Angebote zu "Hacking" (39 Treffer)

Kategorien

Shops

Mehr Hacking mit Python
29,90 € *
ggf. zzgl. Versand

Wenn es um die Entwicklung leistungsfähiger und effizienter Hacking-Tools geht, ist Python für die meisten Sicherheitsanalytiker die Sprache der Wahl. Doch wie genau funktioniert das?In dem neuesten Buch von Justin Seitz - dem Autor des Bestsellers "Hacking mit Python" - entdecken Sie Pythons dunkle Seite. Sie entwickeln Netzwerk-Sniffer, manipulieren Pakete, infizieren virtuelle Maschinen, schaffen unsichtbare Trojaner und vieles mehr.Sie lernen praktisch, wie man- einen "Command-and-Control"-Trojaner mittels GitHub schafft- Sandboxing erkennt und gängige Malware-Aufgaben wie Keylogging und Screenshotting automatisiert- Windows-Rechte mittels kreativer Prozesskontrolle ausweitet- offensive Speicherforensik-Tricks nutzt, um Passwort-Hashes abzugreifen und Shellcode in virtuelle Maschinen einzuspeisen- das beliebte Web-Hacking-Tool Burp erweitert- die Windows COM-Automatisierung nutzt, um einen Man-in-the-Middle-Angriff durchzuführen- möglichst unbemerkt Daten aus einemNetzwerk abgreiftEine Reihe von Insider-Techniken und kreativenAufgaben zeigen Ihnen, wie Sie die Hacks erweiternund eigene Exploits entwickeln können."Der Unterschied zwischen Skript-Kiddiesund Profis besteht darin, ob man bloßdie Tools anderer Leute nutzt oder eigeneentwickelt."Aus dem Geleitwort von Charlie Millert

Anbieter: buecher
Stand: 30.03.2020
Zum Angebot
Hacking for Beginners: Learn Practical Hacking ...
9,95 € *
ggf. zzgl. Versand

Learn practical hacking skills! Forget about complicated textbooks and guides. Listen to this book and you will be on your way to your first hack! Hacking is a word that one often finds in the tabloids, newspapers, the Internet, and countless other places. There is a lot of news about hackers doing this or that on a daily basis. The severity of these activities can range from accessing a simple household computer system to stealing confidential data from secure government facilities. This book will serve as a guiding tool for you to understand the basics of the subject and slowly build up a base of the knowledge that you need to gain. You will be made aware of several aspects of hacking, and you will find the knowledge in here fascinating. Therefore, put on your curious glasses and dive into the world of hacking with us now. We will discuss everything from the basics of ethical hacking to all you need to know about WiFi password cracking. It should be kept in mind that to understand the concept of ethical hacking, you should be able to know all about black hat hacking and how it is done. Only then is it imperative to understand what steps you could take to stop it.  Here is a preview of what you'll learn.... What is hacking? Types of hacking  White hat hacking, or ethical hacking  Password cracking  Understanding computer viruses  Hacking wireless (Wi-Fi) networks  Hacking web servers Penetration testing  Cyber-crime  Much, much more! Download your copy today! 1. Language: English. Narrator: Glynn Amburgey. Audio sample: http://samples.audible.de/bk/acx0/108328/bk_acx0_108328_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.03.2020
Zum Angebot
Black Hat Python
22,99 € *
ggf. zzgl. Versand

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities-writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: -Create a trojan command-and-control using GitHub -Detect sandboxing and automate common malware tasks, like keylogging and screenshotting -Escalate Windows privileges with creative process control -Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine -Extend the popular Burp Suite web-hacking tool -Abuse Windows COM automation to perform a man-in-the-browser attack -Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2

Anbieter: buecher
Stand: 30.03.2020
Zum Angebot
Black Hat Python
22,99 € *
ggf. zzgl. Versand

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities-writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: -Create a trojan command-and-control using GitHub -Detect sandboxing and automate common malware tasks, like keylogging and screenshotting -Escalate Windows privileges with creative process control -Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine -Extend the popular Burp Suite web-hacking tool -Abuse Windows COM automation to perform a man-in-the-browser attack -Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2

Anbieter: buecher
Stand: 30.03.2020
Zum Angebot
Linux Basics for Hackers
21,99 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 30.03.2020
Zum Angebot
Linux Basics for Hackers
21,99 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 30.03.2020
Zum Angebot
Hacking with Kali Linux: The Complete Guide on ...
9,95 € *
ggf. zzgl. Versand

If you want to learn the art of hacking, then keep reading...This audiobook explains Hacking using an operating system that is created for this sole purpose. We start with an introduction to the world of hacking along with a lot of examples and processes that hackers use in their real life testing methods. As a hacker, one needs to understand basic Linux commands along with bash and python scripting. This audiobook has provided a lot of bash and python examples that will make you start with the hacking scripting. In the next sections, we have discussed about Network management, process management and several other parts of Linux architecture in detail. In the subsequent section is dedicated about VPN and Tor network. We have explained everything in Layman's concept along with a lot of examples. Apart from this in the last section, we have made a whole new strategy to attack web using Burp suite an important kali Linux tool. Below we will explain about the exciting parts of the audiobook without any delay. Find out what are the gems you can find in this audiobook below. Hacking process along with clear instructions. This is more like a starting tip for the beginner hackersInstallation of virtual machine VM ware and Installation of kali Linux in detail.Bash scripting with a lot of examples. We will explain variables, conditionals and looping in Bash scripting.Python scripting with a lot of examples. We will explain variables, classes, objects in python scripting.Network management and a lot of methods to spoof addressesProcess management along with examples. We give so many methodologies to kill a process and prioritizing processes.Description about the Logging system and its usesAutomating tasksAbout TOR bundle, Vpn and Proxy chainsWeb hacking using the Burp suiteEven if you've never used Linux, you can learn it quickly.If you want to learn more 1. Language: English. Narrator: D. Wolf. Audio sample: http://samples.audible.de/bk/acx0/182234/bk_acx0_182234_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.03.2020
Zum Angebot
Hacking: How to Hack Web Apps , Hörbuch, Digita...
9,95 € *
ggf. zzgl. Versand

In order to understand hackers and protect the network infrastructure, you must think like a hacker in today’s expansive and eclectic internet, and you must understand that nothing is fully secured.Considering that you are preparing to became an ethical hacker, IT security analyst, IT security engineer, or a cybersecurity specialist, yet still in doubt and want to know about vulnerabilities in both web applications and web services, ways to hack them, as well as how to secure them, you will find this book extremely useful.If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for White Hat use only.The main focus of this audiobook is to help you understand how firewalls, intrusion detection systems, intrusion prevention systems, or honeypots work.By listening to this book, you will boost your knowledge on what is possible in today’s hacking world and help you become an ethical hacker aka penetration tester. In this audiobook, you'll learn about:Cross-site scripting attack Forceful browsing attack Banner grabbing Server fingerprinting HTML tampering Deploying mass assignment attack Cookie poisoning attack Cross-site request forgery Exposing "remember me"Privilege elevationJail-breaking Session fixation attack Keystroke logging attack Rooting android devices Rowhammer attackAnd much more...Buy this audiobook now and get started today!  1. Language: English. Narrator: Sam Thurman. Audio sample: http://samples.audible.de/bk/acx0/183330/bk_acx0_183330_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.03.2020
Zum Angebot
Hacking!: 3 Books in 1: A Guide to Ethical Hack...
9,95 € *
ggf. zzgl. Versand

It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world. With more and more people are moving online and doing almost any task that they can there, it is likely that hacking is just going to increase over time. Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world. Would you like to be able to protect your system and learn more about the different methods hackers can use to get onto your computer through your network and wireless network? This guidebook is going to provide us with all of the information that we need to know about hacking with Kali Linux, the most complete tool to protect the network, to make sure that hackers are not able to get onto your computer and cause trouble or steal your personal information.  We will take a look at a lot of the different topics and techniques that we need to know when it comes to working with hacking on the Linux system. We will also learn how to complete a penetration test to find out where the vulnerabilities of our system lie, and how to handle our wireless network to make sure that we are going to keep our information safe. Some of the topics that we are going to take a look at here include: The different types of hackers that we may encounter. The basics of cybersecurity, web security, and cyberattacks and how these can affect your computer system and how a hacker will try to use you.  The different types of malware that hackers can use against you. The consequences of a cyber-attack and why we need to prevent it.  How to install Kali Linux onto your operating system to get started.  Some of the commands that you can send over to your terminal.  Some of the basics of the Kali Linux network and the stag 1. Language: English. Narrator: Jordan Blom. Audio sample: http://samples.audible.de/bk/acx0/181947/bk_acx0_181947_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.03.2020
Zum Angebot