Hacking: How to Hack, Penetration testing Hacking Book, Step-by-Step implementation and demonstration guide Learn fast how to Hack, Strategies and hacking methods and Black Hat Hacking (2 manuscripts)
暫譯: 駭客技術:駭客入侵與滲透測試指南,逐步實作與示範,快速學習駭客策略與方法,黑帽駭客技術(兩本手稿)

Alex Wagner

  • 出版商: CreateSpace Independ
  • 出版日期: 2017-07-02
  • 售價: $1,060
  • 貴賓價: 9.5$1,007
  • 語言: 英文
  • 頁數: 264
  • 裝訂: Paperback
  • ISBN: 1548531804
  • ISBN-13: 9781548531805
  • 相關分類: Penetration-test駭客 Hack
  • 無法訂購

相關主題

商品描述

HACKING BUNDLE BOOK YOU HAVE BEEN WAITING FOR IS NOW ON SALE!
-------------- This book has 2 manuscripts --------------
1 - The Ultimate Guide to Hacking using 17 Most Dangerous tools 
2 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks


Book 1 - The Ultimate Guide to Hacking using 17 Most Dangerous tools
  • This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.
  • Beginning with some of the fundamentals of networking, and technologies that are vital to be aware for every hacker.
  • It will cover some studying techniques that can be used in order to be able to follow today's fast growing technologies, and then will recommend additional study materials and what certification path you should be aiming in order to become an IT Professional.
  • The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step, on hacker tools.
  • The discussions and implementation examples will provide you not only how to use hacking tools, but how to become a Man in the Middle in multiple ways.
  • Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand.
  • In order to understand hackers and protect the network infrastructure you must think like a hacker in today's expansive and eclectic internet and you must understand that nothing is fully secured.
  • There are many step by step method on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.
  • The intention of this content is to benefit readers by reviewing detailed facts as well as personal experience.
  • Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker.


Book 2- The Ultimate Guide to the 17 Most Dangerous Hacking Attacks
Do you want to learn about today's most sophisticated Hacking attacks?
Do you want to know more about Cyber criminals and their operations?
Do you want to learn about Robot Networks, Trojans & Ransomware?

In this book you will learn about:

  • ADWARE
  • SPYWARE
  • MALWARE
  • MAN IN THE MIDDLE
  • LOCKY
  • TRAFFIC REDIRECTION
  • PAYLOAD INJECTION
  • ARP POISONING
  • WORMS
  • ROGUE WIRELESS ACCESS POINTS
  • MISS-ASSOCIATION ATTACKS
  • DE-AUTHENTICATION ATTACKS
  • COLLISION ATTACKS
  • REPLAY ATTACKS
  • PHISHING
  • VISHING
  • WHALING
  • SMISHING
  • SPEAR PHISHING
  • DUMPSTER DIVING
  • SHOULDER SURFING
  • BRUTE FORCE ATTACK
  • DICTIONARY ATTACKS
  • RAINBOW TABLES
  • KEYSTROKE LOGGINGS
  • SPOOFING
  • SOCIAL ENGINEERING
  • SPAMMING
  • SQL INJECTIONS
  • DDOS ATTACKS
  • TCP SYN FLOOD ATTACK
  • PING OF DEATH
  • VIRUSES
  • ROOTKITS
  • LOGIC BOMBS
  • TROJAN HORSES
  • WANNA-CRY
  • RANSOMWARE
  • BOTNETS

商品描述(中文翻譯)

您期待已久的駭客書籍套裝現在開賣了!

-------------- 本書包含兩本手稿 --------------

1 - 使用17種最危險工具的駭客終極指南
2 - 17種最危險駭客攻擊的終極指南


書籍1 - 使用17種最危險工具的駭客終極指南

  • 本書將專注於一些最危險的駭客工具,這些工具是白帽駭客和黑帽駭客的最愛。

  • 從一些網路基礎知識和每位駭客必須了解的技術開始。

  • 將涵蓋一些學習技巧,以便能夠跟上當今快速增長的技術,並推薦額外的學習材料以及您應該追求的認證路徑,以成為IT專業人士。

  • 本書的重點是介紹一些您可以免費使用的知名軟體,此外還會告訴您在哪裡找到它們、如何訪問它們,並且在每一章中,您將找到逐步演示的駭客工具範例。

  • 討論和實作範例將不僅告訴您如何使用駭客工具,還會教您如何以多種方式成為中間人。

  • 此外,您將學會如何創建拒絕服務攻擊,如何通過創建假封包來操縱網路基礎設施,以及如何複製任何網路設備,並欺騙最終用戶按需安裝後門。

  • 為了理解駭客並保護網路基礎設施,您必須在當今廣闊而多元的互聯網中像駭客一樣思考,並且必須理解沒有任何東西是完全安全的。

  • 有許多逐步的方法來計劃成功的滲透測試,以及如何利用社會工程學操縱或誤導受信任的員工的範例。

  • 本內容的目的是通過回顧詳細事實和個人經驗來使讀者受益。

  • 閱讀本書將提升您對當今駭客世界中可能性的認識,並幫助您成為一名道德駭客。




書籍2 - 17種最危險駭客攻擊的終極指南
您想了解當今最複雜的駭客攻擊嗎?
您想知道更多有關網路罪犯及其操作的資訊嗎?
您想了解機器人網路、木馬和勒索病毒嗎?

在本書中,您將學到:


  • 廣告軟體 (ADWARE)

  • 間諜軟體 (SPYWARE)

  • 惡意軟體 (MALWARE)

  • 中間人攻擊 (MAN IN THE MIDDLE)

  • LOCKY

  • 流量重定向 (TRAFFIC REDIRECTION)

  • 有效載荷注入 (PAYLOAD INJECTION)

  • ARP中毒 (ARP POISONING)

  • 蠕蟲 (WORMS)

  • 惡意無線接入點 (ROGUE WIRELESS ACCESS POINTS)

  • 錯誤關聯攻擊 (MISS-ASSOCIATION ATTACKS)

  • 去認證攻擊 (DE-AUTHENTICATION ATTACKS)

  • 碰撞攻擊 (COLLISION ATTACKS)

  • 重播攻擊 (REPLAY ATTACKS)

  • 釣魚攻擊 (PHISHING)

  • 語音釣魚 (VISHING)

  • 鯨魚釣魚 (WHALING)

  • 簡訊釣魚 (SMISHING)

  • 魚叉式釣魚 (SPEAR PHISHING)

  • 垃圾桶潛水 (DUMPSTER DIVING)

  • 肩膀監視 (SHOULDER SURFING)

  • 暴力破解攻擊 (BRUTE FORCE ATTACK)

  • 字典攻擊 (DICTIONARY ATTACKS)

  • 彩虹表 (RAINBOW TABLES)

  • 鍵盤記錄 (KEYSTROKE LOGGINGS)

  • 欺騙 (SPOOFING)

  • 社會工程學 (SOCIAL ENGINEERING)

  • 垃圾郵件 (SPAMMING)

  • SQL注入 (SQL INJECTIONS)

  • 分散式拒絕服務攻擊 (DDOS ATTACKS)

  • TCP SYN洪水攻擊 (TCP SYN FLOOD ATTACK)

  • 死亡回聲 (PING OF DEATH)

  • 病毒 (VIRUSES)

  • 根套件 (ROOTKITS)

  • 邏輯炸彈 (LOGIC BOMBS)

  • 木馬 (TROJAN HORSES)

  • WannaCry

  • 勒索病毒 (RANSOMWARE)

  • 機器人網路 (BOTNETS)


類似商品