Hacking
epub, pdf |eng | 2014-03-19 | Author:Kim, Peter [Kim, Peter]
Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take these usernames/passwords and ...
( Category:
Testing
April 29,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]
User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category:
Hacking
April 5,2014 )
epub, mobi, pdf |eng | 2013-12-06 | Author:Broad, James, Bindner, Andrew & Andrew Bindner
Most transfers will fail, however, if the target name server is misconfigured. The entire name servers record set will be transferred to the local Kali Linux computer. When using this ...
( Category:
Hacking
April 1,2014 )
epub, pdf |eng | 2012-10-09 | Author:E. Gabriella Coleman [Coleman, E. Gabriella]
CHAPTER 4 Two Ethical Moments in Debian F/OSS projects largely take place on the Internet. Varying in size from a couple of developers to a network of over one thousand, ...
( Category:
Software Development
April 1,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru
Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category:
Hacking
March 30,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich
Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category:
Networks
March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]
TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-08-01 | Author:Anton Chuvakin & Branden R. Williams
Other aspects of your vulnerability management program apply to securing the software developed in-house. Section 6.3 states that one needs to “develop software applications based on industry best practices and ...
( Category:
Enterprise Applications
March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]
Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category:
Microsoft Windows Registry
March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema
Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category:
Hacking
March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg
Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category:
Hacking
March 26,2014 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
