Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast (Paperback)
暫譯: 駭客技術:駭客入門、滲透測試駭客書籍、逐步實作與示範指南,快速學習(平裝本)

Alex Wagner

  • 出版商: CreateSpace Independ
  • 出版日期: 2017-11-12
  • 售價: $1,400
  • 貴賓價: 9.5$1,330
  • 語言: 英文
  • 頁數: 584
  • 裝訂: Paperback
  • ISBN: 1979683239
  • ISBN-13: 9781979683234
  • 相關分類: Penetration-test駭客 Hack
  • 無法訂購

買這商品的人也買了...

相關主題

商品描述

HACKING - 5 BOOKS IN 1 

 
BOOK 1: Beginners Guide 
BOOK 2: Wireless Hacking 
BOOK 3: 17 Most Tools Every Hacker Should Have 
BOOK 4: 17 Most Dangerous Hacking Attacks 
BOOK 5: 10 Most Dangerous Cyber Gangs 
-------------------------------------------
 
 
 
 
In this book you will learn about:
-------------------------------------------
 
 
 
 
 
 
Basic Knowledge
  • The history of hacking, What motivates Hackers, and how to differentiate one to another
  • Networking fundamentals, and basic system requirements
  • Where to find the best operating systems for the purpose of Hacking
  • What virtualization is, and how to install Hacking software
 
Penetrating Wired Networks
  • Exploiting systems in multiple ways, 
  • Implementing Man in the Middle attack in multiple ways, 
  • How to use Social Engineering Toolkits, 
  • Creating a fake packet and find vulnerabilities, 
  • How to manipulate the network
 
Wireless Hacking
  • How to own adevice connected remotely
  • How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
  • Discovering networking devices through wireless
  • Exploiting systems in multiple ways using wireless technologies
  • Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
 
Hacking Attacks
  • ADVWARE
  • SPYWARE
  • MALWARE
  • MAN IN THE MIDDLE
  • LOCKY
  • TRAFFIC REDIRECTION
  • PAYLOAD INJECTION
  • ARP POISIONING
  • WORMS
  • DE-AUTHENTICATION ATTACKS
  • COLLISION ATTACKS
  • REPLAY ATTACKS 
  • PHISHING
  • VISHING
  • WHALING
  • SMISHING
  • SPEAR PHISHING
  • DUMPSTER DIVING
  • SHOULDER SURFING
  • BRUTE FORCE ATTACK
  • DICTIONARY ATTACKS 
  • RAINBOW TABLES
  • KEYSTROKE LOGGINGS  
  • SPOOFINS
  • SOCIAL ENGINEERING
  • SPAMMING
  • SQL INJECTIONS
  • DDOS ATTACKS
  • TCP SYN FLOOD ATTACK 
  • PING OF DEATH
  • VIRUSES  
  • ROOTKITS
  • LOGIC BOMBS
  • TROJAN HORSES
  • WANNAYCRY RANSOMWARE
  • BOTNETS
 
CyberGangs
  • Cutting sword of justice,  
  • Guardians of Peace, 
  • Honker Union, 
  • Anonymous
  • Syrian Electronic Army, 
  • LulzSec, 
  • Carbanac,
  • Equation Group, 
  • The Shadow Brokers

商品描述(中文翻譯)

**駭客技術 - 5 本書合一**

**書籍 1: 初學者指南**

**書籍 2: 無線駭客技術**

**書籍 3: 每位駭客必備的 17 種工具**

**書籍 4: 17 種最危險的駭客攻擊**

**書籍 5: 10 大最危險的網路黑幫**

-------------------------------------------

在本書中,您將學習到:

-------------------------------------------

**基本知識**

- 駭客的歷史、駭客的動機,以及如何區分不同的駭客
- 網路基礎知識及基本系統需求
- 如何找到最適合駭客用途的作業系統
- 什麼是虛擬化,以及如何安裝駭客軟體

**滲透有線網路**

- 以多種方式利用系統
- 以多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操控網路

**無線駭客技術**

- 如何控制遠端連接的設備
- 如何找到隱藏的無線網路,如何實施惡意無線接入點
- 通過無線發現網路設備
- 使用無線技術以多種方式利用系統
- 以多種方式實施中間人攻擊,如何使用筆記型電腦成為無線接入點

**駭客攻擊**

- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFING
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNACRY RANSOMWARE
- BOTNETS

**網路黑幫**

- 正義之劍
- 和平守護者
- 鳴響聯盟
- 匿名者
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers