توضیحاتی در مورد کتاب Chained exploits: advanced hacking attacks from start to finish
نام کتاب : Chained exploits: advanced hacking attacks from start to finish
عنوان ترجمه شده به فارسی : اکسپلویت های زنجیره ای: حملات هک پیشرفته از ابتدا تا انتها
سری :
نویسندگان : Evans. Keatron, Voth. Jack B., Whitaker. Andrew
ناشر : Addison-Wesley Professional
سال نشر : 2008;2009
تعداد صفحات : 302
ISBN (شابک) : 9780321498816 , 032149881X
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 11 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Contents......Page 8
Introduction......Page 18
The Approach......Page 22
The Chained Exploit......Page 23
Enumerating the PDXO Web Site......Page 24
Enumerating the Credit Card Database......Page 26
Stealing Credit Card Information from the Web Site......Page 32
Selling the Credit Card Information on the Underground Market......Page 34
Defacing the PDXO Web Site......Page 36
Chained Exploit Summary......Page 37
Do Not Install SQL Server on the Same Machine as IIS......Page 38
Do Not Use the Default Username and Password for Your Database......Page 39
Countermeasures for Customers......Page 40
Conclusion......Page 41
Setting the Stage......Page 42
The Approach......Page 43
For More Information......Page 46
The Chained Exploit......Page 49
Phishing Scam......Page 50
Installing Executables......Page 53
Sending Mr.Minutia an E-mail......Page 59
Finding the Boss’s Computer......Page 63
Connecting to the Boss’s Computer......Page 64
WinPcap......Page 66
Analyzing the Packet Capture......Page 67
Reassembling the Graphics......Page 69
Other Possibilities......Page 72
Countermeasures......Page 73
Countermeasures for Trojan Horse Applications......Page 74
Conclusion......Page 75
Setting the Stage......Page 76
The Approach......Page 78
The Chained Exploit......Page 80
Attack #1: The Test......Page 81
Attack #2: The One That Worked......Page 87
Getting Access to the Pawn Web site......Page 89
Lab-Testing the Hack......Page 91
Modifying the Pawn Web Site......Page 101
Other Possibilities......Page 104
Chained Exploit Summary......Page 105
Countermeasures for DDoS Attacks via ICMP......Page 106
Countermeasures for Unauthorized Web Site Modification......Page 107
Countermeasures for Compromise of Internal Employees......Page 108
Conclusion......Page 109
Setting the Stage......Page 110
The Approach......Page 112
Reconnaissance......Page 113
Getting Physical Access......Page 117
Executing the Hacks......Page 122
Bringing Down the Hospital......Page 128
Other Possibilities......Page 140
Chained Exploit Summary......Page 141
Countermeasures for Scanning Attacks......Page 142
Countermeasures for Operating System Attacks......Page 143
Countermeasures for Data Theft......Page 144
Conclusion......Page 145
Setting the Stage......Page 146
The Approach......Page 147
Reconnaissance......Page 148
Social Engineering Attack......Page 156
More and Yet More Recon......Page 158
Aggressive Active Recon......Page 161
Building the Exploit Infrastructure......Page 170
Testing the Exploit......Page 177
Executing the Hack......Page 187
Constructing the Rootkit......Page 188
Game Over—The End Result......Page 193
Chained Exploit Summary......Page 194
Countermeasures for Hackers Passively Finding Information about Your Company......Page 195
Countermeasures for Wi-Fi Attack on Quizzi Home Network......Page 196
Conclusion......Page 197
Setting the Stage......Page 198
For More Information......Page 200
Social Engineering and Piggybacking......Page 202
Gaining Physical Access......Page 216
Booting into Windows with Knoppix......Page 222
Modifying Personally Identifiable Information or Protected Medical Information......Page 225
Countermeasures......Page 226
Social Engineering and Piggybacking......Page 227
Compromising a PC......Page 229
Conclusion......Page 230
Setting the Stage......Page 232
The Approach......Page 233
Creating a Fake MySpace Web Site......Page 234
Creating the Redirection Web Site......Page 238
Creating a MySpace Page......Page 239
Sending a Comment......Page 242
Logging In to the Hacked Account......Page 245
The Results......Page 248
Countermeasures......Page 249
Be Careful about Clicking on Links......Page 250
Use a Strong Password......Page 251
Conclusion......Page 252
Setting the Stage......Page 254
The Approach......Page 257
For More Information......Page 258
Accessing Networks Through Access Points......Page 259
Connecting to an Access Point......Page 260
Performing the Microsoft Kerberos Preauthentication Attack......Page 269
Cracking Passwords with RainbowCrack......Page 275
Pilfering the Country Club Data......Page 277
Chained Exploit Summary......Page 278
Secure Access Points......Page 279
Configure Active Directory Properly......Page 280
Use an Intrusion Prevention System or Intrusion Detection System......Page 281
Computer Network Security Checklist......Page 282
Conclusion......Page 287
A......Page 288
C......Page 289
D......Page 291
G......Page 292
J-K......Page 293
N......Page 294
P......Page 295
Q-R......Page 296
S......Page 297
T......Page 298
W......Page 299
X-Z......Page 300