Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast (Paperback) (駭客入門:滲透測試與實作指南)
Alex Wagner
- 出版商: CreateSpace Independ
- 出版日期: 2017-11-12
- 售價: $1,390
- 貴賓價: 9.5 折 $1,321
- 語言: 英文
- 頁數: 584
- 裝訂: Paperback
- ISBN: 1979683239
- ISBN-13: 9781979683234
-
相關分類:
Penetration-test、駭客 Hack
無法訂購
買這商品的人也買了...
-
$780$616 -
$1,365Systems Performance: Enterprise and the Cloud (Paperback)
-
$450$356 -
$1,200$1,140 -
$580$493 -
$780$616 -
$350$273 -
$480$408 -
$590$460 -
$580$452 -
$390$332 -
$450$356 -
$500$390 -
$150$135 -
$150$135 -
$450$356 -
$500$390 -
$490$417 -
$699$594 -
$450$383 -
$525$499 -
$1,560$1,482 -
$360$284 -
$580$522 -
$1,653$1,566
相關主題
商品描述
HACKING - 5 BOOKS IN 1
- The history of hacking, What motivates Hackers, and how to differentiate one to another
- Networking fundamentals, and basic system requirements
- Where to find the best operating systems for the purpose of Hacking
- What virtualization is, and how to install Hacking software
Penetrating Wired Networks
- Exploiting systems in multiple ways,
- Implementing Man in the Middle attack in multiple ways,
- How to use Social Engineering Toolkits,
- Creating a fake packet and find vulnerabilities,
- How to manipulate the network
Wireless Hacking
- How to own adevice connected remotely
- How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
- Discovering networking devices through wireless
- Exploiting systems in multiple ways using wireless technologies
- Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
Hacking Attacks
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISIONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFINS
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNAYCRY RANSOMWARE
- BOTNETS
CyberGangs
- Cutting sword of justice,
- Guardians of Peace,
- Honker Union,
- Anonymous
- Syrian Electronic Army,
- LulzSec,
- Carbanac,
- Equation Group,
- The Shadow Brokers
商品描述(中文翻譯)
《HACKING - 5本合一》
書籍1:初學者指南
書籍2:無線網絡入侵
書籍3:17種每個駭客都應該擁有的工具
書籍4:17種最危險的駭客攻擊
書籍5:10個最危險的網絡犯罪團伙
在本書中,您將學到以下內容:
基礎知識
- 駭客的歷史,駭客的動機以及如何區分不同類型的駭客
- 網絡基礎知識和基本系統要求
- 尋找最佳的操作系統進行駭客活動
- 虛擬化和安裝駭客軟件
入侵有線網絡
- 多種方式的系統入侵
- 多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操縱網絡
無線網絡入侵
- 如何遠程控制連接的設備
- 如何查找隱藏的無線網絡,實施偽造的無線接入點
- 通過無線網絡發現網絡設備
- 使用無線技術多種方式入侵系統
- 多種方式實施中間人攻擊,使用筆記本電腦成為無線接入點
駭客攻擊
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISIONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFINS
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNAYCRY RANSOMWARE
- BOTNETS
網絡犯罪團伙
- 正義之劍
- 和平守護者
- Honker聯盟
- Anonymous
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers