wiley,
record_format dspace
spelling KOHA-OAI-TEST:5931762021-12-12T06:59:03ZHands on Hacking / Hickey, Matthew, author 635083 Arcuri, Jennifer, author 635084 textIndianapolis : Wiley,2020engHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a targetcompany, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits-including tools developed by real-world government financed state-actors.Hacking a Business Case -- Hacking Ethically and Legally -- Building Your Hack Box -- Open Source Intelligence Gathering -- The Domain Name System -- Electronic Mail -- The World Wide Web of Vulnerabilities -- Virtual Private Networks -- Files and File Sharing -- UNIX -- Databases -- Web Applications -- Microsoft Windows -- Passwords -- Writing Reports.Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a targetcompany, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits-including tools developed by real-world government financed state-actors.HackingComputer securityURN:ISBN:
spellingShingle Hacking
Computer security
Hickey, Matthew, author 635083
Arcuri, Jennifer, author 635084
Hands on Hacking /
title Hands on Hacking /
title_full Hands on Hacking /
title_fullStr Hands on Hacking /
title_full_unstemmed Hands on Hacking /
title_short Hands on Hacking /
title_sort hands on hacking
topic Hacking
Computer security
work_keys_str_mv AT hickeymatthewauthor635083 handsonhacking
AT arcurijenniferauthor635084 handsonhacking