Ethical hacking: a hands-on introduction to breaking in
"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
[2021]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." |
Beschreibung: | Includes index |
Beschreibung: | xxv, 347 Seiten Illustrationen 24 cm |
ISBN: | 9781718501874 1718501870 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049096024 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 230809s2021 a||| |||| 00||| eng d | ||
010 | |a 2021940441 | ||
020 | |a 9781718501874 |c pbk. |9 978-1-7185-0187-4 | ||
020 | |a 1718501870 |9 1-71850-187-0 | ||
035 | |a (OCoLC)1401186044 | ||
035 | |a (DE-599)KXP1787150429 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
082 | 0 | |a a005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Graham, Daniel G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical hacking |b a hands-on introduction to breaking in |c by Daniel G. Graham. [Foreword by Juan Gilbert] |
264 | 1 | |a San Francisco |b No Starch Press |c [2021] | |
300 | |a xxv, 347 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a "A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." | ||
650 | 4 | |a Penetration testing (Computer security) | |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Penetration testing (Computer security) | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |u https://www.gbv.de/dms/bowker/toc/9781718501874.pdf |v 2022-07-28 |x Aggregator |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-034357644 |
Datensatz im Suchindex
_version_ | 1804185436862545920 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Graham, Daniel G. |
author_facet | Graham, Daniel G. |
author_role | aut |
author_sort | Graham, Daniel G. |
author_variant | d g g dg dgg |
building | Verbundindex |
bvnumber | BV049096024 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1401186044 (DE-599)KXP1787150429 |
dewey-raw | a005.8 |
dewey-search | a005.8 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02458nam a2200457 c 4500</leader><controlfield tag="001">BV049096024</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230809s2021 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2021940441</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781718501874</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-7185-0187-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1718501870</subfield><subfield code="9">1-71850-187-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401186044</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1787150429</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">a005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Graham, Daniel G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">a hands-on introduction to breaking in</subfield><subfield code="c">by Daniel G. Graham. [Foreword by Juan Gilbert]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxv, 347 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network."</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://www.gbv.de/dms/bowker/toc/9781718501874.pdf</subfield><subfield code="v">2022-07-28</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034357644</subfield></datafield></record></collection> |
id | DE-604.BV049096024 |
illustrated | Illustrated |
index_date | 2024-07-03T22:31:16Z |
indexdate | 2024-07-10T09:55:13Z |
institution | BVB |
isbn | 9781718501874 1718501870 |
language | English |
lccn | 2021940441 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034357644 |
oclc_num | 1401186044 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | xxv, 347 Seiten Illustrationen 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | No Starch Press |
record_format | marc |
spelling | Graham, Daniel G. Verfasser aut Ethical hacking a hands-on introduction to breaking in by Daniel G. Graham. [Foreword by Juan Gilbert] San Francisco No Starch Press [2021] xxv, 347 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Includes index "A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." Penetration testing (Computer security) Penetrationstest (DE-588)4825817-9 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Hacker (DE-588)4113821-1 s DE-604 Penetrationstest (DE-588)4825817-9 s https://www.gbv.de/dms/bowker/toc/9781718501874.pdf 2022-07-28 Aggregator Inhaltsverzeichnis |
spellingShingle | Graham, Daniel G. Ethical hacking a hands-on introduction to breaking in Penetration testing (Computer security) Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4825817-9 (DE-588)4113821-1 (DE-588)4274324-2 |
title | Ethical hacking a hands-on introduction to breaking in |
title_auth | Ethical hacking a hands-on introduction to breaking in |
title_exact_search | Ethical hacking a hands-on introduction to breaking in |
title_exact_search_txtP | Ethical hacking a hands-on introduction to breaking in |
title_full | Ethical hacking a hands-on introduction to breaking in by Daniel G. Graham. [Foreword by Juan Gilbert] |
title_fullStr | Ethical hacking a hands-on introduction to breaking in by Daniel G. Graham. [Foreword by Juan Gilbert] |
title_full_unstemmed | Ethical hacking a hands-on introduction to breaking in by Daniel G. Graham. [Foreword by Juan Gilbert] |
title_short | Ethical hacking |
title_sort | ethical hacking a hands on introduction to breaking in |
title_sub | a hands-on introduction to breaking in |
topic | Penetration testing (Computer security) Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Penetration testing (Computer security) Penetrationstest Hacker Computersicherheit |
url | https://www.gbv.de/dms/bowker/toc/9781718501874.pdf |
work_keys_str_mv | AT grahamdanielg ethicalhackingahandsonintroductiontobreakingin |