Network Security
mobi | | | Author:Nitesh Dhanjani
( Category:
Software Development
January 6,2015 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]
Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category:
Viruses
December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Encryption
December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]
Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category:
Hacking
December 15,2014 )
epub, azw3 |eng | | Author:Shane Harris
Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category:
Privacy & Online Safety
November 18,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo
Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category:
Network Security
October 27,2014 )
mobi |eng | 2005-01-02 | Author:Kevin Mitnick [Mitnick, Kevin]
They discovered a live network jack, presumably for the convenience of company personnel who wanted to be able to access the corporate network during meetings. Plugging in an Ethernet cable ...
( Category:
Hacking
October 13,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema
Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category:
Hacking
August 28,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson
Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category:
Privacy & Online Safety
May 26,2014 )
mobi |eng | 2007-01-22 | Author:Pfleeger, Charles P. & Pfleeger, Shari Lawrence [Pfleeger, Charles P.]
Protocol Failures and Implementation Flaws Each protocol is a specification of a service to be provided; the service is then implemented in software, which, as discussed in Chapter 3, may ...
( Category:
Network Security
May 26,2014 )
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Zalewski Michal
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]
Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category:
LAN
May 26,2014 )
epub, pdf |eng | 2014-03-19 | Author:Kim, Peter [Kim, Peter]
Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take these usernames/passwords and ...
( Category:
Testing
April 29,2014 )
epub |eng | 2009-02-08 | Author:Chandra, Pravir, Messier, Matt, Viega, John & Matt Messier & Pravir Chandra [John Viega]
type The operation to perform, which can be one of the following constants: EVP_CTRL_GET_RC2_KEY_BITS EVP_CTRL_SET_RC2_KEY_BITS EVP_CTRL_GET_RC5_ROUNDS EVP_CTRL_SET_RC5_ROUNDS arg The numerical value to set, if appropriate. If not appropriate, its value ...
( Category:
Network Security
April 6,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7783)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6563)
Running Windows Containers on AWS by Marcio Morales(6094)
Kotlin in Action by Dmitry Jemerov(5067)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4922)
Combating Crime on the Dark Web by Nearchos Nearchou(4502)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4346)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3958)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3345)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3332)
Blockchain Basics by Daniel Drescher(3297)
Learn Wireshark by Lisa Bock(3267)
