Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

By Stuart McClure, Joel Scambray, George Kurtz

The world's bestselling laptop safety book--fully increased and updated

"Right now you carry on your hand essentially the most profitable defense books ever written. instead of being a sideline player, leverage the precious insights Hacking uncovered 6 presents to aid your self, your organization, and your kingdom struggle cyber-crime." --From the Foreword by way of Dave DeWalt, President and CEO, McAfee, Inc.

"For defense to achieve success in any corporation, you need to ‘think evil' and be attuned in your ‘real risk'...Hacking divulge 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive source to realizing the hacking mind-set and the defenses opposed to it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity robbery charges billions each year and until you know the chance, you may be destined to be a sufferer of it. Hacking uncovered 6 grants the instruments you must hinder being a victim." --Bill Loesch, CTO, shield identity Systems

"This e-book is present, finished, considerate, sponsored by means of adventure, and accurately freed from vendor-bias-prized positive factors for any protection practitioner short of information." --Kip Boyle, CISO, PEMCO Mutual assurance Company

"The Hacking uncovered sequence has develop into the definitive reference for protection pros from the instant it was once first published, and the sixth version continues its position on my bookshelf," --Jeff Moss, founding father of the preferred Black Hat safeguard Conference

Meet the bold calls for of defense in modern day hyperconnected global with specialist information from the world-renowned Hacking uncovered staff. Following the time-tested "attack-countermeasure" philosophy, this tenth anniversary variation has been totally overhauled to hide the newest insidious guns within the hacker's large arsenal.

New and up-to-date material:

  • New bankruptcy on hacking undefined, together with lock bumping, entry card cloning, RFID hacks, USB U3 exploits, and Bluetooth equipment hijacking
  • Updated home windows assaults and countermeasures, together with new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The most up-to-date UNIX Trojan and rootkit ideas and dangling pointer and enter validation exploits
  • New instant and RFID safeguard instruments, together with multilayered encryption and gateways
  • All-new tracerouting and eavesdropping ideas used to focus on community and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, together with Google and TFTP tips, SIP flooding, and IPsec hacking
  • Fully up to date chapters on hacking the net person, net hacking, and securing code

Show description

Quick preview of Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one big apple occasions bestseller opposed to All Enemies, former presidential consultant and counter-terrorism specialist Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber battle! each involved American may still learn this startling and explosive e-book that gives an insider’s view of White apartment ‘Situation Room’ operations and consists of the reader to the frontlines of our cyber safety.

Information Security: The Complete Reference, Second Edition

Enhance and enforce an efficient end-to-end defense software Today’s complicated international of cellular structures, cloud computing, and ubiquitous facts entry places new safety calls for on each IT specialist. details safeguard: the whole Reference, moment variation (previously titled community safeguard: the total Reference) is the one finished publication that provides vendor-neutral information on all points of knowledge security, with a watch towards the evolving chance panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State of the art thoughts for locating and solving serious protection flaws toughen your community and stay clear of electronic disaster with confirmed options from a group of defense specialists. thoroughly up-to-date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth version explains the enemy’s present guns, abilities, and strategies and provides field-tested treatments, case reviews, and ready-to-deploy checking out labs.

Network Security: The Complete Reference

Teaches end-to-end community protection thoughts and methods. contains complete info on easy methods to layout a finished safeguard security version. Plus, discloses tips to advance and installation computing device, team of workers, and actual defense rules, the way to layout and deal with authentication and authorization tools, and masses extra.

Extra info for Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

Show sample text content

484 WPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 assaults opposed to the WPA set of rules . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 extra assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488 precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 ▼ nine Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 actual entry: getting into the Door . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Hacking units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Default Confi gurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 Owned Out of the field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 general Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 opposite Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Mapping the machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Sniffi ng Bus information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Firmware Reversing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510 JTAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 xvii Contents half IV program and knowledge Hacking Case learn: consultation using . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 ▼ 10 Hacking Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 universal take advantage of thoughts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Buffer Overfl ows and layout Flaws . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 enter Validation assaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 universal Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 humans: altering the tradition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 procedure: safety within the improvement Lifecycle (SDL) . . . . . . . . . . . . 532 expertise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 advised extra examining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 ▼ eleven internet Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 net Server Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 pattern documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 resource Code Disclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 Canonicalization assaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Server Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Buffer Overfl ows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 internet Server Vulnerability Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 net program Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 discovering susceptible net Apps with Google . . . . . . . . . . . . . . . . . . . . . 553 internet Crawling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 internet program overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 universal internet program Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570 precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 ▼ 12 Hacking the net consumer . . . . .

Download PDF sample

Rated 4.29 of 5 – based on 23 votes