Angebote zu "Hacking" (47 Treffer)

Kategorien

Shops

Hacked: Kali Linux and Wireless Hacking Ultimat...
9,95 € *
ggf. zzgl. Versand

Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks.Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook! Get answers from an experienced IT expert to every single question you have related to the learning you do in this audiobook including:installing Kali Linuxusing VirtualBoxbasics of LinuxStaying anonymous with TorProxychains, Virtual Private Networks (VPN)Macchanger, Nmapcracking wifiaircrackcracking Linux passwordsWhat are the requirements?Reliable and fast internet connection.Wireless networking card.Kali Linux DistributionBasic IT skillsWhat will you get from the hacking audiobook?Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!You will learn the basics of networkDeal with a lot of Kali Linux toolsLearn some Linux commandsTips for remaining anonymous in hacking and penetration testing activities.Protect your WiFi network against all the attacksGain access to any client account in the WiFi networkA complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.Step-by-step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. 1. Language: English. Narrator: Jack Ares. Audio sample: http://samples.audible.de/bk/acx0/166501/bk_acx0_166501_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 10.12.2019
Zum Angebot
Hacking & Security (eBook, ePUB)
44,90 € *
ggf. zzgl. Versand

Know your enemy and know yourself Schwachstellen verstehen, Angriffsvektoren identifizieren Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT Anleitungen für Metasploit, Kali, hydra, OpenVAS, Empire, Pen-Tests, Exploits It's not a bug, it's a backdoor! Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre Systeme auch wirklich sicher machen. Dieses Buch ist der Schlüssel dazu. Die Security-Spezialisten rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen - Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern - hier werden Sie zum Security-Experten! Aus dem Inhalt: Kali Linux Hacking-Tools (nmap, hydra, Metasploit, OpenVas) Externe Sicherheitsüberprüfung Penetration Testing (Client und Server) Basisabsicherung: Linux und Windows, Active Directory und Samba Cloud-Sicherheit: AWS, NextCloud, Office 365 Hacking und Security von Smartphones Web-Anwendungen absichern und angreifen Exploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr IoT-Geräte und -Infrastruktur

Anbieter: buecher
Stand: 10.12.2019
Zum Angebot
Hacking & Security (eBook, ePUB)
44,90 € *
ggf. zzgl. Versand

Know your enemy and know yourself Schwachstellen verstehen, Angriffsvektoren identifizieren Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT Anleitungen für Metasploit, Kali, hydra, OpenVAS, Empire, Pen-Tests, Exploits It's not a bug, it's a backdoor! Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre Systeme auch wirklich sicher machen. Dieses Buch ist der Schlüssel dazu. Die Security-Spezialisten rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen - Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern - hier werden Sie zum Security-Experten! Aus dem Inhalt: Kali Linux Hacking-Tools (nmap, hydra, Metasploit, OpenVas) Externe Sicherheitsüberprüfung Penetration Testing (Client und Server) Basisabsicherung: Linux und Windows, Active Directory und Samba Cloud-Sicherheit: AWS, NextCloud, Office 365 Hacking und Security von Smartphones Web-Anwendungen absichern und angreifen Exploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr IoT-Geräte und -Infrastruktur

Anbieter: buecher
Stand: 10.12.2019
Zum Angebot
Linux for Beginners: An Introduction to the Lin...
9,95 € *
ggf. zzgl. Versand

Are you tired of seeing Windows...well, everywhere? Do you feel like it’s getting a bit boring to use? Maybe you’re simply looking for customization. After all, you want your PC to be personal. If the answer to these questions is yes, then keep reading....Do you enjoy having total control over your device? Do you feel like your operating system has been limiting you? Are you looking for a change of pace? If your answer to these questions is yes, then Linux might be just the thing for you. This isn’t a book for tech geeks. It won’t teach you programming or hacking. Rather, this is a book for someone that enjoys using their PC for what it was made to do. Sure, after listening to this book you might move on to programming or hacking, but as the saying goes, you have to learn to walk before you learn to run. This book will teach you to walk. We’ll be going over all of the important basic parts of Linux, ranging from Distros (“flavors” of Linux, each of which has different properties) to microkernels. This book is meant to be a comprehensive beginner’s guide to Linux. Everything you need to know in order to start your Linux journey is found within this audiobook. Scroll up and click the buy now button! 1. Language: English. Narrator: Donald Cuddington. Audio sample: http://samples.audible.de/bk/acx0/164621/bk_acx0_164621_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 10.12.2019
Zum Angebot
Wireless Hacking: The Beginner's Guide to Hacki...
9,95 € *
ggf. zzgl. Versand

Discover how to easily hack wireless networks - even if you've never hacked, coded, or operated a computer before! Hacking wireless networks can be tricky. There are plenty of dense, complicated books out there that attempt to teach it - but just fall short of sending you into a headspin of confusion. Most of the information out there is complicated, dry, hard to follow, and unrealistic. Not to mention, if wireless hacking is taught incorrectly, you can easily get caught and thrown in the slammer. This guide is meant to clear the confusion - to pull back the veil on some of the cleverest hackers out there, and show you their covert tricks and hacking techniques. What's more, this book was written with the beginner in mind. It's easy to follow and shows you how to do things from A-Z. You'll be shocked to find out how simple these methods are. Of course, that's not to say a pro wouldn't gain value from it. Even old dog hackers should find some of the concepts useful, new, and refreshing. Here's a sneak peek at what you'll discover inside: How to hack wireless networks using the sneakernet method How to use wardriving to hack wireless networks A detailed list of all the softwares you can download for hacking (so you can bypass difficult coding and the need to be a computer god) How to install and use Kali Linux A step by step tutorial on installing Kali Linux using a dual boot with Windows How to find vulnerabilities and "holes" on websites A crash course in penetration testing How operations work on the back-end of things How to prevent others from hacking into your system How to find and exploit human error on any given website How to get past a password protected computer How to gain remote access to a computer How to use any laptop as a listening device And much, m 1. Language: English. Narrator: Elliott Carr. Audio sample: http://samples.audible.de/bk/acx0/082020/bk_acx0_082020_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 10.12.2019
Zum Angebot
Hacking: The Underground Guide to Computer Hack...
9,95 € *
ggf. zzgl. Versand

Learn to hack! Below are sample topics covered in this audiobook: Hacking into computers and smartphones Ethical hacking Scanning your systems Pinpointing specific vulnerabilities The best tools for each kind of hacking Cracking encryption Flaws in websites and applications Attacking with frameworks Penetration testing Linux Step-by-step commands to perform Phishing Advantages and disadvantages of WEP, WPA, WPA2, etc. Other wireless hacking resources And various other subjects related to hacking If you really want to learn more about hacking, then this audiobook will definitely provide you with detailed information as well as other resources you can learn from.   1. Language: English. Narrator: Dalan E Decker. Audio sample: http://samples.audible.de/bk/acx0/114624/bk_acx0_114624_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 10.12.2019
Zum Angebot
Tor and the Deep Web: Bitcoin, DarkNet & Crypto...
9,95 € *
ggf. zzgl. Versand

The ultimate Tor/Darknet guide for 2017-2018 just got better! Just three questions you need to ask yourself:  Do you value privacy? Do you value freedom? Do you want to be anonymous? If you answered yes to any of the above, this is your audiobook. Instant anonymity, right now, can be yours for the taking. As science fiction author Hugh Howey once stated: When pursuing a dream, don't wait.  People sling words across the Internet without regard for their future. They don't know it but they are digging their own graves by attacking Goliath without a shield. Every word you say on forums, Usenet, Facebook, and news outlets is out there forever whether you are Republican, Democrat, Libertarian, Green Party, or bachelor party. Doesn't matter which one. One day you may wake up to discover a state power wants a "type" of voter out of the equation altogether: You.  How do you erase every critical forum comment you ever made? How do you scrub your Facebook page? How do you make anonymous online comments so that your new employer doesn't fire you? Enter Tor. This is the ultimate guide with easy take-you-by-the-hand instructions to teach you not only Tor, but VPNs, Bitcoins, hacking, Darknet personas and even how to evade the Sauronic eye that is the NSA. Yes. This book kills NSA spying dead.  Comment anonymously on any website Tor browser, Freenet, I2P, and all alternatives Cryptocurrency - how to buysell anonymously Encryption guide: PGP. Veracrypt. Email. Linux. Windows. Macs. Kali. Android. Phones. Online privacy no matter where you are Hacking for beginners on the Darknet  Edward Snowden's biggest mistake Master the art of invisibility today!   1. Language: English. Narrator: James C. Lewis. Audio sample: http://samples.audible.de/bk/acx0/101335/bk_acx0_101335_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 10.12.2019
Zum Angebot
Advanced Penetration Testing
35,99 € *
ggf. zzgl. Versand

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Anbieter: buecher
Stand: 10.12.2019
Zum Angebot
Advanced Penetration Testing
35,99 € *
ggf. zzgl. Versand

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Anbieter: buecher
Stand: 10.12.2019
Zum Angebot