Hacking: Hacking: How to Hack, Penetration testing Hacking Book, Step-by-Step implementation and demonstration guide Learn fast Wireless Hacking, ... methods and Black Hat Hacking (4 manuscripts)
暫譯: 駭客技術:駭客入門、滲透測試駭客書籍、逐步實作與示範指南,快速學習無線駭客技術、... 方法與黑帽駭客技術(四本手稿)
Alex Wagner
- 出版商: CreateSpace Independ
- 出版日期: 2017-07-16
- 售價: $1,410
- 貴賓價: 9.5 折 $1,340
- 語言: 英文
- 頁數: 454
- 裝訂: Paperback
- ISBN: 1548959073
- ISBN-13: 9781548959074
-
相關分類:
Penetration-test、駭客 Hack
無法訂購
商品描述
HACKING BUNDLE BOOK YOU HAVE BEEN WAITING FOR IS NOW ON SALE!
-------------- This book has 4 manuscripts --------------
1 - The Ultimate Beginners Guide to Hacking
2 - The Ultimate Guide to Hacking using the most dangerous tools
3 - The Ultimate Guide to Wireless Hacking using the best tools
4 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks
----------------------------------------------------------------------------------
Book 1 - The Ultimate Beginners Guide to Hacking
- The following chapters will focus on the basics of hacking, starting by listing the possibilities that can be achieved by hacking as well as the most common motivations.
- Next, it will cover some basic technology related terms that are frequently mixed up even by Security Experts.
- It moves on to discuss different types of hackers as well as taking a look at some examples of their skill levels and understanding how they differ one from another.
- The discussions will take us back to the 70's and see the history of hackers, what was their dream, and what they expected from the future of computing.
- After the discussion of old school hackers we will land in today's expansive and eclectic internet and explain that nothing is fully secured!
----------------------------------------------------------------------------------
Book 2 - The Ultimate Guide to Hacking using the most dangerous tools
- This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.
- Beginning with some of the fundamentals of networking, and technologies that are vital to be aware for every hacker.
- It will cover some studying techniques that can be used in order to be able to follow today's fast growing technologies, and then will recommend additional study materials and what certification path you should be aiming in order to become an IT Professional.
- The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step, on hacker tools.
----------------------------------------------------------------------------------
Book 3 - The Ultimate Guide to Wireless Hacking using the best tools 2017
- Do you want to learn how to hack any wireless networksusing only a laptop?
- Do you want to know how your laptop can becomewireless access point?
- Do you want to access a detailed guide on how to manipulateWireless networks?
- In this book you will learn:
- How to find hidden wireless networks
- How to join any wireless access points
- How to implement a Rouge Wireless Access Point
- Discovering networking devices through wireless
- Exploiting systems in multiple ways using wireless technologies
- Implementing Man in the Middle attack in multiple ways
- How to create an Evil Twin
- How to become a wireless access point using your laptop
- How to implement wireless collision attack
- Wireless flooding attack, Replay attack, Denial of Sleep, and many more...
----------------------------------------------------------------------------------
Book 4 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks
- Do you want to learn about today's most sophisticated Hacking attacks?
- Do you want to know more about Cyber criminals and their operations?
- Do you want to learn about Robot Networks, Trojans & Ransomware?
In this book you will learn about:
- ADWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISONING
- WORMS
- ROGUE WIRELESS ACCESS POINTS
- MISS-ASSOCIATION ATTACKS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHINGVISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFING
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNA-CRYRANSOMWARE
- BOTNETS
商品描述(中文翻譯)
您期待已久的駭客書籍套裝現已開賣!
-------------- 本書包含 4 本手稿 --------------
1 - 駭客入門終極指南
2 - 使用最危險工具的駭客終極指南
3 - 使用最佳工具的無線駭客終極指南
4 - 17 種最危險駭客攻擊的終極指南
----------------------------------------------------------------------------------
書籍 1 - 駭客入門終極指南
- 接下來的章節將專注於駭客的基本知識,首先列出駭客可以實現的可能性以及最常見的動機。
- 接著將涵蓋一些基本的技術相關術語,這些術語即使對安全專家來說也常常會混淆。
- 然後將討論不同類型的駭客,並查看他們的技能水平範例,了解彼此之間的差異。
- 討論將帶我們回到 70 年代,看看駭客的歷史,他們的夢想是什麼,以及他們對計算未來的期望。
- 在討論完舊派駭客後,我們將進入當今廣闊而多元的互聯網,並解釋沒有任何東西是完全安全的!
----------------------------------------------------------------------------------
書籍 2 - 使用最危險工具的駭客終極指南
- 本書將專注於一些最危險的駭客工具,這些工具是白帽駭客和黑帽駭客的最愛。
- 從一些網路基礎知識和每位駭客都必須了解的技術開始。
- 將涵蓋一些學習技巧,以便能夠跟上當今快速增長的技術,並推薦額外的學習材料以及您應該追求的認證路徑,以成為 IT 專業人士。
- 本書的重點是介紹一些您可以免費使用的知名軟體,此外還會告訴您在哪裡找到它們、如何訪問它們,並且在每一章中,您將找到逐步演示的駭客工具範例。
----------------------------------------------------------------------------------
書籍 3 - 使用最佳工具的無線駭客終極指南 2017
- 您想學習如何僅使用筆記型電腦駭入任何無線網路嗎?
- 您想知道您的筆記型電腦如何變成無線接入點嗎?
- 您想獲得有關如何操控無線網路的詳細指南嗎?
- 在本書中,您將學到:
- 如何找到隱藏的無線網路
- 如何加入任何無線接入點
- 如何實施 Rogue Wireless Access Point
- 通過無線發現網路設備
- 使用無線技術以多種方式利用系統
- 以多種方式實施中間人攻擊
- 如何創建 Evil Twin
- 如何使用您的筆記型電腦成為無線接入點
- 如何實施無線碰撞攻擊
- 無線洪水攻擊、重播攻擊、拒絕服務攻擊等...
----------------------------------------------------------------------------------
書籍 4 - 17 種最危險駭客攻擊的終極指南
- 您想了解當今最複雜的駭客攻擊嗎?
- 您想知道更多有關網路罪犯及其操作的資訊嗎?
- 您想了解有關機器人網路、木馬和勒索病毒的知識嗎?
在本書中,您將學到:
- 廣告軟體 (ADWARE)
- 間諜軟體 (SPYWARE)
- 惡意軟體 (MALWARE)
- 中間人攻擊 (MAN IN THE MIDDLE)
- LOCKY
- 流量重定向 (TRAFFIC REDIRECTION)
- 有效載荷注入 (PAYLOAD INJECTION)
- ARP 中毒 (ARP POISONING)
- 蠕蟲 (WORMS)
- 惡意無線接入點 (ROGUE WIRELESS ACCESS POINTS)
- 錯誤關聯攻擊 (MISS-ASSOCIATION ATTACKS)
- 去認證攻擊 (DE-AUTHENTICATION ATTACKS)
- 碰撞攻擊 (COLLISION ATTACKS)
- 重播攻擊 (REPLAY ATTACKS)
- 釣魚攻擊 (PHISHING)、語音釣魚 (VISHING)
- 鯨魚釣魚 (WHALING)
- 簡訊釣魚 (SMISHING)
- 矛釣魚 (SPEAR PHISHING)
- 垃圾桶潛水 (DUMPSTER DIVING)
- 肩膀監視 (SHOULDER SURFING)
- 暴力破解攻擊 (BRUTE FORCE ATTACK)
- 字典攻擊 (DICTIONARY ATTACKS)
- 彩虹表 (RAINBOW TABLES)
- 鍵盤記錄 (KEYSTROKE LOGGINGS)
- 欺騙 (SPOOFING)
- 社會工程 (SOCIAL ENGINEERING)
- 垃圾郵件 (SPAMMING)
- SQL 注入 (SQL INJECTIONS)
- DDoS 攻擊 (DDOS ATTACKS)
- TCP SYN 洪水攻擊 (TCP SYN FLOOD ATTACK)
- 死亡回撥 (PING OF DEATH)
- 病毒 (VIRUSES)
- 根套件 (ROOTKITS)
- 邏輯炸彈 (LOGIC BOMBS)
- 木馬 (TROJAN HORSES)
- WannaCry 勒索病毒 (WANNA-CRY RANSOMWARE)
- 僵屍網路 (BOTNETS)