Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast (Paperback)
暫譯: 駭客技術:駭客入門、滲透測試駭客書籍、逐步實作與示範指南,快速學習(平裝本)
Alex Wagner
- 出版商: CreateSpace Independ
- 出版日期: 2017-11-12
- 售價: $1,400
- 貴賓價: 9.5 折 $1,330
- 語言: 英文
- 頁數: 584
- 裝訂: Paperback
- ISBN: 1979683239
- ISBN-13: 9781979683234
-
相關分類:
Penetration-test、駭客 Hack
無法訂購
買這商品的人也買了...
-
$780$663 -
$1,365Systems Performance: Enterprise and the Cloud (Paperback)
-
$450$356 -
$1,200$1,140 -
$580$383 -
$780$616 -
$350$273 -
$480$408 -
$590$460 -
$580$452 -
$390$257 -
$450$356 -
$500$390 -
$150$135 -
$150$135 -
$450$356 -
$500$390 -
$490$417 -
$699$594 -
$450$297 -
$525$499 -
$1,580$1,501 -
$360$284 -
$580$458 -
$1,653Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World
相關主題
商品描述
HACKING - 5 BOOKS IN 1
- The history of hacking, What motivates Hackers, and how to differentiate one to another
- Networking fundamentals, and basic system requirements
- Where to find the best operating systems for the purpose of Hacking
- What virtualization is, and how to install Hacking software
Penetrating Wired Networks
- Exploiting systems in multiple ways,
- Implementing Man in the Middle attack in multiple ways,
- How to use Social Engineering Toolkits,
- Creating a fake packet and find vulnerabilities,
- How to manipulate the network
Wireless Hacking
- How to own adevice connected remotely
- How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
- Discovering networking devices through wireless
- Exploiting systems in multiple ways using wireless technologies
- Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
Hacking Attacks
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISIONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFINS
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNAYCRY RANSOMWARE
- BOTNETS
CyberGangs
- Cutting sword of justice,
- Guardians of Peace,
- Honker Union,
- Anonymous
- Syrian Electronic Army,
- LulzSec,
- Carbanac,
- Equation Group,
- The Shadow Brokers
商品描述(中文翻譯)
**駭客技術 - 5 本書合一**
**書籍 1: 初學者指南**
**書籍 2: 無線駭客技術**
**書籍 3: 每位駭客必備的 17 種工具**
**書籍 4: 17 種最危險的駭客攻擊**
**書籍 5: 10 大最危險的網路黑幫**
-------------------------------------------
在本書中,您將學習到:
-------------------------------------------
**基本知識**
- 駭客的歷史、駭客的動機,以及如何區分不同的駭客
- 網路基礎知識及基本系統需求
- 如何找到最適合駭客用途的作業系統
- 什麼是虛擬化,以及如何安裝駭客軟體
**滲透有線網路**
- 以多種方式利用系統
- 以多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操控網路
**無線駭客技術**
- 如何控制遠端連接的設備
- 如何找到隱藏的無線網路,如何實施惡意無線接入點
- 通過無線發現網路設備
- 使用無線技術以多種方式利用系統
- 以多種方式實施中間人攻擊,如何使用筆記型電腦成為無線接入點
**駭客攻擊**
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFING
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNACRY RANSOMWARE
- BOTNETS
**網路黑幫**
- 正義之劍
- 和平守護者
- 鳴響聯盟
- 匿名者
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers