Hacking
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]
IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category:
Hacking
March 26,2014 )
epub, mobi |eng | 2011-09-05 | Author:Joel Brenner
WIKILEAKS’S STATEMENT of purpose is high-minded. In its view, “principled leaking” changes history for the better, and “transparency in government activities leads to reduced corruption, better government and stronger democracies.” ...
( Category:
Social Aspects
March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold
cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category:
Macs
March 26,2014 )
epub |eng | 2011-10-03 | Author:Misha Glenny [Glenny, Misha]
22 DUDE YOU FUCKED UP Baden-Württemberg, 2007 It was a pleasant evening in early May, although it didn’t feel much like springtime to Matrix001. The external world receded as his ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2009-02-08 | Author:Lockhart, Andrew [Andrew Lockhart]
Hack #70. Distribute Your CA to Clients Be sure all of your clients trust your new Certificate Authority. Once you have created a Certificate Authority (CA) [Hack #69], any program ...
( Category:
Networks
March 26,2014 )
mobi, epub |eng | 2007-01-29 | Author:Litchfield, David [Litchfield, David]
What’s happening here is that we stick our nefarious code into an exception block so when an exception occurs our code executes — in this case, granting DBA privileges to ...
( Category:
Hacking
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2010-08-09 | Author:Richard A. Clarke
OVERALL CYBER WAR STRENGTH Nation: U.S. Cyber Offense: 8 Cyber Dependence: 2 Cyber Defense: 1 Total: 11 Nation: Russia Cyber Offense: 7 Cyber Dependence: 5 Cyber Defense: 4 Total: 16 ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2010-12-21 | Author:Christopher Hadnagy
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 2002-01-02 | Author:Kevin D. Mitnick; William L. Simon; Steve Wozniak
chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2012-06-04 | Author:Olson, Parmy [Olson, Parmy]
LulzSec, as hackers, were in very new territory. Stealing data was one thing, but announcing it through Twitter so the press could report on it was odd. Topiary volunteered to ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 0101-01-01 | Author:Poulsen, Kevin [Poulsen, Kevin]
21 Master Splyntr aking up one oor of a lime-green o ce building on the bank of the Monongahela River, the National Cyber Forensics and Training Alliance was far removed ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2013-12-26 | Author:Beaver, Kevin.; Davis, Peter T. [Beaver, Kevin.; Davis, Peter T.]
Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category:
LAN
March 25,2014 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3035)Future Crimes by Marc Goodman(3009)
Mastering Python for Networking and Security by José Manuel Ortega(2967)
Blockchain Basics by Daniel Drescher(2899)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2536)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2523)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2488)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2389)
The Art Of Deception by Kevin Mitnick(2305)
The Code Book by Simon Singh(2222)
Machine Learning Security Principles by John Paul Mueller(2109)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2092)
Solidity Programming Essentials by Ritesh Modi(1877)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1872)
Wireless Hacking 101 by Karina Astudillo(1854)
DarkMarket by Misha Glenny(1850)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1841)
Mobile Forensics Cookbook by Igor Mikhaylov(1817)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1812)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(1776)