A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.
You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network.
You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like:
"synopsis" may belong to another edition of this title.
Dr. Daniel Graham is an Assistant professor of Computer Science at The University of Virginia in Charlottesville, Virginia. His research interests include secure embedded systems and networks. Before joining UVA, Dr. Graham was a Program Manager at Microsoft in Seattle, Washington. He publishes in IEEE journals relating to sensors and networks.
"About this title" may belong to another edition of this title.
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Fair. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way. Seller Inventory # 1718501870-7-1
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. Seller Inventory # 00092484080
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_433364926
Seller: clickgoodwillbooks, Indianapolis, IN, U.S.A.
Condition: acceptable. Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may be missing bundled media. Seller Inventory # CSIV.1718501870.A
Seller: Goodwill Books, Hillsboro, OR, U.S.A.
Condition: acceptable. Fairly worn, but readable and intact. If applicable: Dust jacket, disc or access code may not be included. Seller Inventory # GICWV.1718501870.A
Seller: Follow Books, SOUTHFIELD, MI, U.S.A.
Condition: New. New Book. Seller Inventory # 1718501870-TUX
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 42594168-n
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.You'll begin with the basics- capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network.You'll work with a wide range of professional penetration testing tools-and learn to write your own tools in Python-as you practice tasks like-Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming filesCapturing passwords in a corporate Windows network using MimikatzScanning (almost) every device on the internet to find potential victimsInstalling Linux rootkits that modify a victim's operating systemPerforming advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloadsAlong the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more.Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker- someone who can carefully analyze systems and creatively gain access to them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781718501874
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 42594168
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: As New. Unread copy in mint condition. Seller Inventory # RH9781718501874