Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast

Alex Wagner

  • 出版商: CreateSpace Independ
  • 出版日期: 2017-11-12
  • 售價: $1,180
  • 貴賓價: 9.5$1,121
  • 語言: 英文
  • 頁數: 584
  • 裝訂: Paperback
  • ISBN: 1979683239
  • ISBN-13: 9781979683234
  • 相關分類: Penetration-test駭客 Hack
  • 立即出貨(限量) (庫存=1)

買這商品的人也買了...

商品描述

HACKING - 5 BOOKS IN 1 

BOOK 1: Beginners Guide 
BOOK 2: Wireless Hacking 
BOOK 3: 17 Most Tools Every Hacker Should Have 
BOOK 4: 17 Most Dangerous Hacking Attacks 
BOOK 5: 10 Most Dangerous Cyber Gangs 
-------------------------------------------
In this book you will learn about:
-------------------------------------------
Basic Knowledge
  • The history of hacking, What motivates Hackers, and how to differentiate one to another
  • Networking fundamentals, and basic system requirements
  • Where to find the best operating systems for the purpose of Hacking
  • What virtualization is, and how to install Hacking software
 
Penetrating Wired Networks
  • Exploiting systems in multiple ways, 
  • Implementing Man in the Middle attack in multiple ways, 
  • How to use Social Engineering Toolkits, 
  • Creating a fake packet and find vulnerabilities, 
  • How to manipulate the network
 
Wireless Hacking
  • How to own adevice connected remotely
  • How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
  • Discovering networking devices through wireless
  • Exploiting systems in multiple ways using wireless technologies
  • Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
 
Hacking Attacks
  • ADVWARE
  • SPYWARE
  • MALWARE
  • MAN IN THE MIDDLE
  • LOCKY
  • TRAFFIC REDIRECTION
  • PAYLOAD INJECTION
  • ARP POISIONING
  • WORMS
  • DE-AUTHENTICATION ATTACKS
  • COLLISION ATTACKS
  • REPLAY ATTACKS 
  • PHISHING
  • VISHING
  • WHALING
  • SMISHING
  • SPEAR PHISHING
  • DUMPSTER DIVING
  • SHOULDER SURFING
  • BRUTE FORCE ATTACK
  • DICTIONARY ATTACKS 
  • RAINBOW TABLES
  • KEYSTROKE LOGGINGS  
  • SPOOFINS
  • SOCIAL ENGINEERING
  • SPAMMING
  • SQL INJECTIONS
  • DDOS ATTACKS
  • TCP SYN FLOOD ATTACK 
  • PING OF DEATH
  • VIRUSES  
  • ROOTKITS
  • LOGIC BOMBS
  • TROJAN HORSES
  • WANNAYCRY RANSOMWARE
  • BOTNETS
 
CyberGangs
  • Cutting sword of justice,  
  • Guardians of Peace, 
  • Honker Union, 
  • Anonymous
  • Syrian Electronic Army, 
  • LulzSec, 
  • Carbanac,
  • Equation Group, 
  • The Shadow Brokers

商品描述(中文翻譯)

《HACKING - 5本合一》

書籍1:初學者指南
書籍2:無線網絡入侵
書籍3:17種每個駭客都應該擁有的工具
書籍4:17種最危險的駭客攻擊
書籍5:10個最危險的網絡犯罪團伙

在本書中,您將學到以下內容:
基礎知識
- 駭客的歷史,駭客的動機以及如何區分不同類型的駭客
- 網絡基礎知識和基本系統要求
- 尋找最佳的操作系統進行駭客活動
- 虛擬化和安裝駭客軟件

入侵有線網絡
- 多種方式的系統入侵
- 多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操縱網絡

無線網絡入侵
- 如何遠程控制連接的設備
- 如何查找隱藏的無線網絡,實施偽造的無線接入點
- 通過無線網絡發現網絡設備
- 使用無線技術多種方式入侵系統
- 多種方式實施中間人攻擊,使用筆記本電腦成為無線接入點

駭客攻擊
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISIONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFINS
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNAYCRY RANSOMWARE
- BOTNETS

網絡犯罪團伙
- 正義之劍
- 和平守護者
- Honker聯盟
- Anonymous
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers

類似商品