Angebote zu "Exploit" (14 Treffer)

Big Data: A Very Short Introduction
€ 9.49 *
ggf. zzgl. Versand

An unimaginably vast amount of data is now generated by our on-line lives and businesses, At the same time, our ability to store, manage, analyse, and exploit this data is becoming ever more sophisticated. This Very Short Introduction maps out the technology, and also the range of possibilities, challenges, and ethical questions it raises.

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Hacking mit Metasploit
€ 46.90 *
ggf. zzgl. Versand

Metasploit ist ein Penetration-Testing-Werkzeug, das in der Toolbox eines jeden Pentesters zu finden ist. Dieses Buch stellt das Framework detailliert vor und zeigt, wie Sie es im Rahmen unterschiedlichster Penetrationstests einsetzen. Am Beispiel von Metasploit erhalten Sie einen umfassenden Einblick ins Penetration Testing. Sie lernen typische Pentesting-Tätigkeiten kennen und können nach der Lektüre komplexe, mehrstufige Angriffe vorbereiten, durchführen und protokollieren. Jeder dargestellte Exploit bzw. jedes dargestellte Modul wird anhand eines praktischen Anwendungsbeispiels in einer gesicherten Laborumgebung vorgeführt. Behandelt werden u.a. folgende Themen: - Komplexe, mehrstufige Penetrationstests - Post-Exploitation-Tätigkeiten - Metasploit-Erweiterungen - Webapplikationen, Datenbanken, Client-Side-Angriffe, IPv6 - Automatisierung mit Ruby-Skripten - Entwicklung eigener Exploits inkl. SEHExploits - Exploits für Embedded Devices entwickeln - Umgehung unterschiedlichster Sicherheitsumgebungen Die dritte Auflage wurde überarbeitet und aktualisiert. Neu dabei: - Post-Exploitation-Tätigkeiten mit Railgun vereinfachen - Bad-Characters bei der Entwicklung von Exploits berücksichtigen - Den Vulnerable Service Emulator nutzen Vorausgesetzt werden fundierte Kenntnisse der Systemtechnik (Linux und Windows) sowie der Netzwerktechnik.

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Hacking
€ 46.00 *
ggf. zzgl. Versand

´´Hacking´´ ist die Kunst, kreativ Probleme zu lösen - vom Entwickeln einer unkonventionellen Programmierlösung bis hin zum Aufdecken von Sicherheitslöchern in einem schlampig entworfenen Programm. Viele Menschen bezeichnen sich als Hacker, aber nur wenige besitzen das eigentlich notwendige Hintergrundwissen. Jon Erickson zeigt nicht, wie man sich existierende Exploits beschafft und diese einsetzt, sondern vermittelt detailliert, wie Hacking-Techniken und Exploits tatsächlich funktionieren. Dazu führt er aus einer Hacker-Perspektive in die Grundlagen der Programmiersprache C ein und erklärt die wesentlichen Aspekte der Computersicherheit in den drei eng zusammenhängenden Bereichen Programmierung, Vernetzung und Kryptografie. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse auch gleich praktisch anwenden. Nach der Lektüre werden Sie u.a. verstehen: - wie man in C, Assembler und mit Shell-Skripten programmiert, - wie man den Hauptspeicher durch Buffer Overflows und Format-String-Angriffe korrumpiert, - wie man Prozessor-Register und Hauptspeicher mit einem Debugger untersucht und so die Programmabläufe nachvollzieht, - wie man gängige Sicherheitsbarrieren - z.B. Intrusion-Detection-Systeme - überlistet, - wie man sich mit Port-Binding Zugang zu fremden Servern verschafft, - wie man Netzwerkverkehr umleitet und TCP-Verbindungen übernimmt. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse gleich praktisch anwenden. In der zweiten Auflage wurden alle Kapitel aktualisiert und erweitert, insbesondere die Einführung in die grundlegenden Funktionsweise eines Computers.

Anbieter: buecher.de
Stand: Jan 17, 2019
Zum Angebot
Handbuch Penetration Testing
€ 49.90 *
ggf. zzgl. Versand

Kein funktionsfähiges Unternehmensnetzwerk kann so abgeschottet werden, daß es hundertprozentige Sicherheit bietet. Gern wird übersehen, daß es aber nicht nur von außen erreichbar ist, auch durch Mitarbeiter sind ungewollte Zugriffe möglich. Es ist deshalb unabdingbar, Netzwerk und Anwendungen in regelmäßigen Abständen anhand simulierter Angriffe auf bekannte und unbekannte Sicherheitslücken zu untersuchen. Dieses Buch ist ein systematischer Leitfaden für solche Penetration-Tests und richtet sich an Security Consultants, die sich in die Materie einarbeiten müssen oder Kenntnisse vertiefen wollen. Einleitend klärt es die administrativen Voraussetzungen für ein professionelles Vorgehen vor Ort. Die ausführlichen Kapitel zu - Footprinting - Mapping und Application Mapping - Portscanning - OS- und Application Fingerprinting - Denial of Service liefern detaillierte technische Anleitungen für die kontrollierte Durchführung von Angriffen. Dabei wird auch beschrieben, wie Firewalls umgangen werden und welche Schwachstellen mit Exploits ausgenutzt werden können. Die Themen: - Organisation von Sicherheitsüberprüfungen - Footprinting: Informationen über Personen zusammensuchen - Zielnetzwerke auswerten: Adressen ermitteln, Verkehr abhören, Medien erkennen - Mapping: Aktive Systeme erkennen - Portscanning: Wo lauschen die Dienste? - Application Mapping: Welche Dienste stehen zur Verfügung? - OS Fingerprinting: Welches Betriebssystem ist im Einsatz? - Application Fingerprinting: Welche Anwendungen liegen vor? - Denial of Service: Überlastung und Fragmentierung - Firewalls erkennen und umgehen - Schwachstellen und unbekannte Fehler suchen - Sicherheitslücken mit Exploits ausnutzen

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
The Car Hacker´s Handbook
€ 29.99 *
ggf. zzgl. Versand

´´We´re all safer when the systems we depend upon are inspectable, auditable, and documented - and this definitely includes cars.´´ - Chris Evans, hacker and founder of Project Zero Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven´t kept pace with today´s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker´s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle´s communication network, you´ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker´s Handbook will show you how to: - Build an accurate threat model for your vehicle - Reverse engineer the CAN bus to fake engine signals - Exploit vulnerabilities in diagnostic and data-logging systems - Hack the ECU and other firmware and embedded systems - Feed exploits through infotainment and vehicle-to-vehicle communication systems - Override factory settings with performance-tuning techniques - Build physical and virtual test benches to try out exploits safely If you´re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker´s Handbook your first stop.

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Privileged Attack Vectors
€ 21.99 *
ggf. zzgl. Versand

See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Data Mining For Dummies
€ 28.99 *
ggf. zzgl. Versand

Delve into your data for the key to success Data mining is quickly becoming integral to creating value and business momentum. The ability to detect unseen patterns hidden in the numbers exhaustively generated by day-to-day operations allows savvy decision-makers to exploit every tool at their disposal in the pursuit of better business. By creating models and testing whether patterns hold up, it is possible to discover new intelligence that could change your business´s entire paradigm for a more successful outcome. Data Mining for Dummies shows you why it doesn´t take a data scientist to gain this advantage, and empowers average business people to start shaping a process relevant to their business´s needs. In this book, you´ll learn the hows and whys of mining to the depths of your data, and how to make the case for heavier investment into data mining capabilities. The book explains the details of the knowledge discovery process including: * Model creation, validity testing, and interpretation * Effective communication of findings * Available tools, both paid and open-source * Data selection, transformation, and evaluation Data Mining for Dummies takes you step-by-step through a real-world data-mining project using open-source tools that allow you to get immediate hands-on experience working with large amounts of data. You´ll gain the confidence you need to start making data mining practices a routine part of your successful business. If you´re serious about doing everything you can to push your company to the top, Data Mining for Dummies is your ticket to effective data mining.

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Penetration Testing: A Hands-On Introduction to...
€ 31.99 *
ggf. zzgl. Versand

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine based lab that includes Kali Linux and vulnerable operating systems, you ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you ll experience the key stages of an actual assessment including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: Crack passwords and wireless network keys with brute-forcing and wordlists Test web applications for vulnerabilities Use the Metasploit Framework to launch exploits and write y

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Metasploit
€ 29.99 *
ggf. zzgl. Versand

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester´s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you´ve built your foundation for penetration testing, you ll learn the Framework´s conventions, interfaces, and module system as you launch simulated attacks. You ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXp

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot
Architecture-Based Design of Multi-Agent Systems
€ 71.99 *
ggf. zzgl. Versand

Multi-agent systems are claimed to be especially suited to the development of software systems that are decentralized, can deal flexibly with dynamic conditions, and are open to system components that come and go. This is why they are used in domains such as manufacturing control, automated vehicles, and e-commerce markets. Danny Weyns´ book is organized according to the postulate that ´´developing multi-agent systems is 95% software engineering and 5% multi-agent systems theory.´´ He presents a software engineering approach for multi-agent systems that is heavily based on software architecture - with, for example, tailored patterns such as ´´situated agent´´, ´´virtual environment´´, and ´´selective perception´´ - and on middleware for distributed coordination - with programming abstractions such as ´´views´´ and ´´roles.´´ Next he shows the feasibility and applicability of this approach with the development of an automated transportation system consisting of a number of automatic guided vehicles transporting loads in an industrial setting. Weyns puts the development of multi-agent systems into a larger perspective with traditional software engineering approaches. With this, he opens up opportunities to exploit the body of knowledge developed in the multi-agent systems community to tackle some of the difficult challenges of modern-day software systems, such as decentralized control, location-awareness, self-adaption, and large-scale. Thus his book is of interest for both researchers and industrial software engineers who develop applications in areas such as distributed control systems and mobile applications where such requirements are of crucial importance.

Anbieter: buecher.de
Stand: Jan 16, 2019
Zum Angebot